Overview
A look at recent fixes for vulnerabilities in poppler, WALinuxAgent, the
Linux kernel and more. We also talk about some listener feedback on
Ubuntu hardening and the launch of Ubuntu 14.04 ESM.
This week in Ubuntu Security Updates
[USN-3905-1] poppler vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-9200Heap-based buffer underwrite (index into array using negative index) -write into heap memory which preceeds the intended buffer - heap
corruption - crash -> DoS, possible code execution
Found by fuzzing and AddressSanitizer in clang[USN-3906-1] LibTIFF vulnerabilities
6 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-7663CVE-2019-6128CVE-2018-19210CVE-2018-17000CVE-2018-12900CVE-2018-10779All DoS, one possible code-execution:Dereference of an invalid address (read from invalid memory location)Heap buffer overread2x NULL pointer dereferencesMemory leakHeap buffer overflow - possible code execution[USN-3907-1] WALinuxAgent vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-0804WALinuxAgent used to manage instances of Ubuntu (and other Linuxdistributions) running on Azure
Can be used to configure swap space for a given imagewould then create a swap file (/mnt/swapfile) BUT would make it world-readableso any local user could read it - if keys or other sensitive itemswere in memory that got swapped to disk could be read by all
Fixed to make this readable only by root and to also correct thepermissions on any existing swapfile as well
[USN-3902-2] PHP vulnerabilities
4 CVEs addressed in Precise ESMCVE-2019-9023CVE-2019-9021CVE-2019-9024CVE-2019-9020See last week’s Episode 23 - discussed for Xenial and Trusty - fixednow for Precise ESM as well
[USN-3910-1, USN-3910-2] Linux kernel vulnerabilities
5 CVEs addressed in Xenial and Trusty (Xenial HWE)CVE-2019-6133CVE-2018-7740CVE-2018-19985CVE-2018-1120CVE-2017-182412 of these discussed in previous episodes Episode 23 (PolicyKit starttime, DoS via mmaping a FUSE-backed file into processes memory
containing command-line args)
Trigger of BUG_ON() in kernel (like assert() for kernel code) due tointeger overflow from large pgoff parameter to remap_file_pages() when
used in conjuction with an existing mmap() -> crash -> DoS
OOB read in USB driver for Option High Speed mobile devices - wouldread a descriptor from the USB device as a u8 and then index into an
array with this without checking whether it fell within the array
NULL pointer dereference in f2fs driver via use of noflush_merge mountoption
[USN-3908-1, USN-3908-2] Linux kernel vulnerability
1 CVEs addressed in Trusty and Precise ESM (Trusty HWE)CVE-2019-6133See last week’s Episode 23 - discussed for Bionic kernel - now forTrusty kernel (and the Trusty HWE kernel backported to Precise ESM)
PolicyKit start time issue, fixed in kernel[USN-3909-1] libvirt vulnerability
1 CVEs addressed in Xenial, Bionic, CosmicCVE-2019-3840NULL pointer dereference in libvirt if agent does not reply in time(say guest is being shutdown) - crash host libvirt -> DoS
Goings on in Ubuntu Security Community
Ubuntu Hardening Response
Alexander PopovResponsible for getting STACKLEAK into the mainline kernelPointed out his Linux Kernel Defence Map and kconfig hardened checkWe use kconfig hardened check internall and tyhicks has contributedvarious improvements which allow this to be used to check the
various Ubuntu kernel configurations
Extended Security Maintenance for Ubuntu 14.04 (Trusty Tahr) begins April 25 2019
https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-March/004800.htmlUbuntu 14.04 LTS will transition to Extended Security Maintenance on Tuesday 25th AprilEncourage users to upgrade to Xenial (and then Bionic)ESM for 14.04 provided to customers via Ubuntu AdvantageFurther details regarding ESMHiring
Ubuntu Security Generalist
https://boards.greenhouse.io/canonical/jobs/1548812Robotics Security Engineer
https://boards.greenhouse.io/canonical/jobs/1550997Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter