Overview
The Linux kernel.org CNA has assigned their first CVEs so we revisit this topic
to assess the initial impact on Ubuntu and the CVE ecosystem, plus we cover
security updates for Roundcube Webmail, less, GNU binutils and the Linux kernel
This week in Ubuntu Security Updates
[USN-6647-1] Linux kernel vulnerabilities (01:14)
3 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM)CVE-2023-7192 CVE-2023-51782 CVE-2023-51780 4.15 - AWS/Azure/GCP/HWE/KVM/OracleMemory leak in netfilter able to be abused via an unprivileged usernamespace - DoS via exhausting system memory
[USN-6648-1] Linux kernel vulnerabilities (02:00)
4 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2024-0646 CVE-2024-0565 CVE-2023-6915 CVE-2023-51781 5.4 - IOT/Xilinx ZynqMP/IBM/Bluefield/GKEOP/Raspi/KVM/Oracle/AWS/GCP/Generic/LowLatency/OEMOOB write in KTLS reported by Jann Horn - if a user can get the kernel tosplice a ktls socket can possibly escalate privileges
UAF in AppleTalk network driver - could be abused by a local unprivilegeduser - can be mitigated by blocklisting in /etc/modprobe.d/blacklist-rare-network.conf
# appletalk
alias net-pf-5 off
[USN-6650-1] Linux kernel (OEM) vulnerability (03:30)
1 CVEs addressed in Jammy (22.04 LTS)CVE-2023-6915 NULL ptr deref in generic ID allocator[USN-6651-1] Linux kernel vulnerabilities (03:38)
6 CVEs addressed in Jammy (22.04 LTS), Mantic (23.10)CVE-2024-0646 CVE-2024-0582 CVE-2024-0565 CVE-2023-6915 CVE-2023-51781 CVE-2023-51780 ktls + appletalk[USN-6653-1] Linux kernel vulnerabilities
5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2024-0646 CVE-2024-0565 CVE-2023-6915 CVE-2023-51781 CVE-2023-51780 ktls + appletalk[USN-6652-1] Linux kernel (Azure) vulnerabilities (03:47)
15 CVEs addressed in Mantic (23.10)CVE-2024-0646 CVE-2024-0641 CVE-2024-0582 CVE-2024-0565 CVE-2023-6915 CVE-2023-6622 CVE-2023-6531 CVE-2023-6176 CVE-2023-5972 CVE-2023-51781 CVE-2023-51780 CVE-2023-46862 CVE-2023-46813 CVE-2023-35827 CVE-2023-34324 ktls + appletalk + NULL ptr deref in TLS impl ([LSN-0100-1] Linux kernel vulnerability from Episode 219)[USN-6649-1] Firefox vulnerabilities (04:14)
12 CVEs addressed in Focal (20.04 LTS)CVE-2024-1556 CVE-2024-1552 CVE-2024-1551 CVE-2024-1546 CVE-2024-1557 CVE-2024-1555 CVE-2024-1554 CVE-2024-1553 CVE-2024-1550 CVE-2024-1549 CVE-2024-1548 CVE-2024-1547 123.0[USN-6654-1] Roundcube Webmail vulnerability (04:35)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2023-43770 XSS able to abused by simple text/plain emails with crafted links - includedthe ability to detect link references like [1] and linkify them to the
source - if an attacker used a form like [] this would be
included in the generated HTML without escaping and so could get arbitrary XSS
Since is in universe, this update is available via Ubuntu Pro[USN-6655-1] GNU binutils vulnerabilities (05:54)
3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-48065 CVE-2022-48063 CVE-2022-47695 3 instances of DoS via excessive memory consumption, one of NULL ptr deref -in general upstream does not consider binutils safe for analysing untrusted
inputs
[USN-6656-1] PostgreSQL vulnerability (06:31)
1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2024-0985 Failed to properly drop privileges when handling REFRESH MATERIALIZED VIEW CONCURRENTLY commands - should drop privileges so that the SQL is executed asthe owner of the materialized view - as such, if an attacker could get a user
or automated system to run such a command they could possibly execute
arbitrary SQL as the user rather than as the owner of the view as expected
[USN-6657-1] Dnsmasq vulnerabilities (07:10)
3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2023-28450 CVE-2023-50868 CVE-2023-50387 KeyTrap and NSEC3 proof related vuln in DNSSEC - [USN-6633-1] Bindvulnerabilities from Episode 219
[USN-6658-1] libxml2 vulnerability (07:33)
1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2024-25062 UAF if using DTD validation with XInclude expansion enabled[USN-6659-1] libde265 vulnerabilities (07:52)
13 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2023-24758 CVE-2023-24757 CVE-2023-24756 CVE-2023-24755 CVE-2023-24754 CVE-2023-24752 CVE-2023-24751 CVE-2022-43245 CVE-2023-25221 CVE-2022-47665 CVE-2022-43250 CVE-2022-43249 CVE-2022-43244 Next lot of libde265 vulns after discussed previously in[USN-6627-1] libde265 vulnerabilities from
Episode 219 - more fuzzing related fixes for usual sorts of issues
[USN-6660-1, USN-6661-1] OpenJDK 11 & 17 vulnerabilities (08:17)
6 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2024-20952 CVE-2024-20945 CVE-2024-20926 CVE-2024-20921 CVE-2024-20919 CVE-2024-20918 11.0.22; 17.0.10[USN-6662-1] OpenJDK 21 vulnerabilities
5 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2024-20952 CVE-2024-20945 CVE-2024-20921 CVE-2024-20919 CVE-2024-20918 21.0.2[USN-6305-2] PHP vulnerabilities (08:37)
2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2023-3824 CVE-2023-3823 [USN-6663-1] OpenSSL update (08:40)
Affecting Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)Hardening update for openssl 3.0 / 1.0 - OpenSSL 3.2.0 introduced a change toreturn random output instead of an exception when it detected wrong padding
for PKCS#1 v1.5 encryption - without this there is a timing side-channel which
can be used to infer the secret key and hence break confidentiality
[USN-6664-1] less vulnerability (09:40)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2022-48624 Failed to quote filenames when using LESSCLOSE - could then get arbitraryshell commands - env var that tells less to invoke a particular command as an
input post-processor (this is used in conjunction with LESSOPEN to
pre-processor the file before it is displayed by less - for instance, if you
wanted to use less to page through a HTML file you might perhaps use this to
run it via html2text first - then use LESSCLOSE to do any cleanup)
[USN-6644-2] LibTIFF vulnerabilities (10:51)
3 CVEs addressed in Jammy (22.04 LTS)CVE-2023-6277 CVE-2023-6228 CVE-2023-52356 Heap buffer overflow in libtiff itself, plus a heap buffer overflow in thetiffcp tool (used to combine multiple TIFF files into a single one) and
finally a possible OOM issue in libtiff if an input file specified a very
large size but then failed to actually contain such data (ie the headers
specify a certain size but the file itself doesn’t contain that amount of
data)
Goings on in Ubuntu Security Community
Follow up to Linux kernel CNA (11:40)
Since announcing kernel.org has now started assigning CVEsFirst CVE assignedhttps://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/T/#uCVE-2023-52433: netfilter: nft_set_rbtree: skip sync GC for new elements in this transactionCVE-2023-52433Assigned on 2024-02-20 12:53 UTCBoth historical and recent40 from 202466 from 20231 from 2022165 from 202113 from 20203 from 2019As of Fri 01 Mar 2024 04:04:26 UTC have assigned 288 CVEs9 days, 15 hours and 11 minutes or so231 hoursCurrently assigning more than 1 CVE per hourLooking at these, 8 appear to be due to reported issues from Coverity -popular static analysis tool which is not infallible. Others appear to come
directly from the GSD project (Global Security Database)
e.g. CVE-2019-25160(https://lore.kernel.org/linux-cve-announce/2024022657-CVE-2019-25160-e487@gregkh/T/#u)
is the same as GSD-2022-1001715
As I mentioned in Episode 219, GSD has over 13573 Linux kernel issuesWhilst I also said that I hoped that the kernel CNA wouldn’t be so much of afirehose, currently it seems to be quite significant
On a personal note - I have been doing the CVE Triage role on our team thisweek - in past weeks, I would normally spend about 30-minutes to 1 hour each
day doing this - and this week it has been at least 2 hours each day, mostly
due to the large influx of kernel CVEs
Perhaps the only way to solve this is better tooling - on our side, mdeslauradded support for automatically extracting the required git commits from the
CVE notifications and the kernel team already has tooling which checks if the
required commits are in the git trees of the various Ubuntu kernels
Hopefully that helps - but it doesn’t help to assign priorities to each CVEThe kernel CNA is not assigning CVSS scores and they don’t intend to -although my understanding is this is required - and so we can’t use this to help
So then we need to try and manually assess the impact of each CVE - but eventhe kernel CNA says this is not obvious - so then perhaps the solution is to
just assign them all to medium and deal with them as part of the usual kernel
SRU cycle
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@[email protected], @ubuntu_sec on twitter