Overview
This week we look at a recent report from Elastic Security Labs on the global
Linux threat landscape, plus we look at a few of the security vulnerabilities
patched by the team in the past 7 days.
This week in Ubuntu Security Updates
[USN-5638-3] Expat vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-43680 [USN-5739-1] MariaDB vulnerabilities
36 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-32091 CVE-2022-32089 CVE-2022-32088 CVE-2022-32087 CVE-2022-32086 CVE-2022-32085 CVE-2022-32084 CVE-2022-32083 CVE-2022-32082 CVE-2022-32081 CVE-2022-27458 CVE-2022-27457 CVE-2022-27456 CVE-2022-27455 CVE-2022-27452 CVE-2022-27451 CVE-2022-27449 CVE-2022-27448 CVE-2022-27447 CVE-2022-27446 CVE-2022-27445 CVE-2022-27444 CVE-2022-27387 CVE-2022-27386 CVE-2022-27384 CVE-2022-27383 CVE-2022-27382 CVE-2022-27381 CVE-2022-27380 CVE-2022-27379 CVE-2022-27378 CVE-2022-27377 CVE-2022-27376 CVE-2022-21427 CVE-2021-46669 CVE-2018-25032 [USN-5740-1] X.Org X Server vulnerabilities
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-3551 CVE-2022-3550 [USN-5736-1] ImageMagick vulnerabilities
17 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Kinetic (22.10)CVE-2022-32547 CVE-2022-32546 CVE-2022-32545 CVE-2022-28463 CVE-2022-1114 CVE-2021-4219 CVE-2021-39212 CVE-2021-3574 CVE-2021-20313 CVE-2021-20312 CVE-2021-20309 CVE-2021-20246 CVE-2021-20245 CVE-2021-20244 CVE-2021-20243 CVE-2021-20241 CVE-2021-20224 [USN-5741-1] Exim vulnerability
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-3559 [USN-5742-1] JBIG-KIT vulnerability
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2017-9937 [USN-5743-1] LibTIFF vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2022-3970 [USN-5744-1] libICE vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2017-2626 [USN-5745-1, USN-5745-2] shadow vulnerability & regression
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2013-4235 Upstream introduced a change in file-system handling in useradd that requirednewer glibc - broke on older Ubuntu releases so that update has been reverted
for now on those releases - still is in place on Ubuntu 22.04 LTS / 22.10
[USN-5689-2] Perl vulnerability
1 CVEs addressed in Kinetic (22.10)CVE-2020-16156 [USN-5746-1] HarfBuzz vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2015-9274 [USN-5747-1] Bind vulnerabilities
2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2016-6170 CVE-2016-2775 [USN-5748-1] Sysstat vulnerability
1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-39377 [USN-5728-3] Linux kernel (GCP) vulnerabilities
12 CVEs addressed in Bionic (18.04 LTS)CVE-2022-42719 CVE-2022-40768 CVE-2022-39188 CVE-2022-3635 CVE-2022-3625 CVE-2022-3028 CVE-2022-29901 CVE-2022-2978 CVE-2022-2153 CVE-2022-20422 CVE-2022-41222 CVE-2022-42703 2 high priority vulnerabilities both found by Jann Horn (GPZ)UAF in handling of anonymous VMA mappingsUAF in memory management subsytem handling of TLBsboth could be exploited by a local attacker to crash the kernel or getpossible code execution within the kernel and hence escalate privileges
[USN-5749-1] libsamplerate vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2017-7697 [USN-5750-1] GnuTLS vulnerability
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2021-4209 [USN-5718-2] pixman vulnerability
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2022-44638 Goings on in Ubuntu Security Community
A look at Elastic Security Labs Global Threat Report
https://www.elastic.co/pdf/elastic-global-threat-report-vol-1-2022.pdfSummarises the findings of the Elastic telemetry, which incorporates data fromtheir various products like Endgame, Endpoint and Security solution.
54% of malware on Windows, 39% on Linux, 6% on MacOSOf those, top 10 are:Meterpreter, Gafgyt, Mirai, Camelot, Generic, Dofloo, BPFDoor, Ransomexx,Neshta, Getshell
We covered BPFDoor previouslyOf these 80% are trojan-based, 11% are cryptominers, 4% ransomwareTrojans commonly used to deploy stager and dropper binaries as part ofwider intrusion effort
Cryptominers generally mining Monero - mostly composed of XMRig familyAlso covers details on Windows and MacOS - interestingly Windows still haslots of CobaltStrike, Metasploit and MimiKatz which are all ostensibly
red-team tools - also see lots of keyloggers as well as credential stealers
(crypto wallets)
Mapped behaviour against MITRE ATT&CK - 34% doing defense evasion, 22%execution, 10% credential access, 8% persistence, 7% C², 6% privesc and 4%
initial access
of this, masquerading (as another legitimate process) and system binaryproxy execution (using existing system binaries to perform malicious
actions) accounts for 72% of defense evasion techniques
Then dive into more detail on execution techniques (mostly native command andscripting interpreters - think PowerShell, Windows Script Host etc) and
abusing Windows Management Instrumentation (WMI) - but won’t go too much into
this here as this is the Ubuntu Security Podcast, not Windows ;)
Also cover metrics from the various public clouds - AWS had 57% of detectionswhilst GCP and Azure each had ~22% - why does AWS have so much more? AWS has
at least ⅓ of the global cloud market share whilst Azure has 20% and GCP only
11%
Also perhaps AWS users prefer to use Elastic?Activities they see most in the clouds are Credential Access, Persistence,Defense Evasion, Initial Access
58% of initial access attempts use brute-force combined with password sprayingReport then breaks down each cloud to look at the activities mostly performed in eachAWS - access token stealing is top, Azure showed a large usage of validaccount access to then attempt to retrieve other access tokens or do
phishing, whilst for Google service account abuse was the top
Perhaps is more indicative of what each cloud is used for - ie AWS generalpurpose, whilst Azure is AD and managed services, and Google is service
workers
Finally, the report does a deep dive on 4 different threat samples and thenhas forecasts and recommendations based on those
Of these most are windows specific, but one does predict that Linux VMs usedfor backend DevOps in cloud environments will be an increased target
This is not really surprising nor novel, and most OSS devs would likelyexpect this threat given the nature of modern CI/CD pipelines and the
follow-up threat to code integrity / supply chain security etc (ie if an
attacker can compromise these machines can then tamper with source code /
build artefacts etc)
As always, requires organisations to have a good security posture and practicegood security hygiene - configure for least privilege, audit what you have,
deploy defense-in-depth solutions, monitoring and logging so can help detect
and have good incident response etc
simple things too - deploy MFA, install security updates etcGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@[email protected], @ubuntu_sec on twitter,