Overview
This week we look at security updates for Dovecot, Ghostscript, a livepatch update for the Linux kernel, Ceph and Apache, plus Alex and Joe discuss recent Wordpress plugin vulnerabilities and the Hostinger breach, and more.
This week in Ubuntu Security Updates
[USN-4110-1, USN-4110-2] Dovecot vulnerability [00:52]
1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, DiscoCVE-2019-11500IMAP and ManageSieve protocol parsers would not check for embedded NUL bytes in stringsWhen parsing these strings, would return indexes outside the normalstring bounds as the first character which needed unescaping
Would then go and try to unescape the string from this index, whichrewrites the string on the fly, and so would then go and rewrite
outside the bounds of the string
Fixed to disallow embedded NUL bytes AND to not try and skip up tofirst unescaped character but instead loop over the whole string in
unescaping
[USN-4110-3, USN-4110-4] Dovecot regression [02:08]
1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, DiscoCVE-2019-11500Original patch used pre-release version of the fix from upstream whichcontained an error such that the checking of NUL bytes was skipped -
re-released with correct final upstream fix
[LSN-0054-1] Linux kernel vulnerability [02:38]
9 CVEs addressed in Xenial, BionicCVE-2018-1129CVE-2019-13272CVE-2019-12984CVE-2019-12819CVE-2019-12818CVE-2019-12614CVE-2019-10126CVE-2019-3846CVE-2019-2101Livepatch for CVEs addressed in regular kernel updates (Episode 43)ptrace credentials race, Marvell Wifi heap-buffer overflows, NULLpointer dereferences
[USN-4111-1] Ghostscript vulnerabilities [03:20]
4 CVEs addressed in Xenial, Bionic, DiscoCVE-2019-14817CVE-2019-14813CVE-2019-14812CVE-2019-14811Four more -dSAFER sandbox bypasses (see Episode 43 for the last one)All variations on the theme of using the .forceput operator to escape thesandbox
[USN-4112-1] Ceph vulnerability [04:01]
1 CVEs addressed in Bionic, DiscoCVE-2019-10222DoS - unauthenticated clients can crash the rados gateway bydisconnecting at certain time (triggering a NULL pointer deference when
looking up the remote address for a connected client)
Older versions are not affected since this is in the beast RGWfrontend - which is not in the versions in trusty / xenial - and only
in the bionic version as an experimental feature
[USN-4113-1] Apache HTTP Server vulnerabilities [04:41]
7 CVEs addressed in Xenial, Bionic, Disco
CVE-2019-9517CVE-2019-10098CVE-2019-10097CVE-2019-10092CVE-2019-10082CVE-2019-10081CVE-2019-0197HTTP/2 DoS issue (Internal Data Buffering) - Episode 43 for nginx
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/http2Open redirect in mod_rewrite if have self-referential redirects
Stack buffer overflow + NULL pointer dereference in mod_remoteip
Possible XSS in mod_proxy where the link shown on error pages could be
controlled by an attacker - but only possible where configured with
proxying enable but misconfigured so that Proxy Error page is shown.
UAF (read) during HTTP/2 connection shutdown
HTTP/2 push - allows server to send resources to a client before it
requests them - could overwrite memory of the server’s request pool -
this is preconfigured and not under control of client but could cause a
HTTP/2 upgrade - can configure to automatically upgrade HTTP/1.1 requests
to HTTP/2 - but if this was not the first request on the connection could
Goings on in Ubuntu Security Community
Alex and Joe talk Wordpress plugin vulnerabiliies and Hostinger password breach [07:03]
https://threatpost.com/wordpress-plugins-exploited-in-ongoing-attack-researchers-warn/147671/https://www.zdnet.com/article/hostinger-resets-customer-passwords-after-security-incident/https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2009/july/if-youre-typing-the-letters-a-e-s-into-your-code-youre-doing-it-wrong/OpenSSL 1.1.1 with TLS 1.3 support complete for Ubuntu 18.04 LTS (Bionic) [17:29]
OpenSSL upgraded to version 1.1.1 in Ubuntu 18.04 LTS - supports TLS1.3 - now published via -updates and -security
Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter