Overview
It’s release week! As Ubuntu 21.10 Impish Indri is released we take a look at some of the new security features it brings, plus we cover security updates for containerd, MongoDB, Mercurial, docker.io and more.
This week in Ubuntu Security Updates
[USN-5095-1] Apache Commons IO vulnerability [00:46]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-29425 Failed to properly sanitize filenames in FileNameUtils.normalize() -should remove relative path components like ../ but if contained leading
double-slashes this would fail - and the original path would be returned
without alteration - so could then possibly get relative directory
traversal to the parent directory depending on how this returned value
was used.
[USN-5096-1] Linux kernel (OEM) vulnerabilities
16 CVEs addressed in Focal (20.04 LTS)CVE-2021-40490 CVE-2021-38205 CVE-2021-38204 CVE-2021-38203 CVE-2021-38202 CVE-2021-38201 CVE-2021-38199 CVE-2021-38166 CVE-2021-38160 CVE-2021-3732 CVE-2021-37159 CVE-2021-3679 CVE-2021-3612 CVE-2021-35477 CVE-2021-34556 CVE-2021-41073 [USN-5091-2] Linux kernel (Raspberry Pi) vulnerabilities
5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-38204 CVE-2021-38199 CVE-2021-38160 CVE-2021-3679 CVE-2021-33624 [USN-5094-2] Linux kernel (Raspberry Pi) vulnerabilities
5 CVEs addressed in Bionic (18.04 LTS)CVE-2021-38205 CVE-2021-38204 CVE-2021-3732 CVE-2021-3679 CVE-2021-22543 [USN-5106-1] Linux kernel (OEM) vulnerabilities [01:36]
6 CVEs addressed in Focal (20.04 LTS)CVE-2021-38199 CVE-2021-38160 CVE-2021-3612 CVE-2021-22543 CVE-2020-26541 CVE-2021-41073 io_uring (5.1) - unprivileged user - trigger free of other kernelmemory - code execution
Episode 133[USN-4973-2] Python vulnerability [02:18]
1 CVEs addressed in Focal (20.04 LTS)CVE-2021-29921 ipaddress with octal encoded numbers vuln previously fixed but the patchwith this fix got dropped in an intervening SRU where 3.8.10 got
backported to 20.04 (LP: #1928057)
[USN-5099-1] Imlib2 vulnerability [03:11]
1 CVEs addressed in Focal (20.04 LTS)CVE-2020-12761 integer overflow -> OOB read - ICO file with an excessive amount ofcolors declared in its color map - fixed to error out in this case
[USN-5100-1] containerd vulnerability [03:43]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)CVE-2021-41103 container bundles root dirs and plugins had excessive permissions -allows an unprivileged Linux user to traverse directory contents and
execute programs in these dirs. If a container image was created with
setuid executables then that user on the Linux host could execute these
setuid binaries and gain root privileges on the host.
[USN-5101-1] MongoDB vulnerability [04:34]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2019-20925 Unauthenticated client can send crafted messages to the server whichspecify a negative size when decompressed - an insufficient amount of
memory would then get allocated and lead to a possible OOB write
Thanks to Heather Lemon from Sustaining Engineering team for preparingthis update
[USN-5102-1] Mercurial vulnerabilities [05:10]
2 CVEs addressed in Bionic (18.04 LTS)CVE-2018-17983 CVE-2019-3902 Mishandled symlinks in subrepos - defeats usual path-checking logic andso could could allow an attacker to write arbitrary files to the victim’s
filesystem outside the repo
OOB read when parsing malformed manifest entries[USN-5097-1] LedgerSMB vulnerabilities
3 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)CVE-2021-3731 CVE-2021-3694 CVE-2021-3693 [USN-5098-1] bl vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2020-8244 [USN-5103-1] docker.io vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)CVE-2021-41089 docker cp - could craft a container image that would result in docker cpmaking changes to existing files on the host filesystem - doesn’t
actually allow to read/modify or execute files on the host but could make
them readable/change perms etc and expose info on the host
[USN-5104-1] Squid vulnerability
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)CVE-2021-28116 [USN-5105-1] Bottle vulnerability
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-28473 [USN-5022-3] MySQL vulnerabilities
16 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-2390 CVE-2021-2389 CVE-2021-2385 CVE-2021-2372 CVE-2021-2342 CVE-2021-2307 CVE-2021-2226 CVE-2021-2194 CVE-2021-2180 CVE-2021-2179 CVE-2021-2171 CVE-2021-2169 CVE-2021-2166 CVE-2021-2162 CVE-2021-2154 CVE-2021-2146 [USN-5107-1] Firefox vulnerabilities [06:47]
7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04)CVE-2021-38501 CVE-2021-38500 CVE-2021-38499 CVE-2021-38498 CVE-2021-38497 CVE-2021-38496 CVE-2021-32810 93.0 - usual web issues - “if a user were tricked into opening aspecially crafted website, an attacker could potentially exploit these to
cause a denial of service, spoof another origin, or execute arbitrary
code.”
[USN-5108-1] libntlm vulnerability [07:32]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2019-17455 stack buffer OOB read when handling a crafted NTLM request since used afixed size buffer in various functions - fixed to truncate size to fit
within the buffer if too big to avoid overflowing the buffer
[USN-5078-3] Squashfs-Tools vulnerability [07:54]
1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04)CVE-2021-41072 Original backport of patch contained an error and so failed to work forsquashfs 2.x filesystems - would fail to actually sort entries as
expected - thanks to Salvatore Bonaccorso from the Debian security team
for bringing this to our attention
Goings on in Ubuntu Security Community
Ubuntu 21.10 (Impish Indri) released [09:08]
https://ubuntu.com/blog/ubuntu-21-10-has-landed5.13 kernelKFENCE memory error detectorStack offset randomisation across system-callsLandlock LSMDisabled unprivileged BPFGCC 11Hiring [13:12]
Security Product Manager
https://canonical.com/careers/2278145/security-product-manager-remoteGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter