chfn plus we look at
some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
X Server and more, and finally we cover the recent announcement of Ubuntu
22.04.2 LTS.
This week the common theme is vulnerabilities in setuid-root binaries and their
use of environment variables, so we take a look at a great blog post from the
Trail of Bits team about one such example in the venerable chfn plus we look at
some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
X Server and more, and finally we cover the recent announcement of Ubuntu
22.04.2 LTS.
75 unique CVEs addressed
PATH environment variable could get it to
execute their binaries instead - particularly could be an issue if a setuid()
binary uses libxpm - and this is mentioned in the glibc manual around tips for
writing setuid programschfn as
implemented by the util-linux package - used the readline library for input
handling by many CLI applications - as a result, able to be abused to read the
contents of a root-owned SSH private keychfn binary (which is used to set info about the current user in
/etc/shadow) would use the readline library just to read input from the user -
by default readline will parse its configuration from the INPUTRC environment
variableINPUTRC to point to that file and execute chfn and it will then go parse
that - however, the file first has to appear close to the format which is
expected - and it just so happens that SSH private keys fit this billchfn comes from the
standalone passwd package, not util-linux - and the chfn from passwd didn’t
use readlinegnome-initial-setup - previously this
was only Livepatch, but can now enable any of the Ubuntu Pro offerings as
soon as you log in for the first time.