Overview
This week we look at updates to cover the latest Intel CPU vulnerabilities
(MDS - aka RIDL, Fallout, ZombieLoad), plus other vulnerabilies in
PostgreSQL, ISC DHCP, Samba and more, whilst special guest this week is
Seth Arnold from the Ubuntu Security Team to talk Main Inclusion Review
This week in Ubuntu Security Updates
[USN-3972-1] PostgreSQL vulnerabilities
2 CVEs addressed in Xenial, Bionic, Cosmic, DiscoCVE-2019-10130CVE-2019-10129Stores statistics for columns by sampling values from that columnSecurity policy allows to restrict users from viewing particular rowsBut sampling would not take into account security policyUser could craft a leaky operator which would return the sampled dataand effectively bypass the security policy
Fixed to only allow non-leakproof operators to use sampled data when norelevant row security policies in place
Arbitrary server memory able to be read by executing a crafted INSERTstatement on a partitioned table (only affects PostgreSQL 11 so only
Disco)
[USN-3973-1] DHCP vulnerability
1 CVEs addressed in Bionic, CosmicCVE-2019-6470DHCP server could crash due to mismatch in BIND internal memorymanagement and DHCP server code
BIND in Bionic + Cosmic contained a change which zeroed out an internalindex to indicate it was unused - however 0 is still a valid index in the
DHCP server codebase - and so this could cause a use-after free (since
would be free’d, index set to 0 by BIND lib but then still used later
since 0 is valid). Instead changed to track indexes correctly to account
for this behaviour.
[USN-3974-1] VCFtools vulnerabilities
3 CVEs addressed in XenialCVE-2018-11130CVE-2018-11129CVE-2018-11099Tools for working with VCF files (1000 Genomes Project)Fuzzed in conjunction with AddressSanitizer in clang using crafted VCF filesRead-based heap buffer overflow - crash, DoS2 * use after free -> crash, DoS / code execution[USN-3975-1] OpenJDK vulnerabilities
4 CVEs addressed in Xenial, Bionic, Cosmic, DiscoCVE-2019-2698CVE-2019-2697CVE-2019-2684CVE-2019-26022 affecting both openjdk-11 and openjdk-8CPU DoS via BigDecimal implementation operating on particular valuesSandbox escape due to incorrect skeleton class selection in the RMI registry2 sandbox escapes affecting only openjdk-8 via the 2D graphics component[USN-3976-1, USN-3976-2] Samba vulnerability
1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, DiscoCVE-2018-16860Kerberos (as used in AD) contains an extension to allow a service torequest a Kerberos ticket to itself on behalf of a non-Kerberos
authenticated user (allows to use Kerberos for all internal code-paths)
Can be proxied over the network so that a privileged server can proxy onbehalf of the non-Kerberos authenticated user
This proxied request contains a checksum (which can be keyed to preventspoofing) - BUT this is not enforced - so an attacker can intercept the
proxied request and rewrite the user name to any other one in the KDC AND
replace the checksum with a simple CRC32 - as this can be computed
without any prior knowledge
[USN-3986-1] Wireshark vulnerabilities
9 CVEs addressed in Xenial, Bionic, CosmicCVE-2019-9214CVE-2019-9209CVE-2019-9208CVE-2019-10903CVE-2019-10901CVE-2019-10899CVE-2019-10896CVE-2019-10895CVE-2019-10894Updated to latest 2.6.8 release to fix many issues in various packetdissectors that would cause wireshark to crash
[USN-3988-1] MediaInfo vulnerabilities
2 CVEs addressed in Bionic, Cosmic, DiscoCVE-2019-11373CVE-2019-11372CLI tool for reading metadata from various audio/video files2* OOB read -> crash, DoS[LSN-0051-1] Linux kernel vulnerability
4 CVEs for Microarchitectural Data Sampling (MDS) vulnerabilitiesCVE-2019-11091CVE-2018-12130CVE-2018-12127CVE-2018-12126https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDShttps://www.redhat.com/en/blog/understanding-mds-vulnerability-what-it-why-it-works-and-how-mitigate-ithttps://www.redhat.com/en/blog/deeper-look-mds-vulnerabilityToo invasive to be addressed by Livepatch - requires updates to thekernel and new microcode to fix
Intel CPUs contain various microarchitectural elements - store buffers,load ports, fill buffers - which get used to complete architectural
operations (read from an address etc)
4 CVEs due to the different use of these different buffers in thevarious techniques
RIDL (Rogue in-flight data load) - fill buffers and load portsFallout - store buffersZombieLoad - independent discovery of fill-buffer variant of RIDLThese get reused across operations, and in particular get reused acrosshyperthreads executing on the same CPU core
A malicious process can use speculative execution sampling techniques toinfer the contents of one of these microarchitectural buffers - so could
see data from a process that had previously been executing on the same
CPU core OR in the case of HT can see data from a process executing
concurrently on the same core
In the case of a single core can be fixed by first adding new behaviourto the unused VERW instruction to clear these buffers as a microcode
update
Then updating the Linux kernel to call this new VERW instruction whenswitching tasks, VMs etc
However, does not mitigate in the case of SMTSo only way to properly mitigate is to disable SMT as wellIn the case of virtualisation, the guest does the task switching so itneeds to clear these buffers - update to QEMU + libvirt to expose this
new CPU capability to the guest so that it can perform the flushing
itself
Kernel + QEMU updates also contain fixes for other CVEsKernels updated for all supported releases including the HWE kernels[USN-3977-1] Intel Microcode update
4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, DiscoCVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3978-1] QEMU update
7 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, DiscoCVE-2019-9824CVE-2019-5008CVE-2019-11091CVE-2018-20815CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3979-1] Linux kernel vulnerabilities
11 CVEs addressed in DiscoCVE-2019-9503CVE-2019-9500CVE-2019-3887CVE-2019-3882CVE-2019-3874CVE-2019-1999CVE-2019-11683CVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3980-1, USN-3980-2] Linux kernel vulnerabilities
10 CVEs addressed in Bionic (HWE), CosmicCVE-2019-9503CVE-2019-9500CVE-2019-3887CVE-2019-3882CVE-2019-3874CVE-2019-11091CVE-2018-16884CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3981-1, USN-3981-2] Linux kernel vulnerabilities
9 CVEs addressed in Trusty ESM (HWE), Xenial (HWE), BionicCVE-2019-9503CVE-2019-9500CVE-2019-3882CVE-2019-3874CVE-2019-11091CVE-2018-16884CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3982-1, USN-3982-2] Linux kernel vulnerabilities
6 CVEs addressed in Trusty ESM (Xenial HWE), XenialCVE-2019-3882CVE-2019-3874CVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3983-1, USN-3983-2] Linux kernel vulnerabilities
4 CVEs addressed in Precise ESM (Trusty HWE), Trusty ESMCVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3984-1] Linux kernel vulnerabilities
4 CVEs addressed in Precise ESMCVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130[USN-3985-1, USN-3985-2] libvirt update
4 CVEs addressed in Trusty ESM, Xenial, Bionic, Cosmic, DiscoCVE-2019-11091CVE-2018-12126CVE-2018-12127CVE-2018-12130Goings on in Ubuntu Security Community
Main inclusion review security code audits discussion with Seth Arnold
Hiring
Robotics Security Engineer
https://boards.greenhouse.io/canonical/jobs/1550997Security Certifications Engineer
https://boards.greenhouse.io/canonical/jobs/1660658Get in contact
[email protected]#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter