This week we talk about more BootHole-like vulnerabilities in GRUB2, a
Spectre exploit found in-the-wild, security updates for xterm, screen,
Python, wpa_supplicant and more.
Show Notes
Overview
This week we talk about more BootHole-like vulnerabilities in GRUB2, a
Spectre exploit found in-the-wild, security updates for xterm, screen,
Python, wpa_supplicant and more.
Relates to a dnsmasq update done back in January - upstream fixes results
in regressions in some network environments - backported the resulting
additional fixes from upstream to resolve these
Crash in screen from crafted UTF-8 - found by users crashing a minecraft
server with this crafted content - ? - server was running under screen so
would log this crafted content - screen dies, minecraft server dies -
lots of tutorials for running a minecraft server mention to run it under
screen so this is a common thing apparently
unsafe sprintf() call to format doubles - heap buffer overflow - BUT on
Ubuntu Python (like the vast majority of the archive) is compiled with
FORTIFY_SOURCE - just one of various hardening features - so can detect
some buffer overflows at runtime - turns this into a DoS
test code calls eval on content received via HTTP - so if ran the tests
and someone could interpose on connection, could get RCE
Uploaded to VT last month - not the first artefacts the use Spectre to be
uploaded - back in 2018 the original PoCs and various variants thereof
were uploaded to VT but these were all benign.
This one is a real exploit with versions targeting Windows and Linux -
the Linux variant reads /etc/shadow by default - it does this by spawning
a call to su to get the file paged into memory, then by walking in-kernel
file-system structures through their spec exec read gadget to eventually
read and dump out the file