Overview
This week we cover security updates for a Linux kernel vulnerability
disclosed during pwn2own, Timeshift, pam-krb5 and more, plus we have a
special guest, Vineetha Kamath, to discuss security certifications for
This week in Ubuntu Security Updates
[USN-4308-2] Twisted vulnerabilities [00:42]
4 CVEs addressed in Trusty ESMCVE-2020-10109 CVE-2020-10108 CVE-2019-12855 CVE-2019-12387 Episode 68 - 4 of the 7 CVEs described there affect Twisted in 14.04ESM
[USN-4310-1] WebKitGTK+ vulnerability [01:09]
1 CVEs addressed in Bionic, EoanCVE-2020-10018 UAF - discovered by CloudFuzz[USN-4312-1] Timeshift vulnerability [01:49]
1 CVEs addressed in EoanCVE-2020-10174 Reuses predictably named temporary directory to execute scripts - andruns as root - so a local attacker could replace the script in this
predictably named directory with one containing malicious commands, to
get code execution as root. Fixed by using a randomly named directory
and setting the permissions on it so other users can’t write to it.
[USN-4313-1] Linux kernel vulnerability [02:43]
1 CVEs addressed in Bionic, EoanCVE-2020-8835 pwn2own - Manfred Paul discovered the BPF verifier in the Linux kerneldid not properly calculate register bounds for 32-bit operations - so if
allow unprivileged users to load BPF, this could be used to read or write
kernel memory. Can then use this to elevate privileges to root.
https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results[USN-4311-1] BlueZ vulnerabilities [03:52]
2 CVEs addressed in Xenial, Bionic, EoanCVE-2016-7837 CVE-2020-0556 Didn’t handle bonding of HID and HOGP (HID over GATT - Generic AttributeProfile) devices - local attacker could use this to impersonate
non-bonded devices
Buffer overflow in parse_line function used by some CLI-based userlandutils
[USN-4314-1] pam-krb5 vulnerability [04:50]
1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, EoanCVE-2020-10595 Single-byte buffer overflow could potentially allow RCE - buffer isprovided by underlying kerberos library - attacker can supply input of
special length to overflow this and then cause memory corruption -
possible heap or stack corruption. Only used in code-paths where Kerberos
lib does supplemental prompting, or if running PAM with no_prompt
configured.
Goings on in Ubuntu Security Community
Joe and Vineetha discuss security certifications for Ubuntu [06:14]
Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter