Overview
Ubuntu 20.04.4 LTS is released, plus we talk about Google Project Zero’s
metrics report as well as security updates for the Linux kernel, expat,
c3p0, Cyrus SASL and more.
This week in Ubuntu Security Updates
[USN-5292-2, USN-5292-3] snapd vulnerabilities [00:44]
4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Focal (20.04 LTS)CVE-2021-44731 CVE-2021-44730 CVE-2021-4120 CVE-2021-3155 Episode 149[USN-5294-1, USN-5294-2] Linux kernel vulnerabilities [01:38]
8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-22942 CVE-2022-0330 CVE-2021-43975 CVE-2021-4202 CVE-2021-4155 CVE-2021-4083 CVE-2021-39685 CVE-2021-22600 5.4 - focal GA + cloudsUsual sorts of issues - double-free (UAF) in packet network protocol, OOBR/W in USB Gadget, race condition in Unix domain sockets - UAF, XFS info
leak, NFC race -> UAF, Intel GPU TLB flush missing - DoS/RCE, VMWare vGPU
missing cleanup on errors - stale entries in fd table - info leak /
privesc
[USN-5295-1, USN-5295-2] Linux kernel (HWE) vulnerabilities [02:57]
5 CVEs addressed in Impish (21.10), Focal (20.04 LTS)CVE-2022-22942 CVE-2022-0330 CVE-2021-4155 CVE-2021-4083 CVE-2021-22600 5.13 - impish GA + focal HWE[USN-5297-1] Linux kernel (GKE) vulnerabilities [03:17]
7 CVEs addressed in Focal (20.04 LTS)CVE-2022-22942 CVE-2022-0330 CVE-2021-43975 CVE-2021-4202 CVE-2021-4155 CVE-2021-4083 CVE-2021-39685 5.4 gke specific kernel - focal + bionic[USN-5298-1] Linux kernel vulnerabilities [03:29]
12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2022-22942 CVE-2022-0330 CVE-2021-4202 CVE-2021-4155 CVE-2021-4083 CVE-2021-39685 CVE-2021-28715 CVE-2021-28714 CVE-2021-28713 CVE-2021-28712 CVE-2021-28711 CVE-2021-22600 4.15 bionic GA + xenial HWE + trusty azure[USN-5299-1] Linux kernel vulnerabilities [03:46]
13 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2021-45485 CVE-2021-42008 CVE-2021-38204 CVE-2021-3679 CVE-2021-3612 CVE-2021-3564 CVE-2021-3483 CVE-2021-34693 CVE-2021-33034 CVE-2021-28972 CVE-2021-0129 CVE-2020-26558 CVE-2020-26147 4.4 - xenial GA + trusty ESM[USN-5302-1] Linux kernel (OEM) vulnerabilities [03:57]
6 CVEs addressed in Focal (20.04 LTS)CVE-2022-24959CVE-2022-24448 CVE-2022-0435 CVE-2021-44879 CVE-2021-43976 CVE-2022-0492 5.14 - focal OEM[USN-5288-1] Expat vulnerabilities [04:12]
12 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-25236 CVE-2022-25235 CVE-2022-23990 CVE-2022-23852 CVE-2022-22827 CVE-2022-22826 CVE-2022-22825 CVE-2022-22824 CVE-2022-22823 CVE-2022-22822 CVE-2021-46143 CVE-2021-45960 XML parser written in C - used by a huge number of other applicationsfrom audacity, avahi, ceph, dbus, gdb, git, fontconfig, python, mesa,
squid and a lot more
2 possible RCE vulns - possible to inject content into XML namespacetags, and failure to validate encoding e.g. for UTF-8 in particular
contexts
critical severity according to upstream since if expat passes malformeddata back to the application could result in memory corruption etc ->
RCE (thanks to upstream for the heads-up on the possible impact of
these)
Plus a bunch of DoS and other less severe bugs fixed too (stackexhaustion, integer overflows when multi-gigabyte input is parsed etc)
[USN-5293-1] c3p0 vulnerability [05:41]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2019-5427 JDBC connection pooling librarybillion laughs attack (aka XML bomb) when parsing XML config viarecursive XML entity expansion - have one entity defined as 10 of the
previous entity - then do this 10 times - 1 billion copies of the
original entity - memory exhaustion
billion laughs comes from original PoC which used an entity called lolwhich was defined as 10 copies of lol8 which was defined as 10 copies of
lol7 etc…
[USN-5301-1, USN-5301-2] Cyrus SASL vulnerability [06:44]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-24407 SASL implementation for Cyrus IMAP server, used also by exim, ldap-utils,mutt, php, postfix and others
SQL plugin failed to properly validate input - SQL injection[USN-5300-1] PHP vulnerabilities [07:23]
6 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-21707 CVE-2017-9119 CVE-2017-9120 CVE-2017-9118 CVE-2017-8923 CVE-2015-9253 php 7 - 4 different DoS vulns, 1 memory corruption - crash/RCE and oneinfo leak
Goings on in Ubuntu Security Community
GPZ report on vulnerability metrics [07:48]
https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.htmlLooks at vulns which GPZ has reported between Jan 2019 - Dec 2021 and howfast they get patched
376 vulns351 (93%) fixed, 14 (4%) wontfix, 11 (3%) unfixed96 (26%) Microsoft, 85 (23%) Apple, 60 (16%) GoogleStrict 90-day deadline to fix and ship (with additional 14-day graceperiod)
When looking at vulns, group by Vendor - Apple, MS, Google, Linux(kernel), Adobe, Mozilla, Samsung, Oracle and Others
Others: includes both vendors: Apache, AWS, Canonical, Intel, Qualcomm,RedHat etc, but also individual OSS projects: c-ares, git, glibc,
gnupg, libseccomp, systemd and more
Time-to-patch:Linux - 25 days on averageGoogle + Others - 44 daysMozilla - 61Adobe - 65Apple - 69Microsoft - 83Oracle - 109If look by year - shows most vendors have gotten faster over time - butin particular Linux and Others are twice as fast in 2021 cf. 2019
Good news for Ubuntu users as these encompass the Linux relevant vulnsAlso look into stats on Phone - comparing iOS, Android (Samsung), Android(Google) - and all have a TTP of ~70 days
Then also dig into specifics of timelines for OSS projects, focusing onbrowsers since can break down the process into 2 discrete steps:
time from report to a public patch being availabletime from public patch to releaseAnd compare these across Chrome, WebKit and FirefoxChrome is fastest overall at 30 days total, Firefox 38 days, WebKit 73When looking at the two steps:Chrome has a very short initial patch time - 5 days - but both WebKitand Firefox are respectible with 12 and 17 days respectively
But release cycle of WebKit is so long (61 days)compared to Chrome(25) and Firefox (21) that this significantly delays the time to
fixes being available to users
Also puts them at more risk, since once a patch is publiclyavailable, it is usually not too hard to engineer a PoC for motivated
researchers, so they then have 2 months to use this on average before
it is patched
WebKit is used for all web rendering on iOS so iPhone users are thenvulnerable for quite a while no matter what browser they use -
hopefully Apple get faster at doing WebKit releases
Compared to Firefox and Chrome - both 4 week cycle nowIs not enough to develop fixes - you actually have to get them intothe hands of users to protect them
Ubuntu 20.04.4 LTS Released [15:27]
https://lists.ubuntu.com/archives/ubuntu-announce/2022-February/000277.htmlThe Ubuntu team is pleased to announce the release of Ubuntu 20.04.4 LTS
(Long-Term Support) for its Desktop, Server, and Cloud products, as well
as other flavours of Ubuntu with long-term support.
Like previous LTS series, 20.04.4 includes hardware enablement stacks
for use on newer hardware. This support is offered on all architectures.
Ubuntu Server defaults to installing the GA kernel; however you may
select the HWE kernel from the installer bootloader.
As usual, this point release includes many updates, and updated
installation media has been provided so that fewer updates will need to
be downloaded after installation. These include security updates and
corrections for other high-impact bugs, with a focus on maintaining
stability and compatibility with Ubuntu 20.04 LTS.
Kubuntu 20.04.4 LTS, Ubuntu Budgie 20.04.4 LTS, Ubuntu MATE 20.04.4 LTS,
Lubuntu 20.04.4 LTS, Ubuntu Kylin 20.04.4 LTS, Ubuntu Studio 20.04.4 LTS,
and Xubuntu 20.04.4 LTS are also now available. More details can be found
in their individual release notes:
https://wiki.ubuntu.com/FocalFossa/ReleaseNotes#Official_flavours
Maintenance updates will be provided for 5 years for Ubuntu Desktop,
Ubuntu Server, Ubuntu Cloud, and Ubuntu Core. All the remaining
flavours will be supported for 3 years. Additional security support is
available with ESM (Extended Security Maintenance).
https://wiki.ubuntu.com/FocalFossa/ReleaseNoteshttps://wiki.ubuntu.com/FocalFossa/ReleaseNotes/ChangeSummary/20.04.4Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter