This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.
Show Notes
Overview
This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.
Allows bypass of authentication by remote attackers if they send a SSH2_MSG_USERAUTH_SUCCESS message instead of the SSH2_MSG_USERAUTH_REQUEST message to initiate the authentication process
This message is meant to be sent from the server to the client but in this case are sending it to the server
State machine on server-side then jumps straight to ‘Authenticated’
Only affects applications which use libssh as a server
Very similar to CVE-2018-10933 for libssh - remote authentication bypass by presenting SSH2_MSG_USERAUTH_SUCCESS in place of SSH2_MSG_USERAUTH_REQUEST
Due to code-reuse between client and server implementations
On server side, runs the normal client side code to be used when receiving this authentication success from the server, and flips the ‘authenticated’ flag - which is shared by both the server and client code
Goings on in Ubuntu Security Community
Ubuntu 18.10 Cosmic Cuttlefish Released
Includes OpenSSL 1.1.1 for TLS 1.3 support
Support for using fingerprint readers to unlock screen etc
Ubuntu Security Team consider fingerprints to be akin to usernames only - so we don’t enable fingerprint authentication by default - need to opt-in
libfprint and fprintd promoted to main to allow this