A quieter week in package updates - this week we look at some details of the 9
unique CVEs addressed across the supported Ubuntu releases and talk about
various hardening guides for Ubuntu.
Show Notes
Overview
A quieter week in package updates - this week we look at some details of the 9
unique CVEs addressed across the supported Ubuntu releases and talk about
various hardening guides for Ubuntu.
Crash from NULL pointer dereference when run out of file descriptions (failure to check return value) - a remote attacker could cause crash by flooding with new connections
2 low priority issues:
“rpcbomb” - allows an unauthenticated attacker to DoS via memory exhaustion
Stack based buffer overflow could cause a crash when flooded by ICMP and UDP packets in the sunrpc implementation - fixed by replacing stack based memory allocation with heap-based allocation instead
Common pattern to fix this type of issue - similar work in Linux kernel recently by KSPP to replace VLAs
Latest firefox release (62) fixing a number of issues including DoS and RCE
One interesting one is CVE-2018-12383 - in Firefox 58 the password storage
format was changed (was sqlite, then was changed to json). When user sets a
master password, this is used to encrypt all stored passwords. However, this
was only done for the copy stored with the new format - the old copy would
still be stored unencrypted since it never had a master password set on
it. This is now fixed to simply delete the old copy of the password DB.
Goings on in Ubuntu Security Community
Discussions around hardening guides for Ubuntu
A number of ‘best practices’ guides exist for hardening Ubuntu installations from reputable organisations