Overview
This week we investigate the mystery of failing GPG signatures for the 16.04 ISO
images, plus we look at security updates for CUPS, Avahi, the Linux kernel, FRR,
This week in Ubuntu Security Updates
[USN-6128-1, USN-6128-2] CUPS vulnerability (00:56)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-32324 Heap buffer overflow when printing debug messages - apparently requirescupsd.conf to have LogLevel as debug which is not usually the case
[USN-6129-1] Avahi vulnerability (01:39)
1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-1981 DoS -> if called with an unknown service name, would result in a NULL pointerdereference and crash - found via dfuzzer - a fuzzer for D-Bus services
[USN-6130-1] Linux kernel vulnerabilities (02:23)
4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)CVE-2023-1380 CVE-2023-30456 CVE-2023-31436 CVE-2023-32233 4.15 GA for 18.04 ESM (generic, virtual, lowlatency, KVM, AWS, Snapdragon, Azure, GCP, Oracle)HWE + GCP, Azure, GKE, AWS etc for 16.04 ESMAzure for 14.04 ESMrace condition -> UAF -> privesc in netfilter[USN-6122-1] Linux kernel (OEM) vulnerabilities from Episode 197KVM mishandling of control registers for nested guest VMs[USN-6123-1] Linux kernel (OEM) vulnerabilities from Episode 197OOB read in the USB handling code for Broadcom FullMAC USB WiFi driver -requires an attacker to create a malicious USB device and insert that into
your machine to be able to trigger (shout out to USBGuard)
OOB write in network queuing scheduler - able to be triggered though anunprivileged user namespace (again)
[USN-6127-1] Linux kernel vulnerabilities (04:41)
5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)CVE-2023-2612 CVE-2023-1380 CVE-2023-30456 CVE-2023-31436 CVE-2023-32233 5.1522.10 GA (virtual, raspi, generic, aws, lowlatency, ibm, azure, gcp, oracle, kvm, aws)22.04 HWE (ditto)20.04 HWE (ditto + OEMs)Same as above plus a race condition in shiftfs -> kernel deadlock -> DoS[USN-6135-1] Linux kernel (Azure CVM) vulnerabilities (05:06)
5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2023-2612 CVE-2023-1380 CVE-2023-30456 CVE-2023-31436 CVE-2023-32233 5.15 Azure FDE (22.04, 20.04)[USN-6131-1] Linux kernel vulnerabilities (05:18)
5 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2023-2612 CVE-2023-1380 CVE-2023-30456 CVE-2023-31436 CVE-2023-32233 5.4 GA 20.04, HWE 18.04[USN-6132-1] Linux kernel vulnerabilities (05:30)
13 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2023-1118 CVE-2023-32269 CVE-2023-2612 CVE-2023-2162 CVE-2023-1513 CVE-2023-1078 CVE-2023-1075 CVE-2023-0459 CVE-2022-3707 CVE-2023-1380 CVE-2023-30456 CVE-2023-31436 CVE-2023-32233 5.4 (20.04 bluefield, 18.04 AWS)[USN-6133-1] Linux kernel (Intel IoTG) vulnerabilities (05:42)
12 CVEs addressed in Jammy (22.04 LTS)CVE-2023-1118 CVE-2023-32269 CVE-2023-2162 CVE-2023-20938 CVE-2023-1872 CVE-2023-1513 CVE-2023-1078 CVE-2023-1075 CVE-2023-0459 CVE-2022-3707 CVE-2022-27672 CVE-2023-1829 5.15 Intel IoTG[USN-6134-1] Linux kernel (Intel IoTG) vulnerabilities
24 CVEs addressed in Focal (20.04 LTS)CVE-2023-1118 CVE-2023-32269 CVE-2023-26545 CVE-2023-2162 CVE-2023-21102 CVE-2023-20938 CVE-2023-1872 CVE-2023-1652 CVE-2023-1513 CVE-2023-1078 CVE-2023-1075 CVE-2023-1074 CVE-2023-1073 CVE-2023-0459 CVE-2023-0458 CVE-2023-0394 CVE-2022-4842 CVE-2022-47929 CVE-2022-4129 CVE-2022-3707 CVE-2022-27672 CVE-2023-0386 CVE-2023-1281 CVE-2023-1829 5.15 Intel IoTG as well[USN-6112-2] Perl vulnerability (05:54)
1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-31484 [USN-6112-1] Perl vulnerability from Episode 197failed to properly validate TLS certs when using CPAN and HTTP::Tiny[USN-6136-1] FRR vulnerabilities (06:19)
2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-31490 CVE-2023-31489 Implements BGP, OSPF, RIP, IS-IS, PIM and more - successor to QuaggaTwo issues in BGP handling - both OOB reads due to failing to use the rightlengths when reading packet structures, implemented in C
[USN-6137-1] LibRaw vulnerabilities (06:43)
2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-1729 CVE-2021-32142 Heap buffer overflow and stack buffer overflow (mitigated by stack protectoretc)
[USN-6138-1] libssh vulnerabilities (07:01)
2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-2283 CVE-2023-1667 NULL ptr deref during re-keying - already authenticated user could trigger a DoSPossible for a client to avoid having its signature fully verified IF duringthe verification process there is insufficient memory - fails, leaves in error
state that then falls though to an OK state
[USN-6139-1] Python vulnerability (07:37)
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)CVE-2023-24329 [USN-5960-1] Python vulnerability from Episode 191 - original upstream fix wasincomplete
[USN-6140-1] Go vulnerabilities (07:57)
8 CVEs addressed in Kinetic (22.10), Lunar (23.04)CVE-2023-29400 CVE-2023-24540 CVE-2023-24539 CVE-2023-24538 CVE-2022-41725 CVE-2023-24537 CVE-2023-24534 CVE-2022-41724 Various content injection issues in JS, CSS and HTML template handling due tofailing to properly parse various delimiting elements (like backtick ` for JS
etc)
Also two DoS since could trigger a panic due to mishandling of memory[USN-6141-1] xfce4-settings vulnerability (08:31)
1 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)CVE-2022-45062 MIME helper failed to properly parse input - is called via xdg-open - so couldcall xdg-open with crafted input that would then get passed through to
whatever application (like say the browser / file manager etc) and hence could
run these other applications with arbitrary arguments - e.g. could embed a
link in a PDF and when the user clicks this can then get say the browser to be
launched with arbitrary arguments
e.g. could set the --remote-allow-origins flag to specify an attackercontrolled domain which is then allowed to connect to the local debugging port
and hence execute arbitrary JS on any other domain - steal creds etc
[USN-6142-1] nghttp2 vulnerability (10:16)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2020-11080 C library for HTTP/2Overly large SETTINGS frames would cause a CPU-based DoS - mitigated bysetting a max limit for these frame types and rejecting if too large
[USN-6143-1] Firefox vulnerabilities (10:50)
4 CVEs addressed in Focal (20.04 LTS)CVE-2023-34415 CVE-2023-34417 CVE-2023-34416 CVE-2023-34414 114.0 release[USN-6144-1] LibreOffice vulnerabilities (10:59)
2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2023-2255 CVE-2023-0950 Array index underflow in handling of crafted formulas in Calc - memory corruption -> RCEFailed to prompt user before loading a document into an IFrame - document can then contain other elements like JS etc that get executed[USN-6028-2] libxml2 vulnerabilities (11:35)
3 CVEs addressed in Lunar (23.04)CVE-2023-29469 CVE-2023-28484 CVE-2022-2309 2 different NULL ptr deref, possible double freeDoS / RCE via crafted XML documentsGoings on in Ubuntu Security Community
Recent report of invalid GPG signatures on 16.04 ISOs (12:04)
https://discourse.ubuntu.com/t/is-ubuntu-vulnerable-to-fake-keys/21997/4User reported that the SHA256SUMS file for 16.04 ISOs onold-releases.ubuntu.com failed to validate
Sounds scary - has the server been hacked and the ISOs (and hence SHA256SUMSfile) been tampered with?
We don’t sign the ISOs directly - instead (like apt) we take a hash of the ISOfile and then sign the file containing that list of hashes - for performance
So in this case, it would appear that the SHA256SUMS file has been modifiedand so does not validate properly
One other thing to note, this report was made in a follow-up comment to anolder thread where someone mentioned that they are able to upload arbitrary
keys to the ubuntu keyserver that mimic the archive / CD image signing keys
etc - this is the nature of key servers - anyone can upload any key with any
arbitrary identifiers - but since keys are generated from randomness, it is
theoretically impossible to generate a key with the same underlying
cryptographic fingerprint (even if it has the same name / email address
associated with it)
Always important to make sure you use the right keys - as identified by theirfingerprint - these are listed on the wiki
https://wiki.ubuntu.com/SecurityTeam/FAQ#GPG_Keys_used_by_Ubuntu
These keys are also contained on all Ubuntu installs within the/usr/share/keyrings/ubuntu-archive-keyring.gpg file from the ubuntu-keyring
package
Able to easily verify this behaviour locally:wget -q https://old-releases.ubuntu.com/releases/xenial/SHA256SUMS{,.gpg}
gpg --verify --no-default-keyring --keyring=/usr/share/keyrings/ubuntu-archive-keyring.gpg --verbose SHA256SUMS.gpg SHA256SUMS
gpg: Signature made Fri 01 Mar 2019 02:56:07 ACDT
gpg: using DSA key 46181433FBB75451
gpg: Can't check signature: No public key
gpg: Signature made Fri 01 Mar 2019 02:56:07 ACDT
gpg: using RSA key D94AA3F0EFE21092
gpg: using pgp trust model
gpg: BAD signature from "Ubuntu CD Image Automatic Signing Key (2012) " [unknown]
gpg: binary signature, digest algorithm SHA512, key algorithm rsa4096
So far so scary - it really does look like the SHA256SUMS file was modifiedBut if we look closer, we can see GPG says the signature was made on 28thFebruary 2019 - this corresponds with the 16.04.6 point release - yet the most
recent point release was 16.04.7 from 13th August 2020 for BootHole (Alex and
Joe take an in-depth and behind-the-scenes look at BootHole / GRUB from
Episode 84) - so it appears that perhaps the various signature files were
not regenerated when the 16.04.7 point release was made (yet the various SUMS
files were)
Marc went asking around, vorlon from Foundations confirmed this was the caseSimply had to run the script to resign this and push it to the server - nowall is good as can be seen below
gpg: Signature made Fri 09 Jun 2023 00:38:30 ACST
gpg: using RSA key 843938DF228D22F7B3742BC0D94AA3F0EFE21092
gpg: using pgp trust model
gpg: Good signature from "Ubuntu CD Image Automatic Signing Key (2012) " [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 8439 38DF 228D 22F7 B374 2BC0 D94A A3F0 EFE2 1092
gpg: binary signature, digest algorithm SHA512, key algorithm rsa4096
Thanks to the anonymous user in the Ubuntu Discourse for bringing this to ourattention
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@[email protected], @ubuntu_sec on twitter