This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.
Show Notes
Overview
This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.
Local user could potentially bypass various restrictions of the lock
screen - menu items can be activated by keyboard combinations - these
could then be used to take screenshots (and fill up disk space), close
windows behind the lock screen or start the screen reader which could
read out the contents of windows behind the lock screen.
Fixed by disabling all menu items when the screen is locked
Fails to properly parse /proc/PID/stat - this is used to determine the
controlling tty - this name could contain newlines - sudo would only read
one line of input and so would get a truncated name - when sudo is used
with SELinux this allows to confuse sudo as to where the destination for
stdout / stderr and so cause sudo to overwrite and arbitrary file by
creating a symlink from the supposed tty to the destination file.
Fixed by ensuring to parse the full name including any newlines
sudo contains the ability to restrict users with sudo access to running
further commands via the NOEXEC tag
Does this by LD_PRELOAD to replace exec() and other functions with
versions that return an error
wordexp() performs shell expansion on a string and so can contain shell
directives to run a command and get the output $(foo) - this can run
commands and so would not be stopped by LD_PRELOAD lib - so a user can
run a binary which does wordexp() they could bypass this restriction
Fixed by adding wordexp() to the LD_PRELOAD wrapper AND by adding a
seccomp filter to stop all execve() entirely
[USN-3969-1, USN-3969-2] wpa_supplicant and hostapd vulnerability
1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, Disco
Buffer over-read when decoding URLs could allow a remote authenticated
attacker to read other memory - information disclosure but could also
cause a crash via reading from an invalid memory location
Persistent XSS in decoding Authorization header for HTTP Basic
Authorization could allow an unauthenticated remote attacker to inject
arbitrary JavaScript in the _viewlog operation - fixed by properly
escaping this data