Overview
You can’t test your way out of security vulnerabilities (at least when writing
your code in C), plus we cover security updates for Intel Microcode, vim,
Wayland, the Linux kernel, SQLite and more.
This week in Ubuntu Security Updates
[USN-5606-2] poppler regression [00:45]
Affecting Xenial ESM (16.04 ESM), Bionic (18.04 LTS)[USN-5606-1] poppler vulnerability from Episode 177 - integer overflow inJBIG2 decoder
When backporting the series of patches, missed one that updated theCMakeLists.txt to ensure a new header file that was added as part of the
security update is actually installed by the libpoppler-dev package - without
this if installed the update and then tried to recompile something locally it
would fail
[USN-5612-1] Intel Microcode vulnerability [01:29]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-21233 Latest upstream Intel Microcode release (IPU 2022.2) - only security relevantfor SGX
[USN-5613-1, USN-5613-2] Vim vulnerabilities [01:54]
7 CVEs addressed in Trusty ESM (14.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-1621 CVE-2022-1620 CVE-2022-1619 CVE-2022-1616 CVE-2022-1420 CVE-2022-1154 CVE-2022-0943 Various buffer overflows and the like that could be triggered when editingcrafted files - have said in the past that vim is fast becoming one of the
most security-patched packages in Ubuntu - all driven by their bug-bounty
https://huntr.dev/repos/vim/vim/
[USN-5614-1] Wayland vulnerability [02:17]
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2021-3782 Reference count overflow - used a 32-bit int to count the number ofreferences - but on a 64-bit machine it is quite possible that a malicious
client could allocate a huge amount of buffers to overflow and then possibly
get a UAF - highly unlikely to be able to exploit in practice since would also
need a large number of connections to the compositor as well - fixed by
limiting the max number of objects that can be allocated
[USN-5615-1] SQLite vulnerabilities [03:01]
3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2021-20223 CVE-2020-35527 CVE-2020-35525 NULL ptr deref, OOB read, unicode parsing issue - disputed by upstream as anactual vuln
Has such a large amount of tests - https://www.sqlite.org/testing.htmlfor 151 KSLOC has 92,038 KSLOC of tests -> 608 times as much code in teststhat the actual library itself
4 different test harnesses, 100% branch coverage, OOM tests, I/O errortests, fuzz tests, boundary conditions, regression tests, valgrind, UB etc
yet still has new vulns discovered every now and thenyou can’t test your way out of security issues - at least when you writeyour code in C which has just too many different operations that have UB
you can perhaps do it via formal methods (seL4 etc) but is very expensive..$200-400/LoCeg. to formally prove SQLite would then cost ~$18.4M-$36.8Muse rust?would hopefully help at least for the first 2 issues - can still havelogic flaws and hence security vulns (eg. failing to properly validate a
TLS cert or similar)
[USN-5616-1] Linux kernel (Intel IoTG) vulnerabilities [06:00]
10 CVEs addressed in Jammy (22.04 LTS)CVE-2022-2959 CVE-2022-2873 CVE-2022-2503 CVE-2022-1973 CVE-2022-1943 CVE-2022-1852 CVE-2022-1729 CVE-2022-32296 CVE-2022-1012 CVE-2021-33061 5.15Some of these have covered previouslyIntel 10GbE PCI Express driver, IP source port randomisation failure, perfUAF, KVM NULL ptr deref, various file-system OOB R/W etc
[USN-5621-1] Linux kernel vulnerabilities [06:32]
2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)4.15 GA 18.04 LTS, HWE 16.04 ESMCVE-2022-36946 CVE-2021-33655 console framebuffer and netfilter OOB writes covered in previous episodes[USN-5622-1] Linux kernel vulnerabilities [06:57]
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2022-36946 CVE-2022-2503 CVE-2022-1729 CVE-2022-32296 CVE-2022-1012 CVE-2021-33655 5.4 GA 20.04 LTS / HWE 18.04 LTSx*** [USN-5624-1] Linux kernel vulnerabilities [07:05]
11 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-36946 CVE-2022-34495 CVE-2022-34494 CVE-2022-33744 CVE-2022-33743 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-2318 CVE-2021-33655 5.15 GA 22.04 LTS / Azure 20.04 LTS[USN-5623-1] Linux kernel (HWE) vulnerabilities [07:12]
21 CVEs addressed in Focal (20.04 LTS)CVE-2022-36946 CVE-2022-34495 CVE-2022-34494 CVE-2022-33744 CVE-2022-33743 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-2959 CVE-2022-2873 CVE-2022-26365 CVE-2022-2503 CVE-2022-2318 CVE-2022-1973 CVE-2022-1943 CVE-2022-1852 CVE-2022-1729 CVE-2022-32296 CVE-2022-1012 CVE-2021-33655 CVE-2021-33061 5.15 20.04 HWEall the vulns mentioned earlier plus a bunch in Xen (kernel side) - impactranges from crashing guest and exposing its memory to DoS services on the host
[USN-5617-1] Xen vulnerabilities [07:45]
20 CVEs addressed in Focal (20.04 LTS)CVE-2020-25604 CVE-2020-25603 CVE-2020-25602 CVE-2020-25601 CVE-2020-25600 CVE-2020-25599 CVE-2020-25597 CVE-2020-25596 CVE-2020-25595 CVE-2020-15567 CVE-2020-15566 CVE-2020-15565 CVE-2020-15564 CVE-2020-15563 CVE-2020-11743 CVE-2020-11742 CVE-2020-11741 CVE-2020-11740 CVE-2020-11739 CVE-2020-0543 Community contributed update for xen - almost wins the award for the most CVEspatched in a single update for this week
Most issues allow a malicious guest to attack the host -> DoS, privesc,code-exec etc
[USN-5619-1] LibTIFF vulnerabilities [08:17]
7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-2058 CVE-2022-2057 CVE-2022-2056 CVE-2022-1355 CVE-2022-1354 CVE-2020-19144 CVE-2020-19131 Another package vying for most security updates recentlyUsual memory corruption issues when handling crafted files - stack / heapbuffer overflows etc
[USN-5618-1] Ghostscript vulnerability [08:49]
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2020-27792 Heap buffer overflow when parsing a crafted PDF[USN-5626-1] Bind vulnerabilities [08:58]
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-38178 CVE-2022-38177 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881 CVE-2022-2795 Memory leaks when handling certain crypto algorithms with DNSSEC,resource-based DoS, buffer over-read -> info leak / crash, assertion-based
crash via crafted query
[USN-5625-1] Mako vulnerability [09:22]
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-40023 ReDoS via crafted contentGoings on in Ubuntu Security Community
Preparing for the release of Ubuntu Pro [09:44]
Team has worked on this for the last few years - finally will see the light ofday in the coming week or two - more details to come
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter