This week we rocket back into your podcast feed with a look at the OrBit Linux malware teardown from Intezer, plus we cover security updates for cloud-init, Vim, the Linux kernel, GnuPG, Dovecot and more.
52 unique CVEs addressed
cloud-init
was originally a Canonical developed project but is now widely
used by many of the public clouds for configuring cloud images on first
bootTrunc()
or Extract()
DB functions with
untrusted dataldap.schema
to validate untrusted schemas - DoS via
excessive CPU/memory usageLD_PRELOAD
environment variable but instead instructs the dynamic linker via
/etc/ld.so.preload
- this has benefits for the malware since the use of
the LD_PRELOAD
env var has various restrictions around setuid binaries
etc - but this is not the case of /etc/ld.so.preload
meaning all binaries
including setuid root ones are also “infected” via this technique and the
malware payload gets loaded for allreaddir()
the presence of the malware
itself is omitted - same for even execve()
so that if say a binary like
ip
, iptables
or even strace
is then executed, it can modify the output
which is returned to omit its own details/etc/ld.so.preload
- but likely is
via vulnerabilities in privileged internet facing applications - as such,
MAC systems like AppArmor then become very useful for confining these
services so they cannot arbitrarily write to these quite privileged files
etc