Overview
This week we look at 2 years of 14.04 ESM, a kernel Livepatch issue,
DNS-over-HTTPS for Google Chrome plus security updates for ldb, OpenSSL,
This week in Ubuntu Security Updates
[USN-4888-1, USN-4888-2] ldb vulnerabilities [01:06]
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2020-27840 CVE-2021-20277 In the ldb package but was reported by Samba - libldb provides anLDAP-like database - is used internally by Samba etc - and whilst the
Samba package contains a copy of ldb internally we don’t compile this in
Ubuntu, instead we link it against the ldb package in the repo so we only
have to patch a CVE in one place
Heap buffer overflow when parsing a DN string with lots of trailingwhitespace - allows to place a single NUL byte at a chosen offset before
an allocated buffer
Heap buffer overflow when parsing an LDAP attribute string with multipleconsecutive leading spaces - memmove() to a location beyond the end of
the buffer
Crash -> DoS, can’t rule out RCE due to nature of heap buffer overflows[USN-4889-1] Linux kernel vulnerabilities [02:49]
3 CVEs addressed in Trusty ESM (14.04 ESM)CVE-2021-27364 CVE-2021-27363 CVE-2021-27365 iSCSI issues discussed in Episode 109 (most interesting was various heapbuffer overflows that could possibly be used for codeexec)
[USN-4890-1] Linux kernel vulnerabilities [03:09]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-27170 CVE-2020-27171 BPF speculative execution issues also discussed in Episode 109[USN-4891-1] OpenSSL vulnerability [03:26]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-3449 NULL ptr deref when processing signature algorithms - could allow aremote client to crash a server during renegotiation
[USN-3685-2] Ruby regression
9 CVEs addressed in Trusty ESM (14.04 ESM)CVE-2018-8777 CVE-2018-1000074 CVE-2017-17742 CVE-2017-10784 CVE-2017-14064 CVE-2017-0902 CVE-2017-0901 CVE-2017-0898 CVE-2017-0903 [USN-4893-1] Firefox vulnerabilities [03:47]
8 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-23986 CVE-2021-23985 CVE-2021-23984 CVE-2021-23988 CVE-2021-23987 CVE-2021-23983 CVE-2021-23982 CVE-2021-23981 87.0 - various web issues (malicious website -> XSS, DoS, RCE etc) plussome specific fixes for issues which could allow extensions to either
spoof website pop-ups or to read the response of various cross-origin
requests, plus a silent enabling of the DevTools remote debugging feature
(so a local attacker could modify the browser config to turn this on
without any hint to the user, and then a remote attacker could use this
to snoop on the browser session)
[USN-4894-1] WebKitGTK vulnerabilities [04:49]
7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-1870 CVE-2021-1801 CVE-2021-1799 CVE-2021-1789 CVE-2021-1765 CVE-2020-29623 CVE-2020-27918 Usual web issues - malicious website -> XSS, DoS, RCE etc[USN-4895-1] Squid vulnerabilities [05:19]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2020-25097 CVE-2020-15049 2 different HTTP request smuggling attack issues - one could result inpossible cache poisoning and the other in the ability to bypass security
controls and access forbidden services
[USN-4896-1] lxml vulnerability [05:39]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-28957 Mishandled HTML attributes which could allow a remote attacker to performXSS - depends on how lxml is used in application context
[USN-4897-1] Pygments vulnerability [06:03]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-27291 Another pygments vuln (Episode 109) - this one due to the use of regex invarious lexers, these have exponential or cubic complexity so could allow
an attacker to DoS via CPU
[USN-4898-1] curl vulnerabilities [06:38]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10)CVE-2021-22890 CVE-2021-22876 Failed to strip credentials from referrer headers - could then be leakedIncorrect handling of session tickets when using an HTTPS proxy -attacker who controlled the proxy could cause curl to bypass cert checks
and intercept comms as a result - only affected later Ubuntu releases
(20.04 LTS, 20.10)
Goings on in Ubuntu Security Community
Livepatch incident for CVE-2020-29372 [07:26]
https://ubuntu.com/blog/livepatch-2021-03-24-incident-investigation-reportSummary of 14.04 ESM so far [09:39]
https://ubuntu.com/blog/what-lies-after-lts-two-years-of-ubuntu-14-04-in-esmDoH coming for Google Chrome on Linux [11:01]
https://www.bleepingcomputer.com/news/security/google-chrome-for-linux-is-getting-dns-over-https-but-theres-a-catchTargeting chrome 91 but perhaps more likely 92 (89 is current stablerelease, new release every 6 weeks)
Needs to parse /etc/nsswitch.conf - uses the hosts: entry and expects‘files dns’ - should hopefully also support mdns4_minimal so that then
this would work with Ubuntu OOTB (since on 20.04 we use these 3 resolvers
by default)
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter