Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
Joe, plus Alex does the weekly roundup of security updates, including
Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
Show Notes
Overview
Dr. Levi Perigo is our special guest this week to discuss SDN and NFV with
Joe, plus Alex does the weekly roundup of security updates, including
Ghostscript, Squid, Apport, Whoopsie, libvirt and more.
Integer overflow via `rsearch` operator - could allow to override file
access controls and hence get code execution as the user who is viewing /
processing the PS file - only affects most recent versions
Failed to drop privileges correctly when invoking gdbus to determine if
the user is closing their session -> would be invoked with root group
privileges and using the environement of the user - they could override
the DBUS_SESSION_BUS_ADDRESS environment variable, causing gdbus to
connect to a spoofed dbus server and in the process to read a 16-byte
nonce from a file of their choosing - allows to read arbitrary files
that are 16-bytes of length
TOCTOU issue when handling crash dump - if process PID gets recycled
apport could include the wrong processes details in a crash dump that
is then readable by other users - fixed to check process start time is
at least before the time apport itself was invoked
1 from Seong-Joong Kim
Unhandled exception when parsing users preferences configuration file
-> crash, DoS
Ubuntu specific patch - pppd is setuid() root and would helpfully
modprobe ppp_generic module when needed - but would not clear
MODPROBE_OPTIONS environment module and so this could be used to either
load other modules or read other files as root etc - fixed by removing
this functionality since this has not been needed for a long time as
ppp_generic has been built into the kernel since 2012 (ie there is no
ppp_generic module to even load via modprobe)
libvirt package sets up the libvirt socket via systemd - systemd unit
specifies a SocketMode=0666 so is world writable :( - fixed to ensure
systemd unit specifies this as only owner/group writable and ensures the
owner is root and group is libvirt
Legacy BIOS systems - grub core (in MBR) and modules (in file-system)
could get out of sync if grub was not being installed onto the correct
disk (this was the case for some users with manually configured RAID
setups / particular cloud images etc) - fixed to just not do the grub
install on the update to ensure they don’t get out of sync (since these
vulnerabilities only are relevant to UEFI secure boot, no need for the
update in BIOS boot systems).
Compiler options changed upstream and this could affect other libraries /
apps which link against libmysqlclient - reverted this change since is
not security relevant anyway
Goings on in Ubuntu Security Community
Joe talks SDN & NFV with Dr. Levi Perigo of the University of Colorado [13:28]