This week we look at the details of the latest Intel hardware
vulnerabilities, including security updates for the Linux kernel and Intel
microcode, plus Bash, cpio, FriBidi and more.
Show Notes
Overview
This week we look at the details of the latest Intel hardware
vulnerabilities, including security updates for the Linux kernel and Intel
microcode, plus Bash, cpio, FriBidi and more.
cpio wouldn’t validate values written to headers of TAR archives - could
use cpio to create a TAR containing another TAR with a big size and will
use wrong context values (ie uses inner TAR values in header) - this
could allow a TAR to be created which has files with permissions not
owned by the original user - when extracted by cpio will overwrite target
files - whereas if using tar to extract will avoid this - fixed to check
and handle header values correctly
Added Rygel in Eoan which is off by default but needed GNOME to handle
that - it would disable it dynamically - so if not running GNOME, rygel
would be running and sharing your stuff on the local network - fixed to
disable automatically on upgrade - and then can use the GNOME settings
front-end etc to re-enable if desired
Issue reported about unicode isolated handling in Qt - turns out affected
GTK applications as well - entirely different code with very similar
flaw - stack buffer overflow since didn’t check bounds of a fixed array
used to store details on nested unicode isolate sections - simple fix to
just check bounds before trying to store next element
Recently announced vuln (heap-based buffer overflow) in bash affecting
old versions - so most releases unaffected except Precise - can trigger
by printing wide characters via echo -e