Overview
Carpe Diem for Apache HTTP Server, plus updates for Dovecot, PolicyKit and the Linux kernel, and we talk to Joe McManus about the recent Asus ShadowHammer supply chain attack and more.
This week in Ubuntu Security Updates
[USN-3928-1] Dovecot vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-7524Local user root privilege escalationStack buffer overflow - indexer-worker processes missing bounds check when copying from the indexIf local user can modify the dovecot index then could leverage thisfor code-execution in the indexer process context
Mitigated by usual hardening techniques (ASLR, stack-protector,read-only GOT (via RELRO & BIND_NOW))
[USN-3929-1] Firebird vulnerabilities
2 CVEs addressed in TrustyCVE-2017-6369CVE-2014-9323Remote authenticated users execute codeRemote un-authenticated user DoS via op_response action with a non-empty status[USN-3934-1] PolicyKit vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-6133Episode 23 - fixed kernel to make process start_time via fork() more atomicUpdated policykit to also check UIDs match (so now checks start_time,PID and UID so can’t use another user’s authorisations)
[USN-3935-1] BusyBox vulnerabilities
10 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-5747CVE-2018-20679CVE-2018-1000517CVE-2017-16544CVE-2017-15873CVE-2016-2148CVE-2016-2147CVE-2015-9261CVE-2014-9645CVE-2011-5325Mix of issues across various components in BusyBoxudhcpc:Information disclosure of stack memory in dhcp client / server(shared component) due to failure to check DHCP options are correct
size - original fix was incomplete so this got 2 CVEs
Heap buffer overflow via DHCP option parsing of OPTION_6RD (IPv6rapid deployment on IPv4 infra)
Integer overflow -> heap-based OOB write -> crash -> DoS / codeexecution
wget:Heap buffer overflow in wgetshell:Failure to sanitize filenames during tab completion - could allowcode execution etc as user who is running the shell
archive handlingInteger overflow in bzip2 decompression - OOB write - crash -> DoS/ code execution?
Pointer misuse in zip decompression - OOB read - crash -> DoSdirectory traversal due to symlinks which point outside thecurrent working directory when decompressing tar archives
(tyhicks)
module loadingallows users to load modules which are otherwise restricted -assumes modules could specify the path so uses basename() on the
module name - so just need to include a / in the module name to
circumvent other checks
[USN-3937-1] Apache HTTP Server vulnerabilities
6 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-0220CVE-2019-0217CVE-2019-0196CVE-2018-17199CVE-2018-17189CVE-2019-0211“Carpe Diem” and othersLocal root privilege escalation due to an OOB array access resultingin arbitrary function call when apache gracefully restarts - done
daily via logrotate at 6:25am
affects mod_prefork, mod_worker and mod_eventmain server (running as root) shares a memory segment (thescoreboard) with low-privileged worker processes
PID, last request handled etc - maintained by the workerworker stores an index into global buckets array in the privileged parentthis gets used on restart to restart the worker but no check is done to ensure this is validso since is in shm child can change this index to ensure it points back into the shm segment where it has write accessthe bucket contains a function pointer to restart worker - sosince this is now indexed from the shm segment can make this point
to any function of choice - AND this gets executed as root by the
parent
Requires some other bug to turn this into a remote exploit sinceneed to get R/W access remotely on a worker process
Failure to normalize URLs in a consistent manner - LocationMatch andRewriteRule might not get applied correctly
Race condition in mod_auth_digest could allow user with validcredentials to impersonate another and bypass access controls
read after free on string comparison in mod_http2 - crash, DoSfailure to respect session expiry time in mod_session_cookieDoS via slow-loris type attack to occupy server threads[USN-3936-1] AdvanceCOMP vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-9210Integer overflow when decompressing invalid PNG images - OOB write andheap OOB read
[USN-3930-1, USN-3930-2] Linux kernel vulnerabilities
13 CVEs addressed in Cosmic and Bionic (HWE)CVE-2019-9213CVE-2019-9162CVE-2019-9003CVE-2019-8980CVE-2019-8956CVE-2019-8912CVE-2019-7308CVE-2019-7222CVE-2019-7221CVE-2019-6974CVE-2019-3460CVE-2019-3459CVE-2018-19824Jann Horn (GPZ):mmap minimum address bypass - could allow to turn a kernel NULLpointer dereference into code execution
ASN.1 decoding for SNMP NAT missing length checks - OOB R/W possibleside-channel attack due to speculation on pointer arithmetic in eBPFprograms (Spectre V1)
mitigated when secure boot due to lockdown patches blocking BPFprogram loading
Reference counting race-condition in KVM -> UAF -> guest VM crashUAF + OOPS in IPMI due to race-condition on restartMemory leak on error path of vfs read operations -> DoSUAF in SCTP sendmsg - crash / code executionUAF in AF_ALG due to failure to NULL structure membersOriginally misclassified by NVD as remotely exploitable, confusionover socket() use by crypto API?
Info leak and a UAF in KVM when using nested virtualisation - notenabled by default in Ubuntu kernels unless if install QEMU - this is
enabled automatically
2 different information leak of heap memory in bluetooth subsystemtriggerable by unauthenticated remote attacker
UAF in ALSA USB sound device handling mentioned in Episode 20[USN-3931-1, USN-3931-2] Linux kernel vulnerabilities
12 CVEs addressed in Bionic, Trusty (HWE) and Xenial (HWE)CVE-2019-9213CVE-2019-8980CVE-2019-8912CVE-2019-7308CVE-2019-7222CVE-2019-7221CVE-2019-6974CVE-2019-3460CVE-2019-3459CVE-2018-19824CVE-2018-18021CVE-2018-1467810 from above, 2 unique:Potential host system crash / code execution from malicious guestfor KVM on ARM64 as mentioned previously in Episode 12
Failure to properly initialise all elements of error handlercallback in Xen - guest VM crash triggerable by an unprivileged
attacker in the guest VM
[USN-3932-1, USN-3932-2] Linux kernel vulnerabilities
20 CVEs addressed in Xenial and Trusty (HWE)CVE-2019-3819CVE-2019-3701CVE-2018-9517CVE-2018-16884CVE-2018-14613CVE-2018-14612CVE-2018-14611CVE-2018-14610CVE-2018-14616CVE-2018-14614CVE-2018-13100CVE-2018-13099CVE-2018-13097CVE-2017-18249CVE-2019-9213CVE-2019-7222CVE-2019-7221CVE-2019-6974CVE-2019-3460CVE-2019-34592 DoS triggerable by root (low priority issue)UAF in PPP over L2TPUAF in NFS41+ when using multiple network namespaces4 different NULL pointer dereferences in btrfs via malicious imageRace condition and various reads of invalid memory areas when mountingmalicious f2fs images
mmap min address bypass and others mentioned previously plus(bluetooth, kvm etc)
[USN-3933-1, USN-3933-2] Linux kernel vulnerabilities
8 CVEs addressed in Trusty and Precise ESM (HWE)CVE-2019-9213CVE-2019-7222CVE-2019-6974CVE-2019-3460CVE-2019-3459CVE-2018-19824CVE-2017-18360CVE-2017-1000410Goings on in Ubuntu Security Community
Supply chain attacks and Ubuntu
Alex and Joe discuss recent Asus ShadowHammer supply chain attack and how this relates to Ubuntuhttps://securelist.com/operation-shadowhammer/89992/https://www.forbes.com/sites/jasonevangelho/2019/03/29/shadowhammer-asus-1-million-reasons-switch-from-windows-to-linux/https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/2018-ossra.pdfhttp://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdfHiring
Ubuntu Security Generalist
https://boards.greenhouse.io/canonical/jobs/1548812Robotics Security Engineer
https://boards.greenhouse.io/canonical/jobs/1550997Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter