This week we cover news of the CITL drop of 7000 “vulnerabilities”, the
Ubuntu Security disclosure and embargo policy plus we look at security
updates for pip, blueman, the Linux kernel and more.
Show Notes
Overview
This week we cover news of the CITL drop of 7000 “vulnerabilities”, the
Ubuntu Security disclosure and embargo policy plus we look at security
updates for pip, blueman, the Linux kernel and more.
Failed to sanitize filenames during pip install if provided a URL in the
install command - could allow a remote attacker to provide a
Content-Disposition header that instructs pip to overwrite arbitrary
files
Reported to Ubuntu by Vaisha Bernard - worked with upstream blueman devs
& Debian maintainers to get this resolved - thanks :)
Blueman provides a dbus API to spawn DHCP client when doing
bluetooth-based networking
Would not sanitise the provided argument and would pass this directly to
dhcpcd which supports specifying a script file to run - this gets
executed as root so is a simple local root-privesc
Fixed to change the way the argument is provided to dhcpcd so that it
cannot pass arbitrary flags
Should also note, by default on Ubuntu we use isc-dhcp-client not dhcpcd
so unless you have manually installed it, this cannot be exploited
7000 defects/vulns across 3243 packages from Ubuntu 18.04
Automated static / dynamic analysis system (fuzzing?)
Provide list of binaries / packages and the type of ‘vuln’ (SIG_SEGV
etc) - without reproducers etc
Expect package maintainers to contact them to request full details
Some package maintainers / upstreams will likely contact but we expect
this to be in the minority
Not really possible for @ubuntu_sec to triage and handle all of these but
will likely be a collective effort between distros to try and analyse
these all if CITL are willing to provide details
Without a collective effort unlikely that CVEs will get assigned and so
fixes could be missed if various upstreams just contact and fix these
themselves
Lots of open questions as to how this will play out…