Episode 232

Episode 232

Update: 2024-07-05
Share

Description

Overview


This week we deep-dive into one of the best vulnerabilities we’ve seen in a long
time regreSSHion - an unauthenticated, remote, root code-execution vulnerability
in OpenSSH. Plus we cover updates for Plasma Workspace, Ruby, Netplan,
FontForge, OpenVPN and a whole lot more.


This week in Ubuntu Security Updates


39 unique CVEs addressed


[USN-6843-1] Plasma Workspace vulnerability (01:23 )



  • 1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)


  • KDE Session Manager - used for restoring previously running applications at next boot

  • Provides ability to clients to connect to it via Inter-Client Exchange (ICE)
    protocol - protocol within X for allowing X clients to interact with
    one-another

  • Since X supports remote clients, is important to authenticate connections - in
    this case KDE SM would authenticate to ensure the connection was coming from
    the local machine - but this could then allow any local user to connect to
    another users SM and hence use the session management features to set some
    arbitrary application to be run when the session is restored - as that other
    user


[USN-6852-1, USN-6852-2] Wget vulnerability (02:42 )



  • 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)


  • mishandled semicolons in userinfo of a URL - this is the user@host:port
    combination - so would possibly then use a different hostname than the one the
    user expected


[USN-6853-1] Ruby vulnerability (03:12 )



  • 1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)


  • Provides methods ungetbyte()/ungetc() to push-back characters on an IO
    stream - would possibly read beyond the end of the buffer - OOB read


[USN-6851-1] Netplan vulnerabilities (03:37 )



  • 1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)


  • Two different issues

    • When configuring a Wireguard interface, would write the wireguard private
      key into the netplan interface configuration - but would then leave this
      with world-readable permissions

    • This can either be specified as the filename to the private key OR the
      private key itself - so if had chosen to specify the actual private key,
      this is now world-readable to any other user

      • Fixed to use restrictive permissions on the generated configuration files
        and to fixup any existing ones as well



    • Failed to escape control characters in various backend files - a malicious
      application that is able to create a netplan configuration could then abuse
      this to get code execution as netplan




[USN-6851-2] Netplan regression



  • Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)

  • Failed to properly do the permissions fixup on already existing files


[USN-6854-1] OpenSSL vulnerability (05:10 )



  • 1 CVEs addressed in Jammy (22.04 LTS)


  • Related to a historical vulnerability - https://dheatattack.gitlab.io/ - CVE-2002-20001

  • DoS against Diffie-Hellman key exchange protocol - during key negotiation a
    client can trigger expensive CPU calculations -> CPU-based DoS


[USN-6856-1] FontForge vulnerabilities (05:50 )



  • 2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10)


  • Uses various external utilities to do things like decompress archive files etc

  • However, would do this via the system() system-call - which spawns a shell -
    so if a filename contained any shell metacharacters, could then just easily
    get arbitrary code execution

  • Changed to use the utility functions from glib that do not spawn a shell and
    instead just exec() the expected command directly


[USN-6857-1] Squid vulnerabilities (06:48 )



[USN-6566-2] SQLite vulnerability



[USN-5615-3] SQLite vulnerability



[USN-6855-1] libcdio vulnerability (06:58 )



  • 1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic ESM (18.04 ESM), Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)


  • ISO file parser - used strcpy() instead of strncpy() so could be made to quite
    easily achieve buffer overflow and hence possible code-execution


[USN-6858-1] eSpeak NG vulnerabilities (07:33 )



[USN-6844-2] CUPS regression (07:51 )



[USN-6860-1] OpenVPN vulnerabilities (07:57 )



  • 2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Mantic (23.10), Noble (24.04 LTS)
Comments 
loading
In Channel
Episode 243

Episode 243

2024-12-2024:00

Episode 242

Episode 242

2024-11-2919:40

Episode 241

Episode 241

2024-11-1418:16

Episode 240

Episode 240

2024-10-3136:22

Episode 239

Episode 239

2024-10-1839:16

Episode 238

Episode 238

2024-10-0431:39

Episode 237

Episode 237

2024-09-2016:16

Episode 236

Episode 236

2024-09-0618:23

Episode 235

Episode 235

2024-08-2317:40

Episode 234

Episode 234

2024-08-0929:11

Episode 233

Episode 233

2024-08-0224:07

Episode 232

Episode 232

2024-07-0529:20

Episode 231

Episode 231

2024-06-2819:00

Episode 230

Episode 230

2024-06-2021:12

Episode 229

Episode 229

2024-05-3113:22

Episode 228

Episode 228

2024-05-2415:33

Episode 227

Episode 227

2024-05-0324:41

Episode 226

Episode 226

2024-04-1923:59

Episode 225

Episode 225

2024-04-1219:42

Episode 224

Episode 224

2024-04-0528:49

loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 232

Episode 232

Ubuntu Security Team