Episode 231

Episode 231

Update: 2024-06-28
Share

Description

Overview


A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds this
week, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,
Roundcube, the Linux kernel and more.


This week in Ubuntu Security Updates


175 unique CVEs addressed


[USN-6842-1] gdb vulnerabilities (01:10 )



  • 6 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)


  • a couple of these are inherited from binutils as they share that code -
    parsing of crafted ELF executables -> NULL ptr deref or possible heap based
    buffer overflow -> DoS/RCE

  • other stack and heap buffer overflows as well - parsing of crafted ada files
    and crafted debug info files as well -> DoS/RCE


[USN-6845-1] Hibernate vulnerability (02:12 )



  • 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS)


  • Object relational-mapping (ORM) library for Java

  • SQL injection in the JPA Criteria API implementation - could allow unvalidated
    literals when they are used in the SQL comments of a query when logging is
    enabled - fixed by properly escaping comments in this case


[USN-6846-1] Ansible vulnerabilities (02:46 )



  • 2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS)


  • Possibly would leak the password into log file when using the AWS EC2 module
    since failed to validate the tower_callback (nowadays is called aap_callback -
    Ansible Automation Platform) parameter appropriately

  • Allows to mark variables as unsafe - in that they may come from an external,
    untrusted source - won’t get evaluated/expanded when used to avoid possible
    info leaks etc - various issues where ansible would fail to respect this and
    essentially forget they were tagged as unsafe and end up exposing secrets as a
    result


[USN-6844-1] CUPS vulnerability (04:08 )



  • 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)


  • When starting, cups would arbitrarily chmod the socket specified as the Listen
    parameter to make it world-writable - if this was a symlink, would then make
    the target of the symlink world-readable - in general the cups config file is
    only writable by root so requires some other vuln to be able to exploit it
    where you can get write access to the config file to exploit it OR be able to
    replace the regular cups socket path with a user-controlled symlink - but if
    you can, then you can even change the cups config itself to be world-writable
    and hence modify other parameters like the user and group that cups should run
    as, as well as a crafted FoomaticRIPCommandLine then can run arbitrary commands
    as root


[USN-6849-1] Salt vulnerabilities (06:20 )



  • 2 CVEs addressed in Trusty ESM (14.04 ESM)


  • Failed to properly validate paths in some methods and also failed to restrict
    access to other methods, allowing them to be used without authentication -
    could then either allow arbitrary directory access or the ability to retrieve
    tokens from the master or run arbitrary commands on minions


[USN-6746-2] Google Guest Agent and Google OS Config Agent vulnerability (06:44 )



  • 1 CVEs addressed in Noble (24.04 LTS)


  • A vuln in the embedded golang protobuf module - when parsing JSON could end up
    in an infinite loop -> DoS


[USN-6850-1] OpenVPN vulnerability (07:04 )



[USN-6847-1] libheif vulnerabilities (07:36 )



[USN-6848-1] Roundcube vulnerabilities (08:21 )



  • 4 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)


  • webmail front-end for IMAP

  • 2 different possible XSS issues due to mishandling of SVG - email containing
    an SVG could embed JS that then gets loaded when the email is viewed

  • Also possible XSS through a crafted user preference value - similarly through
    a crafted Content-Type/Content-Disposition header which can be used for
    attachment preview/download


[USN-6819-4] Linux kernel (Oracle) vulnerabilities (09:21 )


In Channel
Episode 243

Episode 243

2024-12-2024:00

Episode 242

Episode 242

2024-11-2919:40

Episode 241

Episode 241

2024-11-1418:16

Episode 240

Episode 240

2024-10-3136:22

Episode 239

Episode 239

2024-10-1839:16

Episode 238

Episode 238

2024-10-0431:39

Episode 237

Episode 237

2024-09-2016:16

Episode 236

Episode 236

2024-09-0618:23

Episode 235

Episode 235

2024-08-2317:40

Episode 234

Episode 234

2024-08-0929:11

Episode 233

Episode 233

2024-08-0224:07

Episode 232

Episode 232

2024-07-0529:20

Episode 231

Episode 231

2024-06-2819:00

Episode 230

Episode 230

2024-06-2021:12

Episode 229

Episode 229

2024-05-3113:22

Episode 228

Episode 228

2024-05-2415:33

Episode 227

Episode 227

2024-05-0324:41

Episode 226

Episode 226

2024-04-1923:59

Episode 225

Episode 225

2024-04-1219:42

Episode 224

Episode 224

2024-04-0528:49

loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 231

Episode 231

Ubuntu Security Team