Overview
This week we look at some details of the 17 unique CVEs addressed across the supported Ubuntu releases and more.
This week in Ubuntu Security Updates
[USN-3771-1] strongSwan vulnerabilities
4 CVEs addressed in Trusty, Xenial, BionicCVE-2018-5388CVE-2018-16152CVE-2018-16151CVE-2018-108112 CVEs: flaws in RSA implementation allow Bleichenbacher-style attacks in parsing of the ASN.1 encoded digestInfostrongSwan implementation was too lenient and would allow arbitrary random data to be contained following various elements in the ASN.1Also would not check the correct amount of padding had been usedAllows attackers to potentially forge low-exponent signature forgery and hence authentication during IKE authentication2 CVEs for DoS due to missing length check and missing variable initialization[USN-3772-1] UDisks vulnerability
1 CVEs addressed in BionicCVE-2018-17336Format string vulnerability which could be exploited via specially crafted disk labeludisks prints volume label via printf() passing the label as part of the format stringSimple fix to replace the label with a %s directive and then pass the label to thatie. don’t interpret label as printf() directives directly[USN-3719-3] Mutt vulnerabilities
12 CVEs addressed in XenialCVE-2018-14349CVE-2018-14362CVE-2018-14351CVE-2018-14356CVE-2018-14355CVE-2018-14357CVE-2018-14353CVE-2018-14358CVE-2018-14359CVE-2018-14354CVE-2018-14352CVE-2018-14350Goings on in Ubuntu Security Community
LSM Stacking upstreaming
Casey Schaufler (Intel, SMACK maintainer) primary developer along with John Johansen and Kees Cook (Google) to upstream support for LSM stackingCurrently upstream allows use of one ‘major’ module (SELinux / AppArmor / Tomoyo) with a minor module (Yama etc)Goal of stacking is to allow multiple major modules to be used in conjunction (AppArmor with SELinux)Primary use-case is containersCurrent stacking patches allow to stack Tomoyo with either SELinux / AppArmorEventually should be able to stack SELinux with AppArmor but still WIPUbuntu already carries these patches in Bionic etcLikely to be merged in the near futureEvince AppArmor hardening LP #1788929
Jann Horn (GPZ) reported gaps in evince AppArmor profileClever use of GNOME thumbnailer infrastructure to specify a new ’evil’ thumbnailer and the use of systemd via DBus to escape AppArmor confinementPolicy fixed in Cosmic, in process of updating for Bionic etcNew Ubuntu Security Manager
Joe McManusHiring
Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter