Overview
This week we look at some details of the 61 unique CVEs addressed across the supported Ubuntu releases, with a particular focus on the recent Xorg vulnerability (CVE-2018-14665), plus Cosmic is now officially supported by the Security Team.
This week in Ubuntu Security Updates
[USN-3790-2] Requests vulnerability
1 CVEs addressed in CosmicCVE-2018-18074Cosmic is now officially released and so is officially supported by the Security TeamThis is the same vulnerability which we covered in Episode 8 for Trusty, Xenial, Bionic now fixed for Cosmic[USN-3795-2] libssh vulnerability
1 CVEs addressed in CosmicCVE-2018-10933This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial, Bionic now fixed for Cosmic[USN-3792-3] Net-SNMP vulnerability
1 CVEs addressed in CosmicCVE-2018-18065This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial & Bionic now fixed for Cosmic[USN-3796-3] Paramiko vulnerability
1 CVEs addressed in CosmicCVE-2018-1000805This is the same vulnerability which we covered in Episode 8 for Trusty, Xenial & Bionic now fixed for Cosmic[USN-3788-2] Tex Live-bin vulnerability
1 CVEs addressed in CosmicCVE-2018-17407This is the same vulnerability which we covered in Episode 7 for Trusty, Xenial & Bionic now fixed for Cosmic[USN-3797-1, USN-3797-2] Linux kernel vulnerabilities
4 CVEs addressed in Xenial and Trusty for the Xenial HWE kernel for TrustyCVE-2018-10938CVE-2018-9363CVE-2018-16658CVE-2018-14734Includes:UAF in Infiniband -> DoS via crashInteger overflow in CDROM -> info disclosure of kernel memoryInteger overflow in bluetooth HID -> buffer overflow -> DoS / possible arbitrary code executionRemotely triggerable infinite loop in labelled network handler (CIPSO)CIPSO used by SELinux / SMACK not AppArmor so unlikely Ubuntu users affected[USN-3798-1] Linux kernel vulnerabilities
8 CVEs addressed in Trusty and Precise ESM (for the Trusty HWE kernel for Precise ESM)CVE-2018-9518CVE-2018-7566CVE-2018-1000004CVE-2017-18216CVE-2017-15299CVE-2017-0794CVE-2016-7913CVE-2015-8539Includes:Local DoS / code exec via insertion of an already existing key into kernel keyringUAF in XCeive driver, local DoS / code exec (crash)Race condition in generic SCSI -> Local DoS (crash) / code execNULL ptr dereference in ocfs2 -> Local DoS (crash)Race condition in ALSA handling of ioctls -> Local DoS via deadlockRace condition in ALSA -> UAF / out of bounds read -> Local DoS (crash) / code execBuffer overflow in NFC LLCP impl -> remote DoS / code exec[USN-3777-3] Linux kernel (Azure) vulnerabilities
8 CVEs addressed in Xenial, BionicCVE-2018-6555CVE-2018-6554CVE-2018-3639CVE-2018-14633CVE-2017-5715CVE-2018-15572CVE-2018-15594CVE-2018-17182Corresponding fixes for Azure Cloud specific kernel as covered in Episode 7for standard Bionic kernel
[USN-3799-1] MySQL vulnerabilities
21 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-3284CVE-2018-3283CVE-2018-3282CVE-2018-3278CVE-2018-3277CVE-2018-3276CVE-2018-3251CVE-2018-3247CVE-2018-3200CVE-2018-3187CVE-2018-3185CVE-2018-3174CVE-2018-3173CVE-2018-3171CVE-2018-3162CVE-2018-3161CVE-2018-3156CVE-2018-3155CVE-2018-3144CVE-2018-3143CVE-2018-3133New upstream versions of MySQL for all supported releases to fix multiplevulnerabilities, add features and possible incompatible changes
Trusty: 5.5.62Xenial, Bionic & Cosmic: 5.7.24[USN-3800-1] audiofile vulnerabilities
2 CVEs addressed in TrustyCVE-2018-17095CVE-2018-13440DoS (crash) and possible code execution via specially crafted audio files[USN-3801-1] Firefox vulnerabilities
12 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2018-12397CVE-2018-12396CVE-2018-12395CVE-2018-12403CVE-2018-12402CVE-2018-12401CVE-2018-12399CVE-2018-12398CVE-2018-12393CVE-2018-12392CVE-2018-12390CVE-2018-12388Firefox 63Includes fixes for a range of issues, most severe is possible RCEAlso fixes for WebExtensions in Firefox - to exploit need to install amalicious extension - then could privilege escalation or local code execution
[USN-3802-1] X.Org X server vulnerability
1 CVEs addressed in Xenial, Bionic, CosmicCVE-2018-14665Incorrect permissions check for 2 command-line arguments (-modulepath and -logfile)On some platforms (not Ubuntu) Xorg itself is setuidCan then use these command-line options to overwrite arbitrary files etc -> privilege escalation to root via say overwrite of /etc/shadowGenerated a lot of press - BUT missed the distinction that Xorg is not really setuid on UbuntuWe use Xorg.wrap as setuid to first run and drop permissions if using KMS driverThis is the case for the vast majority of drivers, and for almost all free driversSo most Ubuntu users unaffected by this vulnerabilitySpecial Friday release :)Goings on in Ubuntu Security Community
Hiring
Ubuntu Security Engineer
https://boards.greenhouse.io/canonical/jobs/1158266Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter