Overview
This week we look at some details of the 15 unique CVEs addressed across the supported Ubuntu releases and discuss some of the security relevant changes in Ubuntu 18.10, plus a refresh of the Ubuntu CVE tracker and more.
This week in Ubuntu Security Updates
[USN-3790-1] Requests vulnerability
1 CVEs addressed in Trusty, Xenial, BionicCVE-2018-18074Requests library could end up sending credentials in clear text if server is configured with a https -> http redirect[USN-3792-1, USN-3792-2] Net-SNMP vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic & Precise ESMCVE-2018-18065Remote DoS via a NULL pointer dereference from an authenticated attacker[USN-3793-1] Thunderbird vulnerabilities
5 CVEs addressed in Trusty, Xenial, BionicCVE-2018-12385CVE-2018-12383CVE-2018-12378CVE-2018-12377CVE-2018-12376New Thunderbird version (60) containing 5 fixesInterestingly all of these were also vulnerabilities in Firefox - inparticular CVE-2018-12383 was discussed in Episode 4 for Firefox
[USN-3794-1] MoinMoin vulnerability
1 CVEs addressed in Trusty, Xenial, BionicCVE-2017-5934XSS in link editor dialog allow injection of arbitrary web content (HTML, scripts etc)[USN-3789-2] ClamAV vulnerabilities
5 CVEs addressed in Precise ESMCVE-2018-15378CVE-2018-14682CVE-2018-14681CVE-2018-14680CVE-2018-14679Corresponding fix for Precise ESM from ClamAV which we discussed in Episode 7Also rolls in fixes for 4 other vulnerabilities in the embedded mspack libraryIn trusty and precise we used the embedded libmspack, newer releases usethe system package so weren’t affected
[USN-3795-1] libssh vulnerability
1 CVEs addressed in Trusty, Xenial, BionicCVE-2018-10933Embedded SSH server and client implementationAllows bypass of authentication by remote attackers if they send a SSH2_MSG_USERAUTH_SUCCESS message instead of the SSH2_MSG_USERAUTH_REQUEST message to initiate the authentication processThis message is meant to be sent from the server to the client but in this case are sending it to the serverState machine on server-side then jumps straight to ‘Authenticated’Only affects applications which use libssh as a server[USN-3796-1, USN-3796-2] Paramiko vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic & Precise ESMCVE-2018-1000805Python SSH library for both servers and clientsVery similar to CVE-2018-10933 for libssh - remote authentication bypass by presenting SSH2_MSG_USERAUTH_SUCCESS in place of SSH2_MSG_USERAUTH_REQUESTDue to code-reuse between client and server implementationsOn server side, runs the normal client side code to be used when receiving this authentication success from the server, and flips the ‘authenticated’ flag - which is shared by both the server and client codeGoings on in Ubuntu Security Community
Ubuntu 18.10 Cosmic Cuttlefish Released
Includes OpenSSL 1.1.1 for TLS 1.3 supportSupport for using fingerprint readers to unlock screen etcUbuntu Security Team consider fingerprints to be akin to usernames only - so we don’t enable fingerprint authentication by default - need to opt-inlibfprint and fprintd promoted to main to allow thisUbuntu CVE Tracker facelift
Refreshed look and feel via bootstraphttps://ubuntu.com/security/Hiring
Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter