Ubuntu Security Podcast artwork

Episode 165

Ubuntu Security Podcast

English - June 24, 2022 06:32 - 34 minutes - 21 MB - ★★★★★ - 10 ratings
Technology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Previous Episode: Episode 164
Next Episode: Episode 166

This week Camila dives into the details on some of the most prolific
buzzwords flying around the cybersecurity community, plus we cover security
updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
more.

Overview

This week Camila dives into the details on some of the most prolific
buzzwords flying around the cybersecurity community, plus we cover security
updates for BlueZ, the Linux kernel, Intel Microcode, QEMU, Apache and
more.


This week in Ubuntu Security Updates

58 unique CVEs addressed


[USN-5481-1] BlueZ vulnerabilities [00:38]

Affecting Bionic (18.04 LTS), Focal (20.04 LTS)
Not all vulnerabilities / security issues get CVEs ;)
Possible OOB read in A/V Remote Control Protocol profile
Possible OOB write and a possible 1-byte buffer overflow in A/V
Distribution Transport Protocol profile

[LSN-0087-1] Linux kernel vulnerability [01:20]

2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)

CVE-2022-1972
CVE-2022-1966

2 different netfilter issues

OOB write (can be mitigated by disabling unprivileged user namespaces)
UAF

Kernel type
22.04
20.04
18.04
16.04
14.04

aws

87.1
87.2
87.1

aws-5.4


87.1

aws-hwe



87.2

azure

87.1

87.1

azure-4.15


87.1

azure-5.4


87.1

gcp
87.1
87.1

87.1

gcp-4.15


87.1

gcp-5.4


87.1

generic-4.15


87.1
87.1

generic-4.4



87.1
87.1

generic-5.4

87.1
87.1

gke
87.1
87.1


gke-4.15


87.1

gke-5.4


87.1

gkeop

87.1


gkeop-5.4


87.1

ibm
87.1
87.1


linux
87.1



lowlatency
87.1



lowlatency-4.15


87.1
87.1

lowlatency-4.4



87.1
87.1

lowlatency-5.4

87.1
87.1

oem


87.1

canonical-livepatch status
[USN-5485-1] Linux kernel vulnerabilities [02:14]

3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2022-21166
CVE-2022-21125
CVE-2022-21123

All GA and some HWE kernels
Intel MMIO stale data

Mentioned in passing in last week’s episode - kernels are now available
as well as microcode to mitigate these issues - once have installed the
new kernel can see if vulnerable via a new sysfs file:

cat /sys/devices/system/cpu/vulnerabilities/mmio_stale_data

Will display either Not affected, Vulnerable (no mitigation),
Vulnerable: Clear CPU buffers attempted, no microcode or Mitigation: Clear CPU buffers if have mitigation enabled and microcode to support
it
Will also display info on SMT since if vulnerable then need to disable
SMT to be completely protected
Mitigation comes with a performance hit so if not doing untrusted
virtualisation can perhaps disable it (but please do your own research
as needed 😉) via kernel command-line option:

mmio_stale_data=full # or 'full,nosmt' or 'off'

To have complete mitigation need to enable clear buffers and disable
SMT on affected CPUs
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

[USN-5484-1] Linux kernel vulnerabilities [05:22]

5 CVEs addressed in Trusty ESM (14.04 ESM)

CVE-2022-21166
CVE-2022-21125
CVE-2022-21123
CVE-2021-39713
CVE-2022-21499

3.13 GA kernel for 14.04 ESM
2 recent high priority kernel vulns:

UAF due to race condition in network packet scheduler
Secure boot bypass through kgdb

Intel MMIO stale data

[USN-5486-1] Intel Microcode vulnerabilities [06:01]

9 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2022-21166
CVE-2022-21151
CVE-2022-21127
CVE-2022-21123
CVE-2021-33120
CVE-2021-33117
CVE-2021-0146
CVE-2021-0145
CVE-2021-0127

Latest intel-microcode release (20220510 / SPU 2022.1)
Originally mentioned 3 CVEs at release back in May
Now Intel have mentioned this is also required for mitigation of the MMIO
stale data issues as well

[USN-5483-1] Exempi vulnerabilities [07:08]

22 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2021-42532
CVE-2021-42531
CVE-2021-42530
CVE-2021-42529
CVE-2021-42528
CVE-2021-40732
CVE-2021-40716
CVE-2021-39847
CVE-2021-36064
CVE-2021-36058
CVE-2021-36056
CVE-2021-36055
CVE-2021-36054
CVE-2021-36053
CVE-2021-36052
CVE-2021-36051
CVE-2021-36050
CVE-2021-36048
CVE-2021-36047
CVE-2021-36046
CVE-2021-36045
CVE-2018-12648

xmp metadata parsing library

used by EOG, tracker, nemo and others

Usual mix of issues from memory unsafe languages - Stack and heap-based
OOB reads / writes, integer overflows etc

RCE / DoS

[USN-5482-1] SPIP vulnerabilities [07:55]

7 CVEs addressed in Bionic (18.04 LTS), Impish (21.10)

CVE-2022-26847
CVE-2022-26846
CVE-2021-44123
CVE-2021-44122
CVE-2021-44120
CVE-2021-44118
CVE-2020-28984

Thanks again to Luís Infante da Câmara for preparing the update for
bionic
website engine

CSRF, XSS, info disclosure, RCE

[USN-5487-1] Apache HTTP Server vulnerabilities [08:28]

7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2022-31813
CVE-2022-30556
CVE-2022-30522
CVE-2022-29404
CVE-2022-28615
CVE-2022-28614
CVE-2022-26377

Request smuggling, RCE, DoS, expose sensitive info etc

[USN-5488-1] OpenSSL vulnerability [08:53]

1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2022-2068

c_rehash - very similar to CVE-2022-1292 (Episode 159) - possible code
execution if running it against certificates with crafted file names -
unlikely anyone is doing this in practice, plus upstream say this is
deprecated and instead should just use openssl rehash instead

[USN-5489-1] QEMU vulnerabilities [09:57]

7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 LTS)

CVE-2022-26354
CVE-2022-26353
CVE-2022-0358
CVE-2021-4207
CVE-2021-4206
CVE-2021-3929
CVE-2021-3507

Various guest -> host issues via emulation drivers for various devices
(floppy disk, NVME controller, QXL display device, virtio-net,
vhost-vsock etc)

crash host QEMU, code execution, change file ownership

Decoding cybersecurity buzzwords (part 1) [10:45]

From ransomware to botnets and phishing, Camila dives into the details on
some of the most prolific buzzwords flying around the cybersecurity
community

Transcript

Hello listener! Welcome to another segment o’mine in the Ubuntu Security
Podcast! It’s been a while, but I have returned to bring some real buzz
into today’s episode! How, you might ask? The buzz will come from the
buzzwords we will be exploring…cyber security buzzwords to be more
specific. Let’s start by defining what a buzzword is, for those who might
not know this term: a buzzword is a word - or a term - that, as the name
suggests, is currently buzzing. It’s a word that is popular within the
scope of its usage. Everyone says it all the time, and it seems like you
can’t escape it. The most popular articles about topics in a specific field
use it every other sentence, people put them in big, bold and shiny letters
right there on the title of their scientific papers, and even your baby’s
first words end up being that buzzword because they end up hearing it more
than the eternal and classic infant buzz phrase “Say mama!”. A buzzword is,
therefore, a fashionable word at a specific point in time. Every field has
its own, and cyber security is not exempt from them. Today, I want to
actually explore some of the cyber security buzzwords we have and actually
try to demystify them, as buzzwords can become something much more absurd
or grandiose than they actually are just because everyone is choosing to
use them. I think we all remember the era of the super low-rise jeans and
can agree (or maybe agree to disagree) that just because something is being
used by everyone out there, it does not mean it deserves all the hype…of
course that is my own opinion on the subject matter that is low-rise
jeans. As for the buzzwords, the statement stands! So, let’s bring up some
of these super duper amazingly popular buzzwords in to play here, let’s
actually define what they are for the ones out there that might not be
cyber-security wizards, and let’s remove the buzzing that these buzzwords
might have brought into our minds, shall we?


Buzzword #1: ransomware. Aaah, ransomware. You see this simple and yet
deadly word everywhere. “Defend yourself against ransomware!”, “Ransomware
might be just around the corner!”, “No need to fear ransomware
anymore!”. It was the dawn of 2017 when ransomware became a thing to people
outside of the cyber security community because of the infamous WannaCry
malware. That picture with a red pop-up window telling you that all of your
files had been encrypted and could only be recovered after some type of
crypto currency payment was made to the attackers was absolutely
everywhere! And after that, the ransomware wave only got stronger, with new
and improved types showing up all the time, an honorable mention being the
Petya variants. Anyway, since WannaCry was such a big deal at the time, and
people were so scared of it after it left behind its trail of mayhem and
huge amounts of lost data, ransomware became THE word chosen by various
cybersecurity companies to describe that which is your main enemy in the
digital world, the supervillain in this installment of the cyber security
movie series that is actually our real lives. All defense tools now
implement some type of measure against ransomware, because if they don’t,
you know that clients of said tool will ask “but what about defending
against ransomware?”, because that, my friends, is the buzzword that comes
to their minds. Like the word “computer virus” in the early 2000s. Computer
viruses still exist, but you don’t see people freaking out about it
anymore, because now we have the “antivirus”. Phew, problem solved, right?
So no need to have this as a buzzword anymore. However, just like computer
viruses existed before the 2000s and still exist to this day, ransomware
also existed before WannaCry and much worse versions of it will continue to
exist while there still are vulnerabilities and hackers out there, which is
to say…probably forever. The only difference is, we now live in a time
where people seem to care about it a little bit more, maybe because they
are not implementing security measures to be safe against it, or at least
they are not doing it very well. But I am getting ahead of myself
here. Let’s first talk about what ransomware really is, which is actually
something very simple to do: a ransomware is a malware, as a computer virus
is also a malware. A malware is a ‘malicious software’, or, in other words,
a software that executes in a computing device and that does things that
the owner of the device might not want it to do, like…for example,
encrypt all of your files and not allow you to access them. That is what
ransomware does, in most cases. The main idea is, a ransomware will be a
malicious software that will prevent you from accessing your files until
you pay some amount of money to the malicious entity that was able to get
that ransomware to run in your network devices in the first place…so,
until you pay a ransom to the kidnapper of your data. Of course this only
works if you have someone on the other side waiting to exchange the money
for the key that will decrypt your files, or else, you could simply have a
very destructive trojan, or worm, or whatever other malware that is
combined with the file encrypting functionality in order for the malicious
software itself to spread through the network before actually causing the
data harm it does. The question now is, whatever is the ransomware-hybrid
malware that targeted you and your network, the only way to recover the
data you lost, the data as it was during the time of total encryption, is
to pay the ransom. Should you? Cyber security professionals usually
recommend against paying ransom, as it only shows hackers that they can
continue launching ransomware attacks to get what they want. The correct
way to avoid your files from being forever lost after your network has been
infected by one of these nasty malwares is to recover data from the backup
server you set up…you did set up a backup server to store the backup for
all of your company data, right? I know, I know…not always it will be the
case that people will be able to set backups, and then, recovering all that
is lost might be a much more difficult task if you decide to not pay the
ransom. But come on…we live at a time where cyber security should no
longer be put in the benches, and you should be highly concerned about
possible attacks, especially attacks related to the ever popular buzzword
ransomware. Save some of your budget for backups, you won’t regret it.


Buzzword #2: botnets. ‘Botnet’ is an interesting buzzword because it opens
the door to many other tech buzzwords that are in everyone’s minds out
there right now…like crypto mining, for example. Why? Because you can use
botnets to perform crypto mining…you can also use botnets to spread
malware, including ransomware. Oh…and botnets…their participants
usually include lots of IoT devices! BAM, another buzzword right there! Now
would you look at that! Seems like instead of a buzzword, we actually have
a buzzword magnet in our hands ladies and gentlemen. So…yes, maybe
‘botnet’ is not the hottest buzzword out there right now, but I decided to
include it in the list because I feel like it is a disguised buzzword. What
do I mean by disguised? It’s the word that is in the subtitle for an
article named “CRYPTO MINING HACKER GANG CAUSES DAMAGES TO COMPANY X”, or
the word that is implied in a video that is named “IoT DEVICE Y SECURITY
VULNERABILITY ONCE AGAIN EXPOSED BY MASSIVE DENIAL OF SERVICE ATTACK”, or
even the word that is a part of a title or a conversation about cyber
security, cyber attacks and vulnerabilities, but it might not be the one in
big bold flashy fonts, like it was the case for our dearest friend
ransomware. But it all comes back to the botnets eventually. So what is a
botnet? As the name suggests, it is a network of bots! Wooow, could I get a
round of applause for that definition, please and thank you very much! When
we think about a robot, we think about a technological humanoid that speaks
in a digitalized voice and obeys commands without question, unless they are
actually trying to take over the planet and overthrow human supremacy…but
that is a topic for another podcast to maybe discuss. The point here is:
what is a computer if not a robot? No, it does not possess humanoid form
most of the time, but it does communicate with us through a digital screen
and it will execute commands that the software it is running tells it to,
this software being created and programmed by a human
being. So…yes…robots are computers, computers are robots, or at
least…fancy humanoid robots and even cute round cleaning robots need
computers to exist and computers are the basis to create a robot. So when
we say botnet, we are actually referring to a network of computers. A
network of computers, or a group of computers, which are all performing
some type of common activity, executing software with the same purpose… and
unfortunately for us, in this case it is a malicious purpose. Botnets are
created through the infection of computing devices. A hacker releases
malware on the Internet and this malware is able to propagate, infecting
various devices connected to our fairest of ladies, usually devices that
are vulnerable to some type of specific vulnerability. So, yes, once again
we have malwares being a problem and ruining our days…surprise,
surprise. Once infected, the device becomes a robot, a “mindless” soldier
in an army of many that will respond to a hacker, most likely the one that
created the malware. It connects back to this hacker, usually sending some
type of short and sweet - bitter sweet for us, that is - message to a
command and control server, which we can see as an HQ, but is actually
nothing more than an attacker controlled device. And then…it waits. It
continuously calls home to indicate that it is a part of the malicious
group of infected devices that are “at the hacker’s service”, and it
expects to eventually receive a message that will contain instructions
which will give it an attack target and an attack to launch on that
target. The malware that is running on the infected device, our bot, will
contain the code or will receive and process the code that will allow this
attack to be carried out, and then we have a huge amount of possibilities
that we can consider for this attack, one of them being: the bots could be
instructed to send absurd amounts of data through the network to a specific
target. The target device gets overwhelmed and the service it provides
through the network can no longer be accessed by legitimate users because
the device crashes. This is a denial of service attack, which is very hard
to stop at the source, as you have thousands of sources, most of which the
device owners don’t even have malicious intent. The devices got hacked and
are secretly and mercilessly being used to the advantage of the
attacker. Granted…the reason for the infection, the presence of the
vulnerability that initially caused this could be the owner’s fault. Maybe
they wouldn’t have been unwillingly attacking the server of their favorite
website had they applied that patch that recently came out for a critical
vulnerability, however, you can’t really call them the mastermind of it all
when all they did was keep a vulnerable computer, can you? Anyway, I might
leave that philosophical question for a later time…for now, another well
known use for botnets is crypto mining. Infect, divide and profit! Why use
your own computer and your own resources to mine crypto currency when you
have hundreds of thousands of unpatched IoT devices at your disposal to
mine for you? That’s what the hackers think…not me….just to be veeeery
clear. A botnet can also be used to spread ransomware. The bots worry about
creating other bots as well as infecting devices in their own local
networks that might make a hacker profit from a ransomware attack. And it
all ties in beautifully to create the most amazing of buzzword sentences:
Phishing campaign allows for creation of ransomware botnet!
Oh…wait…there is a buzzword in there we have yet to talk about…


Buzzword #3: phishing! Did you like how I introduced this one by just
name-dropping it previously? Since I gave it such a direct introduction,
let’s also give it a direct definition. Phishing is a type of social
engineering attack where an attacker throws what we can only call as the
equivalent to “bait” into the Internet “ocean” in hopes of hooking some
“fish”, in their fishing rods. So…the “fish” are like the victims of the
attack, if that wasn’t clear enough for you… Our situation therefore, is
kind of like real fishing, but in a different context, because here we are
looking at people getting fooled into clicking on links that will cause
them to access malicious websites, and then share sensitive information
like passwords and credit card numbers through that website, all because
they get fooled into doing it by a very clever attacker which is using of
their social engineering skills achieve this. They could also simply get
fooled into responding directly to a well crafted message with sensitive
information they wouldn’t even share with their own diaries! Or maybe just
with their diaries, but not other people. The question which remains is:
what is social engineering? To put it simply, a social engineer is someone
that knows how to “hack” the human psyche. To put it not so simply, it is
the art - can I call it that? - of manipulating other people into doing
something they might not want to have done in the first place. So, every
spy movie when you see the almighty main character get into a building they
shouldn’t by fooling the guard and making them believe they actually work
there because they are wearing a fancy suit and spilling out complex terms
to a phone…well that is social engineering. The super spy plays the part
and gives no time for the guard to think too much about whether they are
actually a legitimate authorized person or not, because when the guard
starts questioning it, they emphatically say something in the lines of “Oh
my god…I am going to be late to my meeting and you do not want
Mr. Whatever to hear about this’. Mr. Whatever is an actual big boss around
the place and Mr. Guard worries he will get fired if he doesn’t comply
immediately, so just this time, he skips the ID checking phase of the
process to let super spy waltz into the building unscathed. His fear of
getting fired was used against him in order to make him do something he
wouldn’t do were he thinking clearly, not affected by emotion: skip a part
of the identification process of a person wanting to access the
building. When we talk about spy movies of course we have a much more
interesting example than when we are talking about actual phishing
campaigns, but the underlying idea is the same in both. The difference is,
in phishing attacks, a hacker will usually send an e-mail or a text message
to a bunch of random people with a message that will toy with their
emotions somehow. They focus on quantity instead of quality because
eventually someone is bound to be freaked out by the email they get saying
that their bank account will be closed if they don’t immediately click the
link in the message and change their password using the form provided. They
click the link without paying attention to the website URL, which is not at
all related to the one of their bank’s actual website, and are redirected
to a webpage which looks exactly like the password changing page you would
get had you accessed this legitimate bank website. They input their data,
which is quickly sent to the attacker, because they are the actual entity
controlling the device behind said website, and now, this attacker has the
password to this person’s bank account. Fishing rod: fake email sent to
thousands of people saying the bank will close accounts that don’t change
their passwords. Bait: the human feeling of desperation one might get when
thinking about having their bank account suddenly be inaccessible, caused
by the wording and official looking appearance of the email message that
was sent. Fish who bite on that bait: people who believe this message and
don’t pay too much attention to the signs that indicate that it is
fake. Most times, people who are not that tech savvy and don’t even know
how it is possible that a fake website could have the same appearance as
the one from the actual bank. If it looks like the bank webpage, it can
only be the bank webpage…right? So…yes, I am unfortunately talking about
all of the grandmas out there, which end up being a very common victim of
these types of attacks. But do not get me wrong. I am not saying here that
if you are not a grandma that you are unaffected by phishing
attacks. Social engineering techniques go way beyond fear or desperation,
and anyone can be a target should a hacker strike the correct emotions on
this target. Remember a certain Nigerian prince who was asking for a small
sum of money only to return 10 times this amount to you as soon as their
investment worked? Greed can also be your downfall. So the main tip for
those that are worried about falling for phishing scams is simple: if
something looks like it is too good to be true, it probably is. Also…if
something seems too crazy to be true, maybe ask trustworthy people related
to the craziness in question if that message you are receiving is indeed
legitimate. So…for our bank situation, call your bank manager! Have more
than one information source and breathe before making any harsh decisions
and clicking the link that will ask you for your credentials or for any
kind of sensitive information for absolutely no reason! I mean…why do you
need my credit card number if I am not actually buying anything? Think
before you type! That is the best way to not be that sad struggling fish at
the mercy of some hook.


Well friends, sadly, we have reached that point of the episode which will
actually transform this into a series instead of leaving it as a single
episode, since I am unable to write a small script. Oops, sorry about that!
We will continue on this journey next week, where I will talk about some
other interesting buzzwords you might have heard when out and about. No
spoilers though, as it might ruin the fun of it! I await you all in the
next episode of this series. For now, feel free to share any of your
thoughts on this episode in any of our social media channels! I bid you all
farewell and until next time! Bye!


Get in contact

[email protected]
#ubuntu-security on the Libera.Chat IRC network
ubuntu-hardened mailing list
Security section on discourse.ubuntu.com
@ubuntu_sec on twitter

Twitter Mentions