Overview
Security updates for 29 CVEs including Perl, the kernel, OpenSSL (PortSmash)
and more, plus in response to some listener questions, we discuss how to make
sure you always have the latest security updates by using unattended-upgrades.
This week in Ubuntu Security Updates
[USN-3834-1, USN-3834-2] Perl vulnerabilities
4 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, CosmicCVE-2018-18314CVE-2018-18313CVE-2018-18312CVE-2018-18311Perl regex engine fuzzed with valgrind to detect memory errors2 different heap based buffer overflow in regex engineHeap-based read past end of buffer in regex engineInteger overflow from environment variablesuses untrusted input from environment variables (length of values to calculate memory to allocate)heap buffer overflow[USN-3835-1, USN-3836-1, USN-3836-2] Linux kernel vulnerabilities
6 CVEs addressed in Cosmic, 2 in Bionic and Xenial
CVE-2018-6559CVE-2018-18955CVE-2018-18653CVE-2018-18445CVE-2018-18281CVE-2018-17972Episode 14 covered CVE-2018-6559 (overlayfs / user namespace directory names disclosure)
Also fixed for Bionic and XenialEpisode 12 covered CVE-2018-17972 (procfs kernel stack disclosure)
3 CVEs discovered by Jann Horn (and one inadvertently caused by Jann too)
mremap() system call - used to expand or shrink an existingmemory mapping and possibly move it - doesn’t properly flush TLB - could
leave pages in page cache for a short time which can then be raced to obtain
access afterwards and possible DoS crash or information disclosure etc
depending on target memory
Previous fix for CVE-2017-17852 (BPF verifier) discovered and also fixed byJann, introduced a new vulnerability which would allow BPF programs to
access memory out-of-bounds
Nested user namespaces with more than 5 UID or GID mappings could allowprocesses with CAP_SYS_ADMIN within the namespace to access resources
outside the namespace as the kernel would get confused on which UID to
check against outside the namespace
Also fixed in Bionic and XenialVulnerability specific to the Ubuntu kernel used in Cosmic (18.10)
2 bugs discovered as a result of using the secure boot lockdown patchsetModule signatures not properly enforced for UEFI Secure Boot - we hadenabled the option to do this via IMA but had not then included the IMA
policy to ensure this was enforced
Fixed by turning off option to verify modules using IMASecondary kernel keyring (ie where UEFI MOK goes from shim - used byDKMS) not trusted - so modules signed with it wouldn’t work (except they
do due to above)
Fixed to trust keys in secondary keyring for module signing[USN-3837-1] poppler vulnerabilities
5 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-19149CVE-2018-19060CVE-2018-19059CVE-2018-19058CVE-2018-16646NULL pointer dereference when PDF references an embedded file that does not actually exist (crash -> DoS)Possible infinite recursion - DoSExit on abort - DoS2 for pdfdetach - CLI util to list / extract embedded files from PDFsOut of bounds read due to fail to validate embedded filesNULL pointer dereference if embedded file names are invalid[USN-3811-3] SpamAssassin vulnerabilities
2 CVEs addressed in Precise ESMCVE-2018-11781CVE-2018-11780SpamAssassin was updated to latest version for Trusty, Xenial and Bionic previously (Episode 11)This is the corresponding update for Precise ESM[USN-3838-1] LibRaw vulnerabilities
7 CVEs addressed in Trusty, Xenial, BionicCVE-2018-5816CVE-2018-5815CVE-2018-5813CVE-2018-5812CVE-2018-5811CVE-2018-5810CVE-2018-5807Few OOB read -> crash -> DoSNULL pointer dereference -> crash -> DoSInteger overflow -> infinite loop -> DoSInteger overflow -> divide by zero -> crash -> DoSHeap-based buffer overflow -> crash -> DoS (possible code execution?)[USN-3839-1] WavPack vulnerabilities
2 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-19841CVE-2018-19840Infinite loop if WAV file specifies a sample rate of 0 - DoSOOB read of heap allocated buffer - crash -> DoS[USN-3840-1] OpenSSL vulnerabilities
3 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-5407CVE-2018-0735CVE-2018-0734PortSmash (Episode 11) - purported new Intel CPU side-channel vulnerability -but really more an issue in OpenSSL due to needing crypto code to be both
constant time and execution flow independent of secret key
Timing side-channels in ECDSA and DSA signature algorithms found by Samuel WeiserUsual thing - variations in time-to-sign can be measured by attacker to recover private signing key[USN-3831-2] Ghostscript regression
Affecting Trusty, Xenial, Bionic, CosmicLatest GS updates (Episode 14) -> regressionwhen converting PDFs via ghostscript, would crash when using FirstPage and LastPage optionsused by imagemagick (convert) util and othersbackported addition fix from upstream to resolve this regressionGoings on in Ubuntu Security Community
Feedback
Question regarding how to ensure latest updates applied?https://help.ubuntu.com/community/AutomaticSecurityUpdatesIf regularly update system (apt upgrade / software updater etc) willalready have latest security updates
Can make this automatic with unattended-upgradesIs automatically installed and configured for Ubuntu 18.04 Bionic and newer to install new updates dailyIf want to manuallysudo apt install unattended-upgradessudo dpkg-reconfigure unattended-upgradesCanonical Livepatch Servicehttps://www.ubuntu.com/livepatchGet in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter