Overview
This week we cover security fixes for GNOME Shell, FFmpeg, Sudo, Ghostscript and others, and we talk to Joe McManus about malicious Dockerhub images, Git repos being ransomed more.
This week in Ubuntu Security Updates
[USN-3966-1] GNOME Shell vulnerability
1 CVEs addressed in Bionic, CosmicCVE-2019-3820Local user could potentially bypass various restrictions of the lockscreen - menu items can be activated by keyboard combinations - these
could then be used to take screenshots (and fill up disk space), close
windows behind the lock screen or start the screen reader which could
read out the contents of windows behind the lock screen.
Fixed by disabling all menu items when the screen is locked[USN-3965-1] aria2 vulnerability
1 CVEs addressed in Cosmic, DiscoCVE-2019-3500CLI download tool (akin to curl / wget but can also do bittorrent and others)When logging would store credentials in log file which could be read by other usersFixed by masking out credentials[USN-3967-1] FFmpeg vulnerabilities
5 CVEs addressed in Bionic, Cosmic, DiscoCVE-2019-9721CVE-2019-9718CVE-2019-11339CVE-2019-11338CVE-2018-15822CPU DoS in Matroska and HTML subtitle decodingVarious issues discovered by Google’s oss-fuzz project:2 x OOB read found by Google’s clusterfuzz / oss-fuzz project in MPEG-4 decoderNULL pointer dereference and OOB read in HEVC decoderAssertion failure for missing audio packet size in FLV encoder[USN-3968-1] Sudo vulnerabilities
2 CVEs addressed in XenialCVE-2017-1000368CVE-2016-7076Fails to properly parse /proc/PID/stat - this is used to determine thecontrolling tty - this name could contain newlines - sudo would only read
one line of input and so would get a truncated name - when sudo is used
with SELinux this allows to confuse sudo as to where the destination for
stdout / stderr and so cause sudo to overwrite and arbitrary file by
creating a symlink from the supposed tty to the destination file.
Fixed by ensuring to parse the full name including any newlinessudo contains the ability to restrict users with sudo access to runningfurther commands via the NOEXEC tag
Does this by LD_PRELOAD to replace exec() and other functions withversions that return an error
wordexp() performs shell expansion on a string and so can contain shelldirectives to run a command and get the output $(foo) - this can run
commands and so would not be stopped by LD_PRELOAD lib - so a user can
run a binary which does wordexp() they could bypass this restriction
Fixed by adding wordexp() to the LD_PRELOAD wrapper AND by adding aseccomp filter to stop all execve() entirely
[USN-3969-1, USN-3969-2] wpa_supplicant and hostapd vulnerability
1 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, DiscoCVE-2019-11555Possible NULL pointer dereference if an attacker could construct out ofsequence EAP message fragments
Fixed by validating and rejecting invalid fragments on both the peer andserver side
[USN-3970-1] Ghostscript vulnerability
1 CVEs addressed in Xenial, Bionic, Cosmic, DiscoCVE-2019-3839Follow up to CVE-2019-6116 (Episode 18)GS sandbox allowed access to system operators which allowed arbitrary code executionMissed some protections for pdf related operations which could also allow code execution[USN-3971-1] Monit vulnerabilities
2 CVEs addressed in Cosmic, DiscoCVE-2019-11455CVE-2019-11454Buffer over-read when decoding URLs could allow a remote authenticatedattacker to read other memory - information disclosure but could also
cause a crash via reading from an invalid memory location
Persistent XSS in decoding Authorization header for HTTP BasicAuthorization could allow an unauthenticated remote attacker to inject
arbitrary JavaScript in the _viewlog operation - fixed by properly
escaping this data
[USN-3956-2] Bind vulnerability
1 CVEs addressed in Precise ESM, Trusty ESMCVE-2018-5743Episode 29 covered for standard support releases - now fixed in ESMDiscussion with Joe McManus about malicious DockerHub images and Git repo takeover ransoms
https://threatpost.com/malicious-docker-containers-earn-crypto-miners-90000/132816/https://www.zdnet.com/article/a-hacker-is-wiping-git-repositories-and-asking-for-a-ransom/Goings on in Ubuntu Security Community
Robotics Security Engineer
https://boards.greenhouse.io/canonical/jobs/1550997Security Certifications Engineer
https://boards.greenhouse.io/canonical/jobs/1660658Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter