chfn
plus we look at
some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
X Server and more, and finally we cover the recent announcement of Ubuntu
22.04.2 LTS.
This week the common theme is vulnerabilities in setuid-root binaries and their
use of environment variables, so we take a look at a great blog post from the
Trail of Bits team about one such example in the venerable chfn
plus we look at
some security vulnerabilities in, and updates for the Linux kernel, Go Text, the
X Server and more, and finally we cover the recent announcement of Ubuntu
22.04.2 LTS.
75 unique CVEs addressed
PATH
environment variable could get it to
execute their binaries instead - particularly could be an issue if a setuid()
binary uses libxpm - and this is mentioned in the glibc manual around tips for
writing setuid programschfn
as
implemented by the util-linux
package - used the readline
library for input
handling by many CLI applications - as a result, able to be abused to read the
contents of a root-owned SSH private keychfn
binary (which is used to set info about the current user in
/etc/shadow
) would use the readline library just to read input from the user -
by default readline
will parse its configuration from the INPUTRC
environment
variableINPUTRC
to point to that file and execute chfn
and it will then go parse
that - however, the file first has to appear close to the format which is
expected - and it just so happens that SSH private keys fit this billchfn
comes from the
standalone passwd
package, not util-linux
- and the chfn
from passwd
didn’t
use readline
gnome-initial-setup
- previously this
was only Livepatch, but can now enable any of the Ubuntu Pro offerings as
soon as you log in for the first time.