Overview
This week we look at DMCA notices sent against Ubuntu ISOs plus security
updates for nginx, DHCP, Lasso, Django, Dnsmasq and more.
This week in Ubuntu Security Updates
[USN-4967-1, USN-4967-2] nginx vulnerability [00:50]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-23017 1 byte buffer overflow, able to be trigged by a crafted DNS response -UDP so could possibly be more easily forged than TCP (less state) -
crash, RCE
[USN-4968-1, USN-4968-2] LZ4 vulnerability [01:27]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-3520 integer overflow -> OOB write -> crash, RCE - crafted lz4 archive[USN-4969-1, USN-4969-2] DHCP vulnerability [01:52]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-25217 Crafted lease file could trigger an OOB read - could be triggered againstboth dhclient and dhcpd - DoS. In case of dhcpd could also cause that
lease to be deleted (and the one that follows it in the lease database).
ISC claim impact is LESS is using compiler hardening
(stack-protector-strong) - since in this case will trigger an abort - but
if not used it will keep running…
[USN-4970-1] GUPnP vulnerability [03:15]
1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-33516 DNS rebinding attack - able to be exploited by a remote web server -cause the local web browser into triggering actions against local UPnP
services that use gupnp library as it would not check that the Host
header specified the expected IP address. Could then be used for data
exfil / tampering etc.
Can be mitigated against by using a DNS resolver that prevents DNSrebinding
[USN-4971-1] libwebp vulnerabilities [04:11]
11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2020-36332 CVE-2020-36331 CVE-2020-36330 CVE-2020-36329 CVE-2020-36328 CVE-2018-25014 CVE-2018-25013 CVE-2018-25012 CVE-2018-25011 CVE-2018-25010 CVE-2018-25009 Google’s image format to relace both jpg/png and be faster (like vp8video codec using predictive encoding - uses neighboring pixels to
predict values in a block and then encodes only the difference)
C library :( - memory unsafeOOB reads, heap buffer overflow, UAF, excessive memory allocation etcDoS, RCE etc[USN-4972-1] PostgreSQL vulnerabilities [05:05]
3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-32029 CVE-2021-32028 CVE-2021-32027 Thanks to Christian Ehrhardt from the Ubuntu Server team for preparingthese updates
Latest upstream point-releases10.17 - 18.0412.7 - 20.04 LTS, 20.1013.3 - 21.04[USN-4973-1] Python vulnerability [05:44]
1 CVEs addressed in Focal (20.04 LTS), Groovy (20.10)CVE-2021-29921 ipaddress library in the python stdlib mishandled leading zero charactersin octets of an IP address - could allow bypass of access controls that
are based on IP addresses. Now treats leading zeros as invalid input
(before would try and treat them as octal… but could end up confused as
a result)
[USN-4974-1] Lasso vulnerability [06:40]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-28091 SAML protocol libraryReported by Akamai (uses Lasso in their Enterprise Application Accessproduct) - and coordinated between affected distros and vendors etc
Could allow unauthenticated access to applications that use SAMLv2(Security Assertion Markup Language v2) for authentication
If a SAML response contained both a signed and valid assertion, plusadditional unsigned assertions appened to this, these unsigned assertions
would be treated as valid as well.
So could allow an authenticated user to take their own signed SAMLassertion and append assertions for other users to the end to then
impersonate those other users.
https://blogs.akamai.com/2021/06/saml-implementation-vulnerability-impacting-some-akamai-services.html[USN-4975-1] Django vulnerabilities [08:19]
3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-33571 CVE-2021-33203 CVE-2021-32052 URLValidator failed to properly handle newlines, tabs - could be used toinject other headers into responses etc
Paths not properly sanitized in the admindocs module - could be used toprobe for the existence of files or possibly obtain their contents
Leading zeros in IPv4 addresses - basically identical to the Python issueabove
[USN-4976-1] Dnsmasq vulnerability [08:56]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Groovy (20.10), Hirsute (21.04)CVE-2021-3448 Failed to properly randomise source port (ie used a fixed port) whenforwarding queries when configured to use a specific server for a given
network interface - could then allow a remote attacker to more easily
perform cache poisoning attacks (ie just need to guess the transmission
ID once know the source port to get a forged reply accepted)
Very similar to the issues that were discovered back in 2008 by DanKaminsky - the whole reason source port randomisation was introduced as
part of the DNS protocol
Goings on in Ubuntu Security Community
Ubuntu user’s DMCA violation [09:58]
Last week was reported that a user downloading Ubuntu 20.04.2 iso viabittorrent received a DMCA violation notice from their ISP (Comcast)
Clearly absurd given Ubuntu is free (beer & freedom/libre)Also the hash of the iso in question was legit tooSent by “OpSec Online Antipiracy” not CanonicalOpSec responded saying their notice sending program was “spoofed” byunknown parties across multiple streaming platforms
Not clear then if the user spoofed it directly or if someone else spoofedthe notice and sent it to the user…
Still being investigated by OpSec apparently - our legal team is alsolooking into it as well
Not the first time this sort of thing has happened - back in 2016Paramount Pictures used the DMCA to send a takedown request to Google to
remove a search result linking to the Ubuntu 12.04.2 alternate ISO at
extratorrent.cc - this was listed as apparently being a link to the
Transformers: Age of Extinction movie…
Google did follow through on this - likely an automated system due tothe sheer volume of such requests they get per day (3 million p/d
pirate URLs to be removed from search results)
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter