Overview
A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds this
week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
Roundcube, the Linux kernel and more.
This week in Ubuntu Security Updates
175 unique CVEs addressed
[USN-6842-1] gdb vulnerabilities (01:10)
6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2023-39130 CVE-2023-39129 CVE-2023-39128 CVE-2023-1972 CVE-2022-4285 CVE-2020-16599 a couple of these are inherited from binutils as they share that code -parsing of crafted ELF executables -> NULL ptr deref or possible heap based
buffer overflow -> DoS/RCE
other stack and heap buffer overflows as well - parsing of crafted ada filesand crafted debug info files as well -> DoS/RCE
[USN-6845-1] Hibernate vulnerability (02:12)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)CVE-2020-25638 Object relational-mapping (ORM) library for JavaSQL injection in the JPA Criteria API implementation - could allow unvalidatedliterals when they are used in the SQL comments of a query when logging is
enabled - fixed by properly escaping comments in this case
[USN-6846-1] Ansible vulnerabilities (02:46)
2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2023-5764 CVE-2022-3697 Possibly would leak the password into log file when using the AWS EC2 modulesince failed to validate the tower_callback (nowadays is called aap_callback -
Ansible Automation Platform) parameter appropriately
Allows to mark variables as unsafe - in that they may come from an external,untrusted source - won’t get evaluated/expanded when used to avoid possible
info leaks etc - various issues where ansible would fail to respect this and
essentially forget they were tagged as unsafe and end up exposing secrets as a
result
[USN-6844-1] CUPS vulnerability (04:08)
1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)CVE-2024-35235 When starting, cups would arbitrarily chmod the socket specified as the Listenparameter to make it world-writable - if this was a symlink, would then make
the target of the symlink world-readable - in general the cups config file is
only writable by root so requires some other vuln to be able to exploit it
where you can get write access to the config file to exploit it OR be able to
replace the regular cups socket path with a user-controlled symlink - but if
you can, then you can even change the cups config itself to be world-writable
and hence modify other parameters like the user and group that cups should run
as, as well as a crafted FoomaticRIPCommandLine then can run arbitrary commands
as root
[USN-6849-1] Salt vulnerabilities (06:20)
2 CVEs addressed in Trusty ESM (14.04 ESM)CVE-2020-11652 CVE-2020-11651 Failed to properly validate paths in some methods and also failed to restrictaccess to other methods, allowing them to be used without authentication -
could then either allow arbitrary directory access or the ability to retrieve
tokens from the master or run arbitrary commands on minions
[USN-6746-2] Google Guest Agent and Google OS Config Agent vulnerability (06:44)
1 CVEs addressed in Noble (24.04 LTS)CVE-2024-24786 A vuln in the embedded golang protobuf module - when parsing JSON could end upin an infinite loop -> DoS
[USN-6850-1] OpenVPN vulnerability (07:04)
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)CVE-2022-0547 [USN-5347-1] OpenVPN vulnerability from Episode 155 - possibly gets confusedwhen using multiple authentication plugins and deferred authentication
[USN-6847-1] libheif vulnerabilities (07:36)
8 CVEs addressed in Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2023-49464 CVE-2023-49463 CVE-2023-49462 CVE-2023-49460 CVE-2023-29659 CVE-2023-0996 CVE-2020-23109 CVE-2019-11471 First time to mention libheif on the podcast - High Efficiency Image FileFormat - part of the MPEG-H standard - container format used to store images
or sequences of images
Commonly seen due to its use by Apple for images on iPhoneC++ - usual types of issuesUAF, buffer overflows, floating point exception etcmost found through fuzzing[USN-6848-1] Roundcube vulnerabilities (08:21)
4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)CVE-2024-37384 CVE-2024-37383 CVE-2023-47272 CVE-2023-5631 webmail front-end for IMAP2 different possible XSS issues due to mishandling of SVG - email containingan SVG could embed JS that then gets loaded when the email is viewed
Also possible XSS through a crafted user preference value - similarly througha crafted Content-Type/Content-Disposition header which can be used for
attachment preview/download
[USN-6819-4] Linux kernel (Oracle) vulnerabilities (09:21)
149 CVEs addressed in Jammy (22.04 LTS)CVE-2024-26631 CVE-2023-52694 CVE-2023-52685 CVE-2023-52682 CVE-2024-35835 CVE-2023-52446 CVE-2023-52487 CVE-2023-52619 CVE-2023-52627 CVE-2023-52674 CVE-2024-26598 CVE-2023-52679 CVE-2023-52455 CVE-2024-26671 CVE-2023-52444 CVE-2023-52683 CVE-2023-52690 CVE-2024-35842 CVE-2023-52610 CVE-2024-26607 CVE-2023-52445 CVE-2023-52497 CVE-2023-52488 CVE-2024-26623 CVE-2023-52607 CVE-2023-52677 CVE-2023-52457 CVE-2024-26673 CVE-2024-26594 CVE-2024-26638 CVE-2023-52621 CVE-2023-52594 CVE-2023-52468 CVE-2024-26647 CVE-2023-52492 CVE-2023-52452 CVE-2024-26615 CVE-2023-52448 CVE-2023-52698 CVE-2023-52443 CVE-2023-52614 CVE-2023-52494 CVE-2024-35837 CVE-2024-26582 CVE-2023-52632 CVE-2023-52680 CVE-2023-52595 CVE-2023-52626 CVE-2023-52495 CVE-2023-52451 CVE-2023-52583 CVE-2023-52469 CVE-2023-52584 CVE-2023-52450 CVE-2024-26608 CVE-2023-52609 CVE-2023-52464 CVE-2023-52591 CVE-2024-26645 CVE-2024-35838 CVE-2023-52470 CVE-2023-52456 CVE-2023-52589 CVE-2024-26585 CVE-2023-52696 CVE-2023-52633 CVE-2023-52462 CVE-2023-52597 CVE-2023-52587 CVE-2024-26584 CVE-2024-26636 CVE-2023-52491 CVE-2023-52493 CVE-2024-26627 CVE-2023-52465 CVE-2023-52687 CVE-2023-52593 CVE-2024-26595 CVE-2024-26629 CVE-2024-35840 CVE-2023-52666 CVE-2024-26633 CVE-2023-52686 CVE-2023-52467 CVE-2023-52667 CVE-2023-52449 CVE-2023-52473 CVE-2023-52670 CVE-2024-26649 CVE-2023-52498 CVE-2023-52693 CVE-2024-26583 CVE-2023-52678 CVE-2023-52675 CVE-2023-52489 CVE-2024-26640 CVE-2024-26618 CVE-2023-52599 CVE-2024-26634 CVE-2023-52608 CVE-2024-26625 CVE-2023-52486 CVE-2024-26632 CVE-2023-52669 CVE-2023-52676 CVE-2023-52635 CVE-2023-52664 CVE-2024-35841 CVE-2023-52598 CVE-2023-52458 CVE-2024-26644 CVE-2023-52697 CVE-2023-52617 CVE-2024-26612 CVE-2023-52672 CVE-2023-52490 CVE-2024-35839 CVE-2024-26610 CVE-2024-26616 CVE-2023-52588 CVE-2023-52623 CVE-2024-26669 CVE-2023-52692 CVE-2024-26620 CVE-2023-52606 CVE-2024-26592 CVE-2023-52616 CVE-2024-26641 CVE-2023-52622 CVE-2023-52611 CVE-2023-52453 CVE-2023-52681 CVE-2024-26586 CVE-2023-52472 CVE-2024-26646 CVE-2024-26670 CVE-2023-52454 CVE-2024-26668 CVE-2023-52447 CVE-2023-52463 CVE-2023-52618 CVE-2023-52691 CVE-2024-26808 CVE-2023-52612 CVE-2024-24860 CVE-2024-23849 CVE-2023-6536 CVE-2023-6535 CVE-2023-6356 Of all these CVEs, 6 had a high priority ratingmany are due to bugs in the async handling of cryto operations in thein-kernel TLS implementation
CVE-2024-26582 and CVE-2024-26584 - both reported by Google kernelCTF program (talked about back in [USN-6766-2] Linux kernel vulnerabilities from Episode 228)first is UAF in TLS handling of scattter/gather arrayssecond is UAF when crypto requests get backlogged and the underlyingcrypto engine can’t process them all in time - can then end up having
the async callback invoked twice
CVE-2024-26585very similar - UAF in handling of crypto operations from TLS - threadwhich handles the socket could close this before all the operations had
been scheduled
CVE-2024-26583 - similarly, race between async notify event and socket close -> UAFUAF in BPF and a UAF in netfilter - also reported via Google kernelCTF -both able to be triggered via an unpriv userns
Goings on in Ubuntu Security Community
Discussion of CISA KEV
US Gov Cybersecurity & Infrastructure Security Agency“America’s Cyber Defense Agency”National Coordinator for Critical Infrastructure Security and ResiliencePublish various guidance for organisations around topics of cybersecurityfor instance, recently published a report “Exploring Memory Safety in Critical Open Source Projects”Joint guidance (FBI, ASD / ACSC & Candadian CSC)Builds on the previous case for memory safe roadmaps by looking at theprevalence of memory unsafe languages in various critical open source
projects
Also maintain the KEV - Known Exploitable Vulnerabilities Catalog“authoritative source of vulnerabilities that have been exploited in the wild”Mandates for federal civilian agencies in the US to remediate KEV vulns within various timeframesAlso recommend that anyone else monitors this list and immediately addresses these vulns as part of the vuln remediation planList of vilns that are causing immediate harm based on observed adversarial activityVarious requirements to be listed in the KEV:CVE ID assignedEvidence it has been or is being actively exploitedreliable evidence that execution of malicious code was performed on a system by an unauthorised actoralso includes both attempted and successful exploitation (e.g. includes honeypots as well as real systems)Clear remediation guidelinesAn update is available and should be applied ORVulnerable component should be removed from networks etc if it is EOL and cannot be updatedavailable as CSV or JSONCurrently lists 1126 CVEs including:Accellion File Transfer AppliancesAdobe Reader, Flash PlayerApache HTTP Server, Struts (Solarwinds), Log4jHuge number of Apple iOS etc (WebKit and more)Atlassian ConfluenceCitrix GatewaysEximFortinetGitlabGoogle ChromiumImageMagickMicrosoft Windows and ExchangeMozilla FirefoxIvanti Pulse Connect SecuritySaltStackVMWareWordPressOldest CVEs are 2 against Windows from 2002 and 2004Newest include 26 2024 CVEs - various Chromium, Windows, Android Pixel, Ivanti and moreinterestingly includes ARM Mali GPU Driver CVE-2024-4610 - this affectsthe Bifrost and Valhall drivers - in Ubuntu we only ship the related
Midgard driver back in bionic and focal so not affected by this one
but as you may have noticed, lots that we potentially are affected byApache HTTP Server, Exim, Firefox, Thunderbird - plus OpenJDK, GNU CLibrary, Bash, Roundcube (mentioned earlier but not this particular vuln),
WinRAR (unrar), not to mention a number against the Linux kernel
all for Linux kernel are privesc - most against either netfilter orvarious other systems like perf, AF_PACKET, tty, ptrace, futex and
others
For Ubuntu, not surprisingly, we prioritise these vulnerabilities in ourpatching process
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@[email protected], @ubuntu_sec on twitter