Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
more, plus we look at plans to integrate Ubuntu Security Notices within the
main ubuntu.com website.
Show Notes
Overview
Security updates for python-apt, GnuTLS, tcpdump, the Linux kernel and
more, plus we look at plans to integrate Ubuntu Security Notices within the
main ubuntu.com website.
Could still use md5 to validate downloads - md5 has been broken for a
while now so if md5 hashes were available for a repo then these would be
trusted - instead, verify all hashes
Ensure repository is trusted before downloading from it - in some cases,
could configure repositories that were not trusted and python-apt based
clients would not check trust - so would use it - now always check and
verify unless the repository is specifically configured as trusted
Trail of Bits security audit of zlib found various instances of undefined
behaviour in the implementation - pointer increment operations on
undefined memory ranges, shifts by negative indices etc. Unlikely to have
any real world impact.
Episode 59 - disabled SHA1 for digital signatures in GnuTLS - this update
adds VERIFY_ALLOW_BROKEN and VERIFY_ALLOW_SIGN_WITH_SHA1 priority strings
so can still use sha1 if really needed
Usual mix of buffer overflows and the like in various tcpdump
dissectors - in general you should not run tcpdump on untrusted data -
when run as root, by default tcpdump will drop permissions to the tcpdump
user after opening the capture device so this makes it somewhat safer
OOB write due to off-by-one error - originally reported against OpenLDAP
which uses cyrus-sasl and was able to be crashed by an unauthenticated
remote user due to this