Overview
A big week in security updates, including the Linux kernel, Ceph, ICU,
Firefox, Dino and more, plus Joe and Alex discuss tips for securely working
from home in light of Coronavirus.
This week in Ubuntu Security Updates
[USN-4299-1] Firefox vulnerabilities [00:41]
12 CVEs addressed in Xenial, Bionic, EoanCVE-2020-6811 CVE-2020-6809 CVE-2020-6815 CVE-2020-6814 CVE-2020-6813 CVE-2020-6812 CVE-2020-6810 CVE-2020-6808 CVE-2020-6807 CVE-2020-6806 CVE-2020-6805 CVE-2019-20503 74.0 - usual sorts of fixes:Crafted website -> DoS, URL and other browser chrome spoofing, bypasscontent security policy protections, RCE etc
Extensions with all-url permission could access local filesCopy-as-cURL devtools feature failed to escape website-controlleddata - possible command injection -> RCE if user tricked into using
this on a crafted website
[USN-4300-1] Linux kernel vulnerabilities [02:02]
11 CVEs addressed in Bionic, EoanCVE-2019-19068 CVE-2019-19066 CVE-2019-19064 CVE-2019-19059 CVE-2019-19058 CVE-2019-19056 CVE-2019-19053 CVE-2019-19043 CVE-2019-18809 CVE-2020-2732 CVE-2019-3016 5.3 eoan, bionic hwe2 KVM issuesNested KVM guest could access resources of parent -> sensitive infodisclosure
Guest VM could read memory from another guest VM since would sometimesmiss deferred TLB flushes when switching guests
Rest low priorityMemory leaks in various network and other device drivers underparticular error scenarios - not likely that a local or remote user
could easily trigger these so hence low priority
[USN-4301-1] Linux kernel vulnerabilities [03:53]
8 CVEs addressed in BionicCVE-2019-19068 CVE-2019-19066 CVE-2019-19059 CVE-2019-19058 CVE-2019-19056 CVE-2019-19053 CVE-2020-2732 CVE-2019-3016 5.0 “cloud” specific kernel (oracle, aws, gke, gcp etc)Same issues as above just with a couple less of the driver memory leakfixes since these were already done in a previous update
[USN-4302-1] Linux kernel vulnerabilities [04:31]
10 CVEs addressed in Xenial, BionicCVE-2019-15217 CVE-2019-19068 CVE-2019-19066 CVE-2019-19058 CVE-2019-19056 CVE-2019-19051 CVE-2019-19046 CVE-2020-8832 CVE-2019-14615 CVE-2020-2732 4.15, bionic and xenial hweCVE-2020-8832 - Ubuntu Intel i915 specific issue due to previous fix forCVE-2020-14615 being incomplete - so not completely mitigated in this
kernel as expected
KVM nested virt bug and various driver memory leak fixes (see above) anda NULL pointer deref if a malicious USB device was inserted to the system
[USN-4303-1, USN-4303-2] Linux kernel vulnerability [05:26]
1 CVEs addressed in Xenial and Trusty ESM (HWE)CVE-2020-2732 Nested KVM virt issue[USN-4304-1] Ceph vulnerability [05:48]
1 CVEs addressed in Bionic, EoanCVE-2020-1700 DoS able to be triggered by an authenticated user causing an unexpecteddisconnect to radosgw - sockets pile up and eventually exhaust resources
-> DoS
[USN-4305-1] ICU vulnerability [06:26]
1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, EoanCVE-2020-10531 C/C++ library for unicode handling - integer overflow -> heap bufferoverflow - DoS/RCE?
[USN-4306-1] Dino vulnerabilities [07:05]
3 CVEs addressed in BionicCVE-2019-16237 CVE-2019-16236 CVE-2019-16235 Thanks to Julian Andres Klode from FoundationsFixes for multiple failures to validate inputs - remote attacker coulduse to obtain, inject or remove info
Also includes a change to accept IV of 12 bytes as well as 16 bytes sincethis is what a lo t of other OMEMO clients are using
OMEMO (OMEMO Multi-End Message and Object Encryption) - XMPP extensionfor multiclient E2E - so allows messages to be synchronised across
multiple clients, even if some are offline
[USN-4171-5] Apport regression [08:14]
5 CVEs addressed in Xenial, Bionic, EoanCVE-2019-15790 CVE-2019-11485 CVE-2019-11483 CVE-2019-11482 CVE-2019-11481 Thanks to Tiago Daitx and Michael Hudson-Doyle from Foundations TeamPrevious security update broke some autopkgtests and broke python2compatibility for various parts of Apport
Goings on in Ubuntu Security Community
Joe and Alex discuss securely working from home whilst avoiding Coronavirus [09:21]
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter