Episode 8

Posted on Monday, Oct 22, 2018
This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.

Show Notes

Overview

This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.

This week in Ubuntu Security Updates

15 unique CVEs addressed

[USN-3790-1] Requests vulnerability

  • 1 CVEs addressed in Trusty, Xenial, Bionic
  • Requests library could end up sending credentials in clear text if server is configured with a https -> http redirect

[USN-3792-1, USN-3792-2] Net-SNMP vulnerability

  • 1 CVEs addressed in Trusty, Xenial, Bionic & Precise ESM
  • Remote DoS via a NULL pointer dereference from an authenticated attacker

[USN-3793-1] Thunderbird vulnerabilities

[USN-3794-1] MoinMoin vulnerability

  • 1 CVEs addressed in Trusty, Xenial, Bionic
  • XSS in link editor dialog allow injection of arbitrary web content (HTML, scripts etc)

[USN-3789-2] ClamAV vulnerabilities

  • 5 CVEs addressed in Precise ESM
  • Corresponding fix for Precise ESM from ClamAV which we discussed in Episode 7
  • Also rolls in fixes for 4 other vulnerabilities in the embedded mspack library
    • In trusty and precise we used the embedded libmspack, newer releases use the system package so weren’t affected

[USN-3795-1] libssh vulnerability

  • 1 CVEs addressed in Trusty, Xenial, Bionic
  • Embedded SSH server and client implementation
  • Allows bypass of authentication by remote attackers if they send a SSH2_MSG_USERAUTH_SUCCESS message instead of the SSH2_MSG_USERAUTH_REQUEST message to initiate the authentication process
  • This message is meant to be sent from the server to the client but in this case are sending it to the server
  • State machine on server-side then jumps straight to ‘Authenticated’
  • Only affects applications which use libssh as a server

[USN-3796-1, USN-3796-2] Paramiko vulnerability

  • 1 CVEs addressed in Trusty, Xenial, Bionic & Precise ESM
  • Python SSH library for both servers and clients
  • Very similar to CVE-2018-10933 for libssh - remote authentication bypass by presenting SSH2_MSG_USERAUTH_SUCCESS in place of SSH2_MSG_USERAUTH_REQUEST
  • Due to code-reuse between client and server implementations
  • On server side, runs the normal client side code to be used when receiving this authentication success from the server, and flips the ‘authenticated’ flag - which is shared by both the server and client code

Goings on in Ubuntu Security Community

Ubuntu 18.10 Cosmic Cuttlefish Released

  • Includes OpenSSL 1.1.1 for TLS 1.3 support
  • Support for using fingerprint readers to unlock screen etc
    • Ubuntu Security Team consider fingerprints to be akin to usernames only - so we don’t enable fingerprint authentication by default - need to opt-in
    • libfprint and fprintd promoted to main to allow this

Ubuntu CVE Tracker facelift

Hiring

Ubuntu Security Engineer

Get in contact