Overview
This week we bring you part 2 of our look at the new Ubuntu 22.04 LTS
release and what’s in it for security, plus we cover security updates for
DPDK, OpenSSL, Cron, RSyslog, Curl and more.
This week in Ubuntu Security Updates
[USN-5401-1] DPDK vulnerabilities [00:54]
2 CVEs addressed in Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-0669 CVE-2021-3839 Data-plane development kit (provides TCP offloading to userspace toaccelerate package processing workloads)
Used by openvswitch for OpenStack software defined networkingOOB write due to missing check on queue length in vhost comms - couldallow a malicious guest to crash or get code execution on the host
Also fixed a possible DoS attack between a malicious vhost-user primaryand secondary where the primary can spam the secondary with with a huge
number of open file-descriptors which eventually leads the secondary to
exhaust it’s fd limit and hence DoS
[USN-5402-1] OpenSSL vulnerabilities [01:36]
4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-1473 CVE-2022-1434 CVE-2022-1343 CVE-2022-1292 All 4 affect 22.04 whilst only one affects the older releases - in thiscase if running 22.04, exposed to 4 vulns whilst for the older releases
only 1
Would be interesting to try and compare number of CVEs over thelifetime of a piece of software - if always running the latest version
do you get exposed to more and more CVEs each time you upgrade? Is it
better to stick with older software since the rate of vulns found over
time likely decreases as it gets older…
Anyway, of these vulns 1 is a memory leak during certificate decodingwhich could usually affect something like an TLS server which uses client
certs for authentication, plus a possible MiTM attack against RC4-MD5,
incorrect return code when validating OCSP messages which could cause a
user / application to believe was valid when in fact was not plus
possible code execution via the c_rehash script through
shell-metacharacters - but no privilege escalation so only get whatever
privileges the script is executing under (c_rehash is used to create
symlinks named as the hashes of certs etc when importing a cert into a
cert store so it can then easily be looked up via it’s hash value as the
filename)
[USN-5395-2] networkd-dispatcher regression [03:44]
2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-29800 CVE-2022-29799 Episode 158 - upstream fix contained a small regression where an errorwould be encountered under certain situations
[USN-5354-2] Twisted vulnerability [04:06]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Jammy (22.04 LTS)CVE-2022-21716 Episode 156 - Equivalent update for ESM releases plus latest Ubuntu LTS release[USN-5403-1] SQLite vulnerability [04:20]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2021-36690 Crash / possible code execution in CLI client when using a craftedquery - upstream dispute this as an actual vuln since if can execute
sqlite cli then can already execute arbitrary commands
[USN-5405-1] jbig2dec vulnerabilities [04:40]
2 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2020-12268 CVE-2017-9216 used in ghostscript, mupdf and others for handling JBIG2 filesNULL ptr dereference -> crash -> DoSHeap buffer overflow -> crash / code execution[USN-5259-2] Cron vulnerabilities [04:58]
4 CVEs addressed in Bionic (18.04 LTS)CVE-2019-9706 CVE-2019-9705 CVE-2019-9704 CVE-2017-9525 DoS via a very large crontab file with many many lines or very long linesUbuntu specific vuln allowing possible privesc from crontab group to rootwhen the crontab package is upgraded via a symlink attack - so in general
was a dormant / latent vuln that would only be able to be triggered if a
sysadmin manually reinstalled cron or we released a new update 😁 - so
fixed now
[USN-5259-3] Cron regression [05:47]
4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2019-9706 CVE-2019-9705 CVE-2019-9704 CVE-2017-9525 but unfortunately caused a minor regression where some harmless butpossibly scary looking error messages would be printed when cron was
upgraded - fixed with this further update
[USN-5404-1] Rsyslog vulnerability [05:57]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-24903 Potential heap buffer overflow in TCP syslog reception - so a malicioushost which is logging to a centralized syslog server could possibly crash
or get code execution on the server (as the syslog user only)
[USN-5244-2] DBus vulnerability [06:18]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-35512 Possible UAF when running on a system where multiple usernames are mappedto the same UID - if policy references these usernames, may free it via
one username whilst it is still being accessed by the other
Not really likely to encounter this setup or be able to easily exploit it[USN-5179-2] BusyBox vulnerability [07:03]
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-28831 Episode 141[USN-5407-1] Cairo vulnerabilities [07:10]
4 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2020-35492 CVE-2019-6462 CVE-2017-9814 CVE-2016-9082 2 OOB reads, stack buffer overflow and infinite loop in handling ofcrafted image / font files
[USN-5408-1] Dnsmasq vulnerability [07:24]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-0934 Heap-based UAF found by oss-fuzz when handling malicious DHCPv6 requests[USN-5409-1] libsndfile vulnerability [07:46]
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-4156 OOB read in FLAC codec -> crash / possible info leak[USN-5410-1] NSS vulnerability [07:54]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-25648 Mishandled ChangeCipherSpec messages in TLS 1.3 - remote client couldcrash a server by sending multiple of these
[USN-5411-1] Firefox vulnerabilities [08:06]
8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10)CVE-2022-29918 CVE-2022-29917 CVE-2022-29916 CVE-2022-29915 CVE-2022-29914 CVE-2022-29912 CVE-2022-29911 CVE-2022-29909 100.0 - usual mix of issues for web browsers/rendering engines (XSS, RCE,DoS, bypass permission checks etc)
[USN-5412-1] curl vulnerabilities [08:24]
3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)CVE-2022-27782 CVE-2022-27781 CVE-2022-27780 More curl vulns - seems to be more every 5-10 weeks or so lately -fuzzing?
logic error on connection reuse could reuse an old connection afterparameters had been changed
Possible infinite loop when constructing a server’s TLS cert chain ->DoS
incorrect handling of %-encoded URL separators - could parse URLwrongly and so end up visiting wrong URL or bypassing access checks /
filters etc
curl is part of hackerone and has so far paid out $17k USD in bountiesWhilst preparing this week’s episode 6 more vulns were announced in curlInteresting twitter thread from curl maintainer on the ratio of vulnswhich are due to C mistakes vs general programming logic mistakes -
general mistakes higher so I assume this is used as an argument as to why
implementing such a ubiquitous piece of software in such an unsafe
language is “ok” - can’t say I agree
Also compared how long it takes to find vulns from C mistakes vs non-Cmistakes - non-C mistakes take longer to find, presumably due to lack of
good tools for finding them (compared to say UBSan, Coverity etc for
finding C specific mistakes)
Goings on in Ubuntu Security Community
What’s new in security in Ubuntu 22.04 LTS (part 2) [11:35]
In part 1 we covered new security features in the kernelThis week we look at userspace security improvementsOpenSSL 3disables a lot of legacy algorithms by default, upstream have amigration guide which explains the main changes from 1.1.1 as well
as how to enable the legacy provider if you still require access to
them
Default security level is still 2 but it now disables (D)TLS 1.2protocols (and below)
openssh 8.9Lots of changes since 8.2 in 20.04 LTS, but in particular hasimproved handling of FIDO/U2F hardware tokens - openssh in 20.04 LTS
first introduced support for FIDO/U2F tokens as 2FA for remote SSH
logins - basically would generate a new openssh key where the private
half of the key is only accessible with the FIDO/U2F token - this new
release brings support for using a PIN with the token and much better
improved UX so that users don’t have to keep getting prompted for
their PIN each time. Plus supports verifying WebAuthn signatures
nftables as default firewall backendfirewalling on Linux has 2 components - kernel-space mechanism anduserspace tooling to control that
traditionally kernel supported iptables (aka xtables - ip,ip6,arp,eb -tables)nftables as introduced into the kernel in 3.13 as a new mechanism toimplement network packet classification and handling - aka firewalling
etc
kernel has 2 mechanisms then - xtables and nftablesuserspace then has 2 primary tools for handling these - iptables forxtables and nftables (nft) for nftables
iptables userspace added a nft backend so existing iptables rules andusers would be switched to that automatically - so can still use
traditional iptables command to configure firewall rules etc but they
will then be loaded into the kernel’s nft backend rather than xtables
also has a separate userspace command nft to directly configure nftbackend which supports more advanced rule types
Need to be careful that all tools which configure firewall rules usethe same backend in the kernel otherwise they may conflict and get
weird results
gcc 11 with improved static analysis via -fanalyzerDouble free, UAF, free of non-heap memory, malloc leak, NULL ptrderef, unsafe calls within signal handlers and more
bash 5.1 - $SRANDOM vs $RANDOMRANDOM is a psuedo-random number which comes internally from bash andhence is deterministic based on the original seed value
SRANDOM is derived from the kernel’s /dev/urandom and hence is notreproducible / deterministic - ie. is actually more truly random
Private home directories by defaultGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter