We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.
Show Notes
Overview
We look at vulnerabilities and updates for Exim, the Linux kernel, Berkeley DB, Qt and more, plus Joe and Alex discuss some recent malware campaigns including Hiddenwasp, and we cover some open positions too.
Old a.out binary format for 32-bit platforms - so only affects i386
kernel users, and only affects setuid a.out binaries (none in archive)
Kernel would not setup permissions early enough and so could allow ASLR
to be bypassed, weakening system protections to then more easily exploit
some other existing vulnerablity in the given setuid a.out binary
Have also disabled a.out support in general going forward as this is a
relic of the past
Updated AppArmor profiles to handle new kernel behavoiur as a result of
the fix for CVE-2019-11190 (ASLR bypass on setuid executables).
When executing a binary, will then appear to require mmap privileges of
the resulting binary, so ensure all current profiles are updated to add
this permission on the appropriate rules
Embargo broke early - was expected to be public 11th June - as a
consequence, we released our update once the details were publicly known
It was possible to include shell directives in the recipients email
address which would be evaluated by the exim process (and hence as
root) - but would require the attacker to keep a connection open to the
server for 7 days by transmitting 1 byte every few minutes.
Previous FF 67.0 had broken code for checking versions on upgrades, and
could potentially think you had downgraded the browser when it was in
fact upgraded and therefore think the old profile data was invalid