Overview
This week we’re talking about moving IRC networks plus security updates for Pillow, Babel, Apport, X11 and more.
This week in Ubuntu Security Updates
[USN-4963-1] Pillow vulnerabilities [00:55]
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-28678 CVE-2021-28677 CVE-2021-28676 CVE-2021-28675 CVE-2021-25288 CVE-2021-25287 Python image handling library - used by many other packages for theirimage handling
All DoS issues via OOB read and similar so not critical[USN-4962-1] Babel vulnerability [01:31]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-20095 Internationalisation handling for python appsDirectory traversal flaw - could be exploited to load arbitrary locale.dat files - these contain serialized Python objects - so hence can get
arbitrary code execution as a result.
Could use relative path to specify a file outside the locate-datadirectory
[USN-4964-1] Exiv2 vulnerabilities [02:25]
5 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-29623 CVE-2021-32617 CVE-2021-29473 CVE-2021-29464 CVE-2021-29463 CLI util and library (C++) for reading+modifying metadata in imagefiles - more exiv2 - last only in Episode 115
OOB reads on metadata writeheap buffer overflow on m wquadratic complexity algorithm on metadata write - DoSstack info leak on m r[USN-4965-1, USN-4965-2] Apport vulnerabilities [03:19]
11 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-32557 CVE-2021-32556 CVE-2021-32555 CVE-2021-32554 CVE-2021-32553 CVE-2021-32552 CVE-2021-32551 CVE-2021-32550 CVE-2021-32549 CVE-2021-32548 CVE-2021-32547 Seems it’s time for more Apport vulns - every quarter or soArbitrary file read / write vulns discovered by Maik MünchApport parses various details out of /proc and some of these can becrafted by the process, ie process name, current working dir etc - and
then goes to gather files etc - and so if can craft these details can get
it to read files which weren’t intended via symlinks etc (mitigated by
symlink protections in Ubuntu) - or from injection of data into say dpkg
queries to get it to include other files like /etc/passwd since this
operation happens as root by apport
These end up in the crash dump and this can be read by the regular userAlso when uploading via whoopsie, race condition where crash dump can bereplaced by a symlink and then the crash dump will be written to the dest
of the symlink - file write vuln - but again mitigated by
symlink-restriction
[USN-4966-1, USN-4966-2] libx11 vulnerability [05:57]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-31535 When looking up a color, failed to properly validate it - app could thenget extra X protocol requests sent to the X server - ie. could then
disable X server authorisation etc so remote attackers could connect to
the local X server and snoop on inputs etc
Goings on in Ubuntu Security Community
#ubuntu-hardened -> #ubuntu-security on Libera.Chat [06:45]
LWN writeup https://lwn.net/Articles/857140/Volunteer staff resigned en masse after network was taken over by techentrepreneur
Ubuntu IRC council voted and approved a resolution to recommend movingUbuntu IRC channels from freenode to Libera.Chat
Community Council approved this so now all channels have moved toLibera.Chat
Almost all of the old channels on freenode have now all been taken overby the new freenode staff
irc.ubuntu.com now redirects to irc.libera.chatFinally took the opportunity to rename our channel - #ubuntu-securityCome join usGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter