Overview
Security fixes for 39 CVEs this week including L1TF and FragmentSmackThis week in Ubuntu Security Updates
GDM (USN-3737-1) (CVE-2018-14424)
Found by Ubuntu Security Team member Chris Coulson during audit of gdm3 source codeLocal user can exploit via DBus to crash GDM via use-after-free (create a transient display which is automatically cleaned up, then try to query info for the previously created display)Bionic only so farlibarchive (USN-3736-1)
6 CVEs addressed across Bionic, Xenial and TrustyCVE-2016-10209CVE-2016-10349CVE-2016-10350CVE-2017-14166CVE-2017-14501CVE-2017-14503All local crashes / DoS / unspecified impact via specially crafted archives in various formatsSamba (USN-3738-1)
4 CVEs addressed across Bionic, Xenial and TrustyCVE-2018-10858CVE-2018-10918CVE-2018-10919CVE-2018-1139Includes vulnerabilities in both the samba client and serverLikely to affect most Ubuntu userslibxml2 (USN-3739-1) (USN-3739-2)
XML parsing library used across lots of different software packages5 CVEs fixed across releases for Bionic, Xenial and Trusty2 CVEs fixed for Precise ESMCVE-2016-9318CVE-2017-16932CVE-2017-18258CVE-2018-14404CVE-2018-14567Includes information disclosure and DoSL1TF and FragmentSmack vulnerabilities in Linux Kernel (USN-3740-1) (USN-3740-2) (USN-3741-1) (USN-3741-2) (USN-3742-1) (USN-3742-2)
L1TF (CVE-2018-3620) (CVE-2018-3646)
Latest speculative execution cache side channel attack affecting Intel processorsAllows to access contents from L1 Data Cache via speculative execution, can then be read by cache side channel3 variants, SGX, SMM and VMM but only 2 affect UbuntuProcessors access virtual addresses which need to be translated to physical addressesPage Table Entries map from one to the other (contains metadata of page including offset and present bit)Pages can be swapped in our out of memory (Present or not) - so if not present then need to do a full page table walk to look up physical addressBut Intel processor will use offset value from PTE even on non-present pages speculativelyFor non-present pages, this value is usually junk so can essentially speculatively read arbitrary memory from L1D cache depending on PTE valueSGX doesn’t affect Ubuntu since not usedSMM fixed via ensuring PTEs of not present pages always refer to non-cacheable memory and hence can’t be used for thisVMM is trickierVMs maintain their own PTEs so also need to ensure they are doing the right thingOR if running untrusted VMs need to do a full L1D flush on switching from host to VMMade more trickier by Hyper Threading since sibling hyper-threads share the L1D cacheSo if have different trust domains on sibling hyper-threads may have to disable HT in certain circumstancesFragmentSmack (CVE-2018-5391)
Last week was SegmentSmack in TCP fragment reassembly, this week is FragmentSmackSimilar but for IP fragmentation reassemblyExploiting high algorithmic complexity of IP fragment reassembly code paths to cause DoSGnuPG (USN-3733-2) (CVE-2017-7526)
Last week GnuPG was fixed for Xenial and Trusty for RSA cache side-channel issueThis is corresponding fix for Precise ESMWebKitGTK+ vulnerabilities (USN-3743-1)
14 CVEs fixed in web content renderer used in many desktop appsCVE-2018-12911CVE-2018-4246CVE-2018-4261CVE-2018-4262CVE-2018-4263CVE-2018-4264CVE-2018-4265CVE-2018-4266CVE-2018-4267CVE-2018-4270CVE-2018-4272CVE-2018-4273CVE-2018-4278CVE-2018-4284Fixes for Bionic and XenialPostgreSQL (USN-3744-1) (CVE-2018-10915) (CVE-2018-10925)
2 CVEs fixed in popular relational database across Bionic, Xenial and Trustyprocps-ng (USN-3658-3)
3 CVEs fixed in Precise ESM procps-ng packageCVE-2018-1122CVE-2018-1123CVE-2018-1125Linux kernel livepatch (LSN-0042-1)
No Livepatch possible for L1TF so a LSN to advise to do an update and rebootGoings on in Ubuntu Security Community
Hiring
Ubuntu Security Manger
https://boards.greenhouse.io/canonical/jobs/1278287Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitterSpecial thanks
Thanks to Emily Ratliff - a great manager of the team (and a good friend too)We will miss you :)