Overview
This week Joe talks Linux Security Modules stacking with John Johansen and
Steve Beattie plus Alex looks at security updates for snapd, the Linux
This week in Ubuntu Security Updates
[USN-4199-2] libvpx vulnerabilities [01:05]
3 CVEs addressed in Trusty ESM (14.04 ESM)CVE-2019-9433 CVE-2019-9232 CVE-2017-13194 VP8/VP9 video code (webm)Various OOB read on crafted input[USN-4424-1] snapd vulnerabilities [01:38]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Eoan (19.10), Focal (20.04 LTS)CVE-2020-11934 CVE-2020-11933 James Henstridge from Ubuntu Desktop teamsnapd sandbox for strict mode snaps - within sandbox provides xdg-openimplementation which can forward to the real xdg-open outside the
sandbox - but would use XDG_DATA_DIRS env from the snap when launching
xdg-open outside of the snap - XDG_DATA_DIRS could then contain a
directory which the snap itself controls - allows to launch arbitrary
binaries from the snap outside of confinement
Fixed to not incorporate XDG_DATA_DIRS from the snapcloud-init would run on every boot without restriction - supports theconcept of loading meta-data from an external disk - so a local attacker
with physical access could alter the boot sequence - would be an issue
with FDE since could intercept the disk encryption key etc - fixed via
snapd to disable cloud-init after the first boot since cloud-init is
managed by snapd
Is only an issue for Ubuntu Core 16/18 devices which employed FDEDoesn’t affect UC20[USN-4425-1] Linux kernel vulnerabilities [06:20]
4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-15780 CVE-2020-11935 CVE-2019-19462 CVE-2019-16089 5.4 kernel (focal / bionic hwe)Possible bypass of Secure Boot lockdown protections via loading of ACPItables via configs - provides a means of arbitrary memory write - allows
root user to bypass lockdown
aufs inode reference count issue - BUG() -> DoSrelay subsystem crash (Episode 81)[USN-4426-1] Linux kernel vulnerabilities [7:32]
4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-15780 CVE-2020-11935 CVE-2020-10757 CVE-2019-20908 4.15 kernel (bionic / xenial hwe)ACPI lockdown bypass / aufs inode aboveSecond lockdown bypass via loading of ACPI tables via the SSDT EFIvariable similar to above
DAX (direct access to files in persistent memory arrays) huge pagessupport - abuse mremap() to gain root privileges - requires the system to
make use of DAX storage to be able to exploit
[USN-4427-1] Linux kernel vulnerabilities [08:30]
10 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)CVE-2019-12380 CVE-2020-13974 CVE-2020-11935 CVE-2020-10768 CVE-2020-10767 CVE-2020-10766 CVE-2020-10732 CVE-2019-20908 CVE-2019-20810 CVE-2019-19947 4.4 kernel (xenial / trusty hwe)aufsVarious means to bypass spectre related mitigationsSSDT ACPI lockdown bypass[USN-4429-1] Evolution Data Server vulnerability [09:12]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-14928 Very similar to recent mutt & Thunderbird vuln from Episode 81 / Episode82
Would read extra data after clear-text “begin TLS” when initiatingSTARTTLS - would allow an untrusted attacker who could intercept and
modify traffic to inject arbitrary responses that then get processed
later as though they had come from the trusted, encrypted connection to
the server - fixed in same way as mutt by clearing buffered content when
starting TLS
[USN-4430-1] Pillow vulnerabilities [10:24]
4 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-11538 CVE-2020-10994 CVE-2020-10378 CVE-2020-10177 Python Imaging Library - used for image handling by lots of Python GUIsAll OOB reads on crafted input -> crash, DoSGoings on in Ubuntu Security Community
John Johansen and Steve Beattie talk Linux Security Modules with Joe [10:51]
https://www.kernel.org/doc/html/latest/security/lsm.htmlhttps://lwn.net/Articles/808048/Get in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter