Overview
This week we look at some details of the 29 unique CVEs addressed across
the supported Ubuntu releases in the past 7 days and more.
This week in Ubuntu Security Updates
[USN-5131-1] Firefox vulnerabilities [00:42]
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-38509 CVE-2021-38508 CVE-2021-38507 CVE-2021-38506 CVE-2021-38504 CVE-2021-38503 94.0Copy image link - copies final image URL after redirects - if a pagewere to then combine this with a content security policy which blocked
a redirect, the image URL may then contain any authentication tokens -
and so if a page could trick a user into copying and pasting that image
URL into the page an attacker could steal their auth token
Various web framework issues[USN-5132-1] Thunderbird vulnerabilities [01:56]
6 CVEs addressed in Impish (21.10)CVE-2021-38501 CVE-2021-38500 CVE-2021-38498 CVE-2021-38497 CVE-2021-38496 CVE-2021-32810 91.2.1Usual web framework issues[USN-5133-1] ICU vulnerability [02:17]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2020-21913 unicode handling libraryUAF - could be triggered if was packaging the ICU data with maliciousinput -> crash / RCU
[USN-5135-1] Linux kernel vulnerability [02:43]
1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-3759 impish (5.13), hirsute (5.11), focal hwe (5.11)IPC memory objects not properly accounted for in memcg - could allow tobypass limits and cause DoS
[USN-5130-1] Linux kernel vulnerabilities [03:24]
2 CVEs addressed in Trusty ESM (14.04 ESM)CVE-2020-29660 CVE-2020-29661 3.132 vulns courtesy of Jann Horn (GPZ) - in tty subsystem - lock orderissues - UAF - DoS/privesc (Episode 106)
[USN-5136-1] Linux kernel vulnerabilities [04:06]
9 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2021-42252 CVE-2021-38199 CVE-2021-3759 CVE-2021-3753 CVE-2021-3743 CVE-2021-3655 CVE-2020-36385 CVE-2020-36322 CVE-2019-19449 4.15 (bionic, xenial hwe, trusty azure)IPC memory object leak plus various other vulns from Episode 136[USN-5137-1] Linux kernel vulnerabilities [04:48]
10 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-42252 CVE-2021-3759 CVE-2021-3753 CVE-2021-3743 CVE-2021-3739 CVE-2021-35477 CVE-2021-34556 CVE-2021-3428 CVE-2020-36385 CVE-2019-19449 5.4 (focal, bionic hwe)[USN-5134-1] Docker vulnerability [04:50]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-41092 If was using a private registry for docker login but also had configuredcredsStore and credsHelper in ~/.docker/config.json and these were not
able to be executed (ie. execute bit not set or not in $PATH), then creds
would get sent to the public docker registry rather than the configured
private registry.
Goings on in Ubuntu Security Community
Hiring [06:00]
Security - Product Manager
HOME BASED - EMEA (Europe, Middle East, Africa)Role includes:guiding the evolution of security offerings from Canonical and Ubuntudriving compliance and certification of Ubuntuengaging with the open source security communitytelling the story of Canonical’s work to deliver secure platformshttps://canonical.com/careers/2278145/security-product-manager-remoteGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter