Overview
A quieter week in package updates - this week we look at some details of the 9
unique CVEs addressed across the supported Ubuntu releases and talk about
various hardening guides for Ubuntu.
This week in Ubuntu Security Updates
[USN-3759-1] libtirpc vulnerabilities
3 CVEs addressed in Trusty, Xenial, BionicCVE-2017-8779CVE-2018-14622CVE-2016-4429Transport Independent RPC Library, used by NFS1 medium priority issue:Crash from NULL pointer dereference when run out of file descriptions (failure to check return value) - a remote attacker could cause crash by flooding with new connections2 low priority issues:“rpcbomb” - allows an unauthenticated attacker to DoS via memory exhaustionStack based buffer overflow could cause a crash when flooded by ICMP and UDP packets in the sunrpc implementation - fixed by replacing stack based memory allocation with heap-based allocation insteadCommon pattern to fix this type of issue - similar work in Linux kernel recently by KSPP to replace VLAs[USN-3759-2] libtirpc vulnerabilities
3 CVEs addressed in Precise ESMCVE-2017-8779CVE-2018-14622CVE-2016-4429Same as above for the Precise Extended Security Maintenence release[USN-3760-1] transfig vulnerability
1 CVEs addressed in Trusty, XenialCVE-2018-16140transfig / fig2dev - utilities for converting XFig filesFixes an error which allows memory corruption when handling specially crafted files[USN-3761-1] Firefox vulnerabilities
5 CVEs addressed in Trusty, Xenial, BionicCVE-2018-12383CVE-2018-12378CVE-2018-12377CVE-2018-12376CVE-2018-12375Latest firefox release (62) fixing a number of issues including DoS and RCEOne interesting one is CVE-2018-12383 - in Firefox 58 the password storageformat was changed (was sqlite, then was changed to json). When user sets a
master password, this is used to encrypt all stored passwords. However, this
was only done for the copy stored with the new format - the old copy would
still be stored unencrypted since it never had a master password set on
it. This is now fixed to simply delete the old copy of the password DB.
Goings on in Ubuntu Security Community
Discussions around hardening guides for Ubuntu
A number of ‘best practices’ guides exist for hardening Ubuntu installations from reputable organisationsNCSCCIS Benchmarksmany othersIn general these have similar recommendations:Use UEFI Secure BootDisable unnecesary servicesUse a known and fixed networking configuration (disable DHCP / use VPN etc)Enable Mandatory Access Control frameworks (ie. AppArmor)Use a specific password policyEnable auditingDiffer in level of detail and technical knowledge needed to deployTypically aimed at computer and network administrators (not end-users)Ubuntu already includes a number of these recommendations out of the box:https://wiki.ubuntu.com/Security/FeaturesUbuntu strives to strike a balance between security and usability out-of-the-boxHiring
Ubuntu Security Manager
https://boards.greenhouse.io/canonical/jobs/1278287Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter