Overview
This week we talk about more BootHole-like vulnerabilities in GRUB2, a
Spectre exploit found in-the-wild, security updates for xterm, screen,
Python, wpa_supplicant and more.
This week in Ubuntu Security Updates
[USN-4698-2] Dnsmasq regression [00:44]
8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2019-14834 CVE-2020-25686 CVE-2020-25685 CVE-2020-25684 CVE-2020-25683 CVE-2020-25682 CVE-2020-25687 CVE-2020-25681 Relates to a dnsmasq update done back in January - upstream fixes resultsin regressions in some network environments - backported the resulting
additional fixes from upstream to resolve these
[USN-4746-1] xterm vulnerability [01:14]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021 -27135 taviso - crafted UTF-8 could cause a crash - related to very similar bugin screen
[USN-4747-1, USN-4747-2] GNU Screen vulnerability
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-26937 Crash in screen from crafted UTF-8 - found by users crashing a minecraftserver with this crafted content - ? - server was running under screen so
would log this crafted content - screen dies, minecraft server dies -
lots of tutorials for running a minecraft server mention to run it under
screen so this is a common thing apparently
[USN-4748-1] Linux kernel vulnerabilities [02:54]
5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)CVE-2020-29661 CVE-2020-29660 CVE-2020-29568 CVE-2020-29374 CVE-2020-27815 [USN-4749-1] Linux kernel vulnerabilities
9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-29661 CVE-2020-29660 CVE-2020-29569 CVE-2020-29568 CVE-2020-29374 CVE-2020-28941 CVE-2020-27830 CVE-2020-27815 CVE-2020-25669 [USN-4750-1] Linux kernel vulnerabilities
10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-20177 CVE-2020-29661 CVE-2020-29660 CVE-2020-29569 CVE-2020-29568 CVE-2020-28588 CVE-2020-28941 CVE-2020-27830 CVE-2020-27815 CVE-2020-25669 [USN-4751-1] Linux kernel vulnerabilities
18 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)CVE-2020-35508 CVE-2020-29661 CVE-2020-29660 CVE-2020-29569 CVE-2020-29568 CVE-2020-28974 CVE-2020-28588 CVE-2020-27835 CVE-2020-28941 CVE-2020-27830 CVE-2020-27815 CVE-2020-27777 CVE-2020-27675 CVE-2020-27673 CVE-2020-25704 CVE-2020-25669 CVE-2020-25668 CVE-2020-25656 [USN-4752-1] Linux kernel (OEM) vulnerabilities
20 CVEs addressed in Focal (20.04 LTS)CVE-2020-35508 CVE-2020-29661 CVE-2020-29660 CVE-2020-29371 CVE-2020-29369 CVE-2020-29368 CVE-2020-28915 CVE-2020-28588 CVE-2020-27815 CVE-2020-27152 CVE-2020-25704 CVE-2020-25643 CVE-2020-25641 CVE-2020-25284 CVE-2020-25212 CVE-2020-24490 CVE-2020-15437 CVE-2020-15436 CVE-2020-14314 CVE-2020-10135 [USN-4753-1] Linux kernel (OEM) vulnerability
2 CVEs addressed in Focal (20.04 LTS)CVE-2021-3178 CVE-2020-28374 [USN-4754-1] Python vulnerabilities [03:07]
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-3177 CVE-2020-27619 unsafe sprintf() call to format doubles - heap buffer overflow - BUT onUbuntu Python (like the vast majority of the archive) is compiled with
FORTIFY_SOURCE - just one of various hardening features - so can detect
some buffer overflows at runtime - turns this into a DoS
test code calls eval on content received via HTTP - so if ran the testsand someone could interpose on connection, could get RCE
[USN-4754-2] Python regression
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-27619 CVE-2021-3177 [USN-4754-4] Python 2.7 vulnerability
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-27619 CVE-2021-3177 [USN-4755-1] LibTIFF vulnerabilities [04:21]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2020-35524 CVE-2020-35523 Heap buffer overflow in tiff2pdf tool and integer overflow -> bufferoverflow from crafted tiff file input
[USN-4737-2] Bind vulnerability [04:39]
1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)CVE-2020-8625 Episode 105[USN-4757-1] wpa_supplicant and hostapd vulnerability [04:53]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-27803 When using P2P could result in a UAF -> crash or possible RCE from aremote user within local radio range
Goings on in Ubuntu Security Community
GRUB2 Secure Boot Bypass 2021 [05:31]
https://ubuntu.com/blog/grub2-secure-boot-bypass-2021https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021https://discourse.ubuntu.com/t/grub2-secureboot-bypass-2021-and-one-grub/21200First Spectre Exploit discovered in the wild [09:47]
https://dustri.org/b/spectre-exploits-in-the-wild.htmlUploaded to VT last month - not the first artefacts the use Spectre to beuploaded - back in 2018 the original PoCs and various variants thereof
were uploaded to VT but these were all benign.
This one is a real exploit with versions targeting Windows and Linux -the Linux variant reads /etc/shadow by default - it does this by spawning
a call to su to get the file paged into memory, then by walking in-kernel
file-system structures through their spec exec read gadget to eventually
read and dump out the file
Was developed by Immunity as part of their CANVAS tool(https://vimeo.com/271127615)
Linux Mint to more forcefully encourage security updates be installed [12:02]
https://blog.linuxmint.com/?p=4037Update manager will track metrics, can then detect cases where updatesare overlooked, remind or even insist to apply updates
Focus on not getting in the way, here to help, employ smart patters andusages, will be configurable etc
Still forming strategies but space to watchGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter