Overview
We’re back after a few weeks off to cover the launch of the Ubuntu Security
Guide for DISA-STIG, plus we detail the latest vulnerabilities and updates
for lxml, PolicyKit, the Linux Kernel, systemd, Samba and more.
This week in Ubuntu Security Updates
100 unique CVEs addressed
[USN-5225-1] lxml vulnerability [00:57]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-43818 Python bindings for venerable libxml2 + libxslt - used by many otherpython packages for parsing XML etc
HTML cleaner module - designed to clean up HTML by removing embeddedscripts, special tags, CSS style annotations and more.
Would allow crafted scripts to bypass the filter - same for SVG whichcould embed scripts via data URIs - code execution as a result -> RCE
[USN-5210-2] Linux kernel regression [02:03]
7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-43389 CVE-2021-43056 CVE-2021-41864 CVE-2021-3760 CVE-2021-20321 CVE-2020-26541 CVE-2021-4002 Episode 136 - [USN-5210-1] - caused boot failure on machines that had AMDSecure Encrypted Virtualisation enabled
[USN-5223-1] Apache Log4j 1.2 vulnerability [02:21]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-4104 JMS Appender module in Log4j 1.2 - requires the attacker to be able tofirst modify the Log4j config - but can then get code execution - similar
to the original Log4Shell CVE-2021-44228 but not as severe
[USN-5224-2] Ghostscript vulnerabilities [02:57]
2 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-45949 CVE-2021-45944 Episode 146[USN-5227-1, USN-5227-2] Pillow vulnerabilities [03:06]
5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2022-22817 CVE-2022-22816 CVE-2022-22815 CVE-2021-34552 CVE-2021-23437 Various DoS / possible RCE via crafted image files[USN-5229-1] Firefox vulnerabilities [03:27]
13 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2022-22752 CVE-2022-22751 CVE-2022-22748 CVE-2022-22747 CVE-2022-22745 CVE-2022-22743 CVE-2022-22742 CVE-2022-22741 CVE-2022-22740 CVE-2022-22739 CVE-2022-22738 CVE-2022-22737 CVE-2021-4140 96.0Usual mix of web issues with standard consequences -> DoS / spoof browserUI, bypass security / content restrictions, info leak, RCE
[USN-5233-1, USN-5233-2] ClamAV vulnerability [03:59]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2022-20698 OOB read when using the CL_SCAN_GENERAL_COLLECT_METADATA option andhandling OOXML files - remote attacker could supply an input file which
could trigger this -> crash
[USN-5235-1] Ruby vulnerabilities [04:24]
3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-41819 CVE-2021-41817 CVE-2021-41816 [USN-5234-1] Byobu vulnerability [04:25]
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2019-7306 Apport hook for Byobu would upload the local .screenrc file which couldpossibly contain private info
[USN-5240-1] Linux kernel vulnerability [05:09]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2022-0185 Integer underflow -> OOB write when parsing file system properties -possible code execution -> requires root privileges to trigger BUT can
also be done from a user namespace - ie where a local user can masquerade
as root
[LSN-0084-1] Linux kernel vulnerability
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-0185 Livepatch for the above issue[USN-5242-1] Open vSwitch vulnerability [06:16]
1 CVEs addressed in Impish (21.10)CVE-2021-3905 Memory leak when handling fragmented packets - only affects most recentversions of Open vSwitch so LTS releases etc not affected
[USN-5243-1, USN-5243-2] AIDE vulnerability [06:34]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-45417 Advanced Intrusion Detection Environmentchecks integrity of files - common security toolHeap buffer overflow when performing various base64 operations, as donewhen handling XFS extended attributes or tmpfs ACLs - local privesc
[USN-5246-1] Thunderbird vulnerabilities [07:21]
26 CVEs addressed in Impish (21.10)CVE-2021-43546 CVE-2021-4126 CVE-2021-44538 CVE-2021-43528 CVE-2022-22751 CVE-2022-22748 CVE-2022-22747 CVE-2022-22745 CVE-2022-22743 CVE-2022-22742 CVE-2022-22741 CVE-2022-22740 CVE-2022-22739 CVE-2022-22738 CVE-2022-22737 CVE-2021-43656 CVE-2021-43545 CVE-2021-43543 CVE-2021-43542 CVE-2021-43541 CVE-2021-43539 CVE-2021-43538 CVE-2021-43537 CVE-2021-43536 CVE-2021-4140 CVE-2021-4129 91.5Usual web framework issues plus some TB specific onesJS interpreter was enabled in composition window - so if an attackercould exploit some other vuln to then be able to inject content into
the composition window could get code execution
Buffer overflow in Matrix chat client libMishandling of PGP/MIME - would only look at signature on inner signedmessage even if was contained in another signed message - so would show
whole message as valid
[USN-5248-1] Thunderbird vulnerabilities
45 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-43546 CVE-2021-4126 CVE-2021-44538 CVE-2021-43528 CVE-2021-38502 CVE-2022-22751 CVE-2022-22748 CVE-2022-22747 CVE-2022-22745 CVE-2022-22743 CVE-2022-22742 CVE-2022-22741 CVE-2022-22740 CVE-2022-22739 CVE-2022-22738 CVE-2022-22737 CVE-2021-43656 CVE-2021-43545 CVE-2021-43543 CVE-2021-43542 CVE-2021-43541 CVE-2021-43539 CVE-2021-43538 CVE-2021-43537 CVE-2021-43536 CVE-2021-43535 CVE-2021-43534 CVE-2021-38509 CVE-2021-38508 CVE-2021-38507 CVE-2021-38506 CVE-2021-38504 CVE-2021-38503 CVE-2021-38501 CVE-2021-38500 CVE-2021-38498 CVE-2021-38497 CVE-2021-38496 CVE-2021-38495 CVE-2021-29991 CVE-2021-29987 CVE-2021-29982 CVE-2021-29981 CVE-2021-4140 CVE-2021-4129 [USN-5249-1] USBView vulnerability [08:52]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-23220 Failed to properly configure policykit to enforce proper restrictions -could allow a local user to execute arbitrary code by causing USBView to
load other modules
Future versions of USBView won’t run as root[USN-5250-1] strongSwan vulnerability [09:59]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-45079 [USN-5252-1, USN-5252-2] PolicyKit vulnerability [10:06]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-4034 Mishandling of argv in pkexecNormally, when an application runs, gets given argv + argc - argv[0] isthe name of the application and arguments follow that - BUT this is only
a convention - can fork/exec another binary and specify NULL argv
pkexec in that case would then try and parse arguments outside of thevalid argv array - generally env follows argv - so would process env as
argv
since pkexec is setuid root glibc sanitises env - BUT pkexec modifiesit’s own argv when processing arguments - so ends up modifying env - with
a crafted env input can trick pkexec to modify it’s own env to then
inject say a malicious LD_PRELOAD value to cause arbitrary code to be
executed as root
Great find by Qualys[USN-5226-1] systemd vulnerability [13:50]
1 CVEs addressed in Focal (20.04 LTS), Hirsute (21.04), Impish (21.10)CVE-2021-3997 Uncontrolled recursion in systemd-tmpfiles - local user could create adeeply nested directory structure, cause systemd-tmpfiles to overflow
it’s own stack by recursively calling the same function over and over
again -> crash -> DoS
[USN-5193-2] X.Org X Server vulnerabilities [14:58]
3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2021-4011 CVE-2021-4009 CVE-2021-4008 Episode 142[USN-5247-1] Vim vulnerabilities [15:07]
5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-4069 CVE-2021-4019 CVE-2021-3984 CVE-2021-3974 CVE-2021-3973 Various memory corruption vulns when handling different files - DoS /code execution
All found by fuzzing vim with ASan - participates in bug bounty - want some bug cash?[USN-5254-1] shadow vulnerabilities [15:54]
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2018-7169 CVE-2017-12424 [USN-5255-1] WebKitGTK vulnerabilities [16:03]
7 CVEs addressed in Focal (20.04 LTS), Impish (21.10)CVE-2021-30984 CVE-2021-30954 CVE-2021-30953 CVE-2021-30952 CVE-2021-30951 CVE-2021-30936 CVE-2021-30934 [USN-5257-1] ldns vulnerabilities [16:18]
2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2020-19861 CVE-2020-19860 [USN-5260-1, USN-5260-2] Samba vulnerabilities [16:19]
3 CVEs addressed in Focal (20.04 LTS), Impish (21.10)CVE-2022-0336 CVE-2021-43566 CVE-2021-44142 1 CVEs addressed in Bionic (18.04 LTS)CVE-2021-44142 Most interesting vuln:Heap OOB read/write in VFS fruit module - codeexecUsed to provide enhanced compatibility with Apple SMB clients and othersNot enabled by default but likely enabled in a bunch of different envsOccurs when parsing extattr metadata - requires a user to be able tomodify a files xattrs but this is common in lots of envs
[USN-5259-1] Cron vulnerabilities [17:01]
4 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2019-9706 CVE-2019-9705 CVE-2019-9704 CVE-2017-9525 Goings on in Ubuntu Security Community
Ubuntu Security Guide tooling released for DISA-STIG compliance [17:11]
DISA-STIG is a U.S. Department of Defense security configuration standard
consisting of configuration guidelines for hardening systems to improve a
system’s security posture.
It can be seen as a checklist for securing protocols, services, or
servers to improve the overall security by reducing the attack
The Ubuntu Security Guide (USG) brings simplicity by integrating the
experience of several teams working on compliance. It enables the audit,
fixing, and customisation of a system while enabling a system-wide
configuration for compliance, making management by diverse people in a
DevOps team significantly easier.
The DISA-STIG automated configuration tooling for Ubuntu 20.04 LTS is
available with Ubuntu Advantage subscriptions and Ubuntu Pro, alongside
additional open source security and support services.
https://ubuntu.com/blog/ubuntu-introduces-the-ubuntu-security-guide-to-ease-disa-stig-compliance
https://ubuntu.com/advantage
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter