Overview
This week we look at some details of the 23 unique CVEs addressed across the supported Ubuntu releases, discuss the latest purported Intel side-channel vulnerability PortSmash and more.
This week in Ubuntu Security Updates
[USN-3806-1] systemd vulnerability
1 CVEs addressed in Xenial, Bionic, CosmicCVE-2018-15688Reported by Felix Wilhelm from Google Security Team to Ubuntu in LP #1795921systemd contains DHCPv6 client written from scratchHeap buffer overflow in DHCPv6 option handling (say via server id of >=493 bytes)Coordinated with systemd upstream and Red Hat to resolve this[USN-3807-1] NetworkManager vulnerability
1 CVEs addressed in Xenial, Bionic, CosmicCVE-2018-15688NetworkManager contains the same code taken from systemd-networkd so is also vulnerable[USN-3808-1] Ruby vulnerabilities
2 CVEs addressed in Trusty, Xenial, Bionic and CosmicCVE-2018-16395CVE-2018-16396Misuses return value when comparing names in X509 certificatesIf returned 1 on comparing name would assume are identical but are in fact notCould allow to impersonate a certificateTaint flags not propagated when unpacking arrays into strings, or packing strings into arraysCould allow untrusted data to be treated as trusted[USN-3809-1] OpenSSH vulnerabilities
2 CVEs addressed in Trusty, Xenial, BionicCVE-2018-15473CVE-2016-10708User enumeration due to fail to bail out early on invalid user authenticationWould take longer to process a packet with a valid username than an invalid oneCan determine account names as a result via brute-force timing attackPossible to crash the per-connection process on NULL pointer dereferenceLow priority since doesn’t crash the main daemon so not really a DoS[USN-3786-2] libxkbcommon vulnerabilities
11 CVEs addressed in BionicCVE-2018-15856CVE-2018-15864CVE-2018-15863CVE-2018-15862CVE-2018-15861CVE-2018-15859CVE-2018-15858CVE-2018-15857CVE-2018-15855CVE-2018-15854CVE-2018-15853Episode 7 for Trusty and XenialSome common CVEs, some new ones specific to Bionic version[USN-3810-1] ppp vulnerability
1 CVEs addressed in Trusty, Xenial, BionicCVE-2018-11574Ubuntu specific change to pppd to add support for EAP-TLS authenticationCould be triggered on both peer or server sideLack of input validation coupled with an integer overflow lead to crash and possible authentication bypassLeads to memcpy() with a negative length value (and hence very large unsigned value)Theoretically possible to overwrite other data structures related to server state and therefore bypass authentication[USN-3811-1] SpamAssassin vulnerabilities
3 CVEs addressed in Trusty, Xenial, BionicCVE-2018-11781CVE-2018-11780CVE-2017-15705Updated to latest stable version of spamassassin (3.4.2)So all supported Ubuntu releases now have 3.4.2Local user code injection via meta rule syntaxRCE via PDFInfo pluginFailure to handle unclosed HTML tags in emails leading to DoS[USN-3812-1] nginx vulnerabilities
3 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-16845CVE-2018-16844CVE-2018-16843DoS due to memory usage in HTTP/2 handlingDoS due to excessive CPU usage in HTTP/2 handlingWhen processing a specially crafted mp4 file, could lead to infinite loopThis module is in the nginx-extras package[USN-3813-1] pyOpenSSL vulnerabilities
2 CVEs addressed in XenialCVE-2018-1000808CVE-2018-1000807DoS via crash in handling of X509 certificatesUAF in handling of X509 certificatesGoings on in Ubuntu Security Community
PortSmash - New Intel side-channel vulnerability or expected behaviour for SMT?
CVE-2018-5407 assigned to OpenSSL but described as a side-channel in Intel SMT / Hyper-Threadinghttps://www.openwall.com/lists/oss-security/2018/11/01/4Affects OpenSSL <= 1.1.0hOriginally suggested as a possible side-channel in 2015Due to sharing of execution engines in SMTTwo processes across shared hyper-threads, contend for execution units across same portsMeaure port contention delay -> side channel to recover ECDSA private key of server running in other processSo crypto code needs not only to be constant-time, but also secret-independent execution-flowie. execute same instruction sequence regardless of secretall code and data addresses are assumed publicOr disable HT / learn to schedule trust domains across different hyper-threads (gang-scheduling)Hiring
Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Preview of Next Episode
Upcoming fixes
libmspack, systemd, gettextGet in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter