Overview
Microsoft’s Nimbuspwn sets the Linux security media ablaze but where
there’s smoke there’s not always fire, plus we bring you the first part of
a 2 part series looking at some of the security features in the latest
Ubuntu 22.04 LTS release.
This week in Ubuntu Security Updates
[USN-5381-1] Linux kernel (OEM) vulnerabilities
11 CVEs addressed in Focal (20.04 LTS)CVE-2022-28356 CVE-2022-27223 CVE-2022-26966 CVE-2022-26490 CVE-2022-24958 CVE-2022-1048 CVE-2022-1016 CVE-2022-1011 CVE-2022-0854 CVE-2022-0494 CVE-2022-1015 [USN-5383-1] Linux kernel vulnerabilities
8 CVEs addressed in Focal (20.04 LTS), Impish (21.10)CVE-2022-24959 CVE-2022-26878 CVE-2022-24448 CVE-2022-1016 CVE-2022-0617 CVE-2021-44879 CVE-2021-43976 CVE-2022-1015 [USN-5384-1] Linux kernel vulnerabilities
3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-24959 CVE-2022-24448 CVE-2022-0617 [USN-5385-1] Linux kernel vulnerabilities
4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2022-24959 CVE-2022-24448 CVE-2022-0617 CVE-2021-43975 [USN-5387-1] Barbican vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-23452 CVE-2022-23451 [USN-5376-2] Git vulnerability
1 CVEs addressed in Jammy (22.04 LTS)CVE-2022-24765 [USN-5388-1] OpenJDK vulnerabilities
5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-21496 CVE-2022-21476 CVE-2022-21443 CVE-2022-21434 CVE-2022-21426 [USN-5388-2] OpenJDK vulnerabilities
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-21496 CVE-2022-21476 CVE-2022-21443 CVE-2022-21434 CVE-2022-21426 CVE-2022-21449 [USN-5389-1] Libcroco vulnerabilities
4 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2020-12825 CVE-2017-8871 CVE-2017-8834 CVE-2017-7960 [USN-5390-1] Linux kernel vulnerabilities
3 CVEs addressed in Jammy (22.04 LTS)CVE-2022-26490 CVE-2022-1016 CVE-2022-1015 [USN-5376-3] Git regression
Affecting Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)[USN-5391-1] libsepol vulnerabilities
4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-36087 CVE-2021-36086 CVE-2021-36085 CVE-2021-36084 [USN-5366-2] FriBidi vulnerabilities
3 CVEs addressed in Jammy (22.04 LTS)CVE-2022-25310 CVE-2022-25309 CVE-2022-25308 [USN-5393-1] Thunderbird vulnerabilities
8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-1197 CVE-2022-28289 CVE-2022-28286 CVE-2022-28285 CVE-2022-28282 CVE-2022-28281 CVE-2022-1196 CVE-2022-1097 [USN-5371-2] nginx vulnerability
3 CVEs addressed in Jammy (22.04 LTS)CVE-2020-36309 CVE-2020-11724 CVE-2021-3618 [USN-5394-1] WebKitGTK vulnerabilities
4 CVEs addressed in Focal (20.04 LTS), Impish (21.10)CVE-2022-22637 CVE-2022-22629 CVE-2022-22628 CVE-2022-22624 [USN-5392-1] Mutt vulnerabilities
2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-1328 CVE-2021-32055 [USN-5395-1] networkd-dispatcher vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-29800 CVE-2022-29799 [USN-5396-1] Ghostscript vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2019-25059 [USN-5397-1] curl vulnerabilities
4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-27776 CVE-2022-27775 CVE-2022-27774 CVE-2022-22576 [USN-5398-1] Simple DirectMedia Layer vulnerability
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Impish (21.10)CVE-2021-33657 [USN-5399-1] libvirt vulnerabilities
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-3631 CVE-2020-25637 CVE-2022-0897 CVE-2021-4147 CVE-2021-3975 CVE-2021-3667 [USN-5400-1] MySQL vulnerabilities
23 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-21478 CVE-2022-21462 CVE-2022-21460 CVE-2022-21459 CVE-2022-21457 CVE-2022-21454 CVE-2022-21452 CVE-2022-21451 CVE-2022-21444 CVE-2022-21440 CVE-2022-21438 CVE-2022-21437 CVE-2022-21436 CVE-2022-21435 CVE-2022-21427 CVE-2022-21425 CVE-2022-21423 CVE-2022-21418 CVE-2022-21417 CVE-2022-21415 CVE-2022-21414 CVE-2022-21413 CVE-2022-21412 [USN-5400-2] MySQL vulnerabilities
6 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2022-21460 CVE-2022-21454 CVE-2022-21451 CVE-2022-21444 CVE-2022-21427 CVE-2022-21417 [USN-5390-2] Linux kernel (Raspberry Pi) vulnerabilities
3 CVEs addressed in Jammy (22.04 LTS)CVE-2022-26490 CVE-2022-1016 CVE-2022-1015 Goings on in Ubuntu Security Community
Nimbuspwn [01:46]
Nimbuspwn -https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
At the end of April Microsoft disclosed some vulnerabilities whichgathered a lot of media attention, leading to a lot of outlets seemingly
claiming most Linux systems were affected and that this was a high
severity issue
Describes a number of issues in networkd-dispatcher which could be usedto get RCE
directory traversalsymlink raceTOCTOU permissions check race conditionHowever, all relies on being able to have an arbitrary process run underthe systemd-network user (since this user is the only one which can bind
to the right dbus name org.freedesktop.network1)
Originally they provided some vague mentions of gpgv plugins and epmdrunning under this user.
gpgv plugins are launched by apt=/=apt-get during package install /upgrade so this sounds like a common scenario that would affect most
users (instead of say epmd which is the erlang port mapper daemon, so
unless you are running erland applications you would not be affected by
that)
Looking again though at these gpg plugins running as the systemd-networkuser - this is definitely not the case for standard Ubuntu - since apt is
very clear to run them under the _apt user account purposefully to
restrict their privileges
After we questioned Microsoft about this, they amended the blog post tothen just say they were able to detect several instances of other
processes running under this user in various customer environments but
then state that some of these were due to customer
misconfigurations.
So there is no real evidence here that in general Ubuntu / Linux userswould be affected as all the original media reporting suggested
Perhaps these customers were using containers and running processes inthose where the UID mapped back to the systemd-network user ID on the
host? This is a common pitfall with containers and something which users
need to be aware of when deploying containers
As such, what appeared to be quite a high priority and high profilevulnerability in fact is likely more of a bit of a non-issue - whilst it
could be argued that these are real issues in networkd-dispatcher since
they are not able to be exploited in standard configurations they are not
a real threat to most users
Interesting to note while the blog post has beenamended, all the various media articles which cited the original report
have not been updated and still seem to claim that Ubuntu and other
distros would be affected by this
Also interesting to note, Microsoft worked directly with the upstreammaintainer of networkd-dispatcher but didn’t involve any downstream
distros - as suggested by Julian Andres Klode from the Ubuntu Foundations
team (and upstream apt maintainer) - perhaps Microsoft should have
pre-disclosed this issue to the linux-distros mailing list - if they had
done so this likely would have been assessed and clarified earlier so
that Microsoft could have more properly understood the extent of the
vulnerabilities which they discovered the internet could have avoided
another brief panic scenario
What’s new in security in Ubuntu 22.04 LTS (part 1) [08:05]
Preview of the first half of blog post which will be published in thecoming weeks on the various security features which are included in
Ubuntu 22.04 LTS. This week we will look at enhancements provided by the
Linux kernel whilst next week we will look at features provided by other
parts of the distribution.
22.04 LTS latest long term support release - 5 years of standard supportplus 5 years of ESM - total 10 years of support via Ubuntu Advantage
(free for personal use)
Great foundation to use then to deploy services / applications etc andknow they will be supported for a long time to come
Has been 2 years since the last LTS so there are lots of features tocover - I will only touch on some of them - if you want a more deep dive,
check out the blog posts we published for the interim releases
Optimised kernels for different platformsOEM desktops - 5.17Desktop & server - 5.15Desktop will get HWE stack by default so in future will get kernelversion upgrades bringing new features etc whilst server will stick
with GA kernel for stability
Clouds have their own optimised kernelsHardware specific enhancementsSGX on Intel for secure enclavesMemory tagging on ARM64 to protect against memory corruption attacksAMD SEV for KVM to protect guest VM registers from the hostGeneric kernel improvementsCore scheduling to provide a means to use SMT in the face of varioushardware microarchitectural side-channel attacks like L1TF and the like
(this was only partially mitigated in SW/microcode and could still
potentially affect VMs running across SMT siblings) - so in past had to
disable SMT to be fully certain were protected - now can use core
scheduling to specify to the kernel which processes should not be
scheduled on sibling HTs to avoid these sorts of attack
Kernel stack offset randomisation across system callsBPF improvements - one of the most popular subsystems in the kernel,used not just for tracing and packet filtering but also now BPF LSM and
more use-cases. However, has also caused a number of security vulns as
covered previously - now disabled unprivileged BPF by default. Also
work has been done to try and support signed BPF programs to ensure
only trusted code is executed as well.
Landlock LSM for application-level sandboxing - like seccomp, Landlockallows a process to specify it’s own policy so can sandbox itself -
rather than say traditional MAC systems of AppArmor/SELinux where the
system admin configures the policy
LSM stacking allows Landlock to be used in conjunction with AppArmorfor a more defense-in-depth approach
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter