Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.
Show Notes
Overview
Double episode covering the security updates from the last 2 weeks, including snapd (DirtySock), systemd and more, plus we talk responsible disclosure and some open positions on the Ubuntu Security team.
Possible to allow a local user with admin privileges (eg. sudo group) to read arbitrary files without prompting for authorisation IF no policykit agents running
Policykit agents run by default so would require user to be running a difffent DE or to have uninstalled / disabled them
Could cause Django to consume a large amount of memory when formatting a decimal number with a large number of digits or with a large exponent since it would simply print every single provided character
Possible DoS although would need a very large number to be input
Fix is to format numbers with more than 200 characters in scientific notation
Stack buffer overflow of DBus path field - declared as VLA, but sender could use a value larger than the stack size and therefore jump the entire stack and the guard pages
Segmentation violation -> crash -> DoS
systemd does not automatically restart so brings down entire system - reboot
Possible code execution but unlikely
DBus and systemd need to agree on what the maximum size of various elements are - DBus spec says path could be unlimited - but in practice is less than 32MB! (dbus-daemon limits messages to this size) - systemd now limits path to 64KB AND ensures it keeps running after receiving an invalid sized path
Logic error in handing of timed logins (not enabled by default)
If screen already locked, select to log in as different user - then select a user which has timed login enabled - after timeout will unlock screen of original user
Need administrator privileges to enabled timed login for a given user so low impact
Fail to properly apply controls to zone transfers - could allow clients to request and receive a zone transfer to a dynamically loadable zone contrary to the allow-transfer ACL
Assertion failure if a trust anchor’s keys are replaced with keys using an unsupported algorithm during a key rollover when using the managed-keys feature for DNSSEC validation
Remotely triggerable memory leak when processing particular packets - DoS
Goings on in Ubuntu Security Community
snapd, systemd and handling of embargoed issues
2 updates involving close communication between Ubuntu Security Team and external stakeholders - embargoed
Responsible Disclosure - allows to coordinate a fix in a timely manner and then release update once all parties are ready in a coordinated manner
Set CRD with stakeholders (reporter, upstream, other distros etc)
Coordinate fix with upstream and other distros
Plan coordinated updates to be released with other distros / upstream at CRD