Overview
This week we cover security updates for NTP, Brotli, Spice, the Linux
kernel (including BleedingTooth) and a FreeType vulnerability which is
being exploited in-the-wild, plus we talk about the NSAs report into the
most exploited vulnerabilities as well as the release of Ubuntu 20.10
This week in Ubuntu Security Updates
[USN-4559-1] Samba update [01:04]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-1472 Follow up to USN-4510-1 for “ZeroLogon” - that updated changed default toenable secure channel - this one adds support for specifying per-machine
insecure netlogon usage plus additional hardening to check for possible
attacks from the client-specified challenge if have manually enabled
insecure channel in configuration
[USN-4563-1] NTP vulnerability [01:48]
2 CVEs addressed in Bionic (18.04 LTS)CVE-2019-8936 CVE-2018-7182 Fix for previous CVE-2018-7182 introduced a possible NULL ptr deref thatcould be triggered by a malicious client -> DoS
[USN-4568-1] Brotli vulnerability [02:12]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-8927 Compression library / tool from Google designed for text compression,especially for web fonts etc
Buffer overflow due to an integer overflow when using the one-shotdecompression option on attacker controlled data
[USN-4570-1] urllib3 vulnerability [03:00]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-26137 Possible CRLF injection if an attacker can control the request methodused in a call to urllib3 - can specify additional parameters such as
Host and Remainder after an injected CRLF to cause the request to
misbehave
[USN-4572-1, USN-4572-2] Spice vulnerability [03:41]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-14355 Protocol for doing remote VM access - multiple buffer overflows indecoding of QUIC image compression algorithm - and this affected both the
client and server side - DoS, RCE etc
[USN-4576-1] Linux kernel vulnerabilities [04:36]
6 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-25641 CVE-2020-25285 CVE-2020-16120 CVE-2020-14385 CVE-2020-14314 CVE-2020-16119 [USN-4577-1] Linux kernel vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS)CVE-2020-16120 CVE-2020-16119 [USN-4578-1] Linux kernel vulnerabilities
7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-26088 CVE-2020-25212 CVE-2020-16120 CVE-2020-14314 CVE-2019-19448 CVE-2018-10322 CVE-2020-16119 [USN-4579-1] Linux kernel vulnerabilities
4 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS)CVE-2020-25285 CVE-2020-14314 CVE-2018-10322 CVE-2020-16119 [USN-4580-1] Linux kernel vulnerability
1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM)
CVE-2020-16119 DCCP protocol mishandled reuse of sockets, leading to a UAF - since can
be done by a local user could lead to root code execution, priv esc etc -
was reported to Canonical and we worked with upstream kernel devs on
[LSN-0072-1] Linux kernel vulnerability
7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-16120 CVE-2020-16119 CVE-2020-14386 CVE-2020-12114 CVE-2020-11935 CVE-2020-11494 CVE-2020-0067 DCCP UAFAF_PACKET buffer overflow (Episode 90)Livepatched in the following kernels:Ubuntu 18.04 LTSaws - 72.1generic - 72.1lowlatency - 72.1oem - 72.1Ubuntu 20.04 LTSaws - 72.1aws - 72.2azure - 72.1azure - 72.2gcp - 72.1gcp - 72.2generic - 72.1generic - 72.2lowlatency - 72.1lowlatency - 72.2Ubuntu 16.04 LTSaws - 72.1generic - 72.1lowlatency - 72.1Ubuntu 14.04 ESMgeneric - 72.1lowlatency - 72.1[USN-4591-1] Linux kernel vulnerabilities [06:20]
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-12352 CVE-2020-12351 [USN-4592-1] Linux kernel vulnerabilities
3 CVEs addressed in Bionic (18.04 LTS)CVE-2020-24490 CVE-2020-12352 CVE-2020-12351 BleedingTooth vulnerabilityAnnounced by Intel, discovered by a security researcher at Google - notmuch heads up to distros, kernel team worked quickly to respin affected
kernels (>= 4.8) over the weekend
Originally was mention on twitter that Google were going to publish ablog post with more details but this got held back to give time for
distros etc to patch
[USN-4593-1] FreeType vulnerability [07:30]
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-15999 Integer overflow -> heap buffer overflowReported by Google to Freetype upstream with the comment that it wasbeing exploited in the wild
The patch simply moves a check that was added originally to fix anotherCVE a few lines higher since it still provided the chance of an integer
overflow -> heap buffer overflow
Update released for Ubuntu within 16h of the original report to theupstream FreeType developers
[USN-4558-1] libapreq2 vulnerabilities
1 CVEs addressed in Bionic (18.04 LTS)CVE-2019-12412 [USN-4557-1] Tomcat vulnerabilities
7 CVEs addressed in Xenial (16.04 LTS)CVE-2016-8735 CVE-2016-6816 CVE-2016-6797 CVE-2016-6796 CVE-2016-6794 CVE-2016-5018 CVE-2016-0762 [USN-4560-1] Gon gem vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2020-25739 [USN-4561-1] Rack vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS)CVE-2020-8184 CVE-2020-8161 [USN-4562-1] kramdown vulnerability
1 CVEs addressed in Focal (20.04 LTS)CVE-2020-14001 [USN-4569-1] Yaws vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS)CVE-2020-24916 CVE-2020-24379 [USN-4571-1] rack-cors vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2019-18978 [USN-4564-1] Apache Tika vulnerabilities
2 CVEs addressed in Xenial (16.04 LTS)CVE-2020-1951 CVE-2020-1950 [USN-4565-1] OpenConnect vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2019-16239 [USN-4566-1] Cyrus IMAP Server vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS)CVE-2019-19783 CVE-2019-11356 [USN-4567-1] OpenDMARC vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2019-16378 [USN-4573-1] Vino vulnerabilities
7 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-14404 CVE-2020-14403 CVE-2020-14402 CVE-2020-14397 CVE-2019-15681 CVE-2018-7225 CVE-2014-6053 [USN-4574-1] libseccomp-golang vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2017-18367 [USN-4575-1] dom4j vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2020-10683 [USN-4581-1] Python vulnerability
1 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2020-26116 [USN-4582-1] Vim vulnerabilities
2 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS)CVE-2019-20807 CVE-2017-17087 [USN-4583-1] PHP vulnerabilities
2 CVEs addressed in Precise ESM (12.04 ESM), Trusty ESM (14.04 ESM), Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-7070 CVE-2020-7069 [USN-4589-1] containerd vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2020-15157 [USN-4589-2] Docker vulnerability
1 CVEs addressed in Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)CVE-2020-15157 [USN-4585-1] Newsbeuter vulnerabilities
2 CVEs addressed in Xenial (16.04 LTS)CVE-2017-14500 CVE-2017-12904 [USN-4584-1] HtmlUnit vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2020-5529 [USN-4546-2] Firefox regressions
Affecting Xenial (16.04 LTS), Bionic (18.04 LTS), Focal (20.04 LTS)[USN-4590-1] Collabtive vulnerability
1 CVEs addressed in Xenial (16.04 LTS)CVE-2015-0258 [USN-4586-1] PHP ImageMagick vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2019-11037 [USN-4594-1] Quassel vulnerabilities
2 CVEs addressed in Bionic (18.04 LTS)CVE-2018-1000179 CVE-2018-1000178 [USN-4595-1] Grunt vulnerability
1 CVEs addressed in Bionic (18.04 LTS)CVE-2020-7729 Goings on in Ubuntu Security Community
NSA Report on 25 most exploited CVEs by Chinese State-Sponsored Actors [09:51]
https://twitter.com/NSACyber/status/1318568065769132035https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDFMost apply to appliances (network gateway devices) or WindowsOnly 1 applies open source software for LinuxCVE-2018-6789 - Exim 4.90.1 - CVE was public 7 February 2018, patchedin affected Ubuntu releases 5 days later on 12 February 2018
oss-security posting claims ‘unsure of severity, an exploit is difficult’The researcher which found it provided a very detailed write-up aboutthe low-level details to exploit it on 6th March 2018 but without an
actual PoC (although all details are there to reconstruct one)
First public PoC seems to be on 2 May 2018 - there have been otherssince (exploitdb, github etc)
So why does this one get exploited over others?Availability of multiple PoC?Have other distros not patched?Are there lots of installs that are from source and have never beenupdated?
Lots of old docker images of various exim with lots of Pulls(although the most popular one was updated 9 days ago)
Shows should always get your open source from a trusted, maintaineddownstream like Ubuntu
Ubuntu 20.10 Groovy Gorilla Release [13:50]
https://lists.ubuntu.com/archives/ubuntu-announce/2020-October/000263.htmlGet in contact
[email protected]#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter