Daily update on current cyber security threats
…
continue reading
Inhalt bereitgestellt von Alex Murray and Ubuntu Security Team. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Alex Murray and Ubuntu Security Team oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!
Gehen Sie mit der App Player FM offline!
Episode 243
MP3•Episode-Home
Manage episode 456474270 series 2423058
Inhalt bereitgestellt von Alex Murray and Ubuntu Security Team. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Alex Murray and Ubuntu Security Team oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Overview
It’s the end of the year for official duties for the Ubuntu Security team so we take a look back on the security highlights of 2024 for Ubuntu and predict what is coming in 2025.
2024 Year in Review for Ubuntu Security (00:55)
full-disclosure necromancy with zombie CVEs
Development of unprivileged user namespace restrictions for Ubuntu 24.04 LTS
Linux kernel becomes a CNA
Ubuntu participates in Pwn2Own Vancouver
xz-utils / SSH backdoor supply-chain attack
Linux Security Summit NA and EU
Release of Ubuntu 24.04 LTS
regreSSHion remote unauthenticated code execution vulnerability in OpenSSH
Various other high profile vulnerabilities
- Discussion of CVE-2024-5290 in
wpa_supplicant
from Episode 234 - Deep dive into needrestart local privilege escalation vulnerabilities from Episode 242
Ubuntu/Windows Dual-boot regression
AppArmor-based snap file prompting experimental feature
- Ubuntu Security Center with snapd-based AppArmor home file access prompting preview from Episode 236
- Official announcement of Permissions Prompting in Ubuntu 24.10 from Episode 237
Predictions for 2025 (14:35)
- Increased use of AI to both spam projects with hallucinated CVEs (e.g. curl) but also to “aid” in dealing with that spam
- as the shine wears of AI likely expect OSS projects to ban contributions generated with the aid of AI - whether CVE reports or code
- but also expect companies to try and prove the worth of AI by finding novel vulns - e.g. apparent first 0-day discovered with AI doing vuln research https://googleprojectzero.blogspot.com/2024/06/project-naptime.html
- also more expected uses of AI like automating tasks used in the process of security-related SW dev - automatically generating fuzz targets and then improving the fuzz targets via AI as well https://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html
- More malware targeting Linux
- didn’t mention it earlier but we covered a number of Linux malware teardowns this year and expect that trend to increase as Linux keeps growing in popularity
- Full LSM stacking still won’t make it into the upstream Linux kernel
- Integrity of code and data will play more of a role
- both in terms of software supply chain and integrity of distro repos etc, but also efforts to try and guarantee the integrity of a Linux system itself - whether via new IPE LSM or other mechanisms - mainstream distros will start to care about integrity more
- More collaboration across distros to aid in efforts to collectively handle deluge of CVEs
- More efforts to try and fund OSS to learn from lessons of Heartbleed and xz-utils
- some more and less successful
- More interesting vulns in more software
- During 2024 Qualys have done some of the most interesting vuln research on Linux - expect more from them and from others (whether aided by AI or not)
Get in contact
248 Episoden
MP3•Episode-Home
Manage episode 456474270 series 2423058
Inhalt bereitgestellt von Alex Murray and Ubuntu Security Team. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Alex Murray and Ubuntu Security Team oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Overview
It’s the end of the year for official duties for the Ubuntu Security team so we take a look back on the security highlights of 2024 for Ubuntu and predict what is coming in 2025.
2024 Year in Review for Ubuntu Security (00:55)
full-disclosure necromancy with zombie CVEs
Development of unprivileged user namespace restrictions for Ubuntu 24.04 LTS
Linux kernel becomes a CNA
Ubuntu participates in Pwn2Own Vancouver
xz-utils / SSH backdoor supply-chain attack
Linux Security Summit NA and EU
Release of Ubuntu 24.04 LTS
regreSSHion remote unauthenticated code execution vulnerability in OpenSSH
Various other high profile vulnerabilities
- Discussion of CVE-2024-5290 in
wpa_supplicant
from Episode 234 - Deep dive into needrestart local privilege escalation vulnerabilities from Episode 242
Ubuntu/Windows Dual-boot regression
AppArmor-based snap file prompting experimental feature
- Ubuntu Security Center with snapd-based AppArmor home file access prompting preview from Episode 236
- Official announcement of Permissions Prompting in Ubuntu 24.10 from Episode 237
Predictions for 2025 (14:35)
- Increased use of AI to both spam projects with hallucinated CVEs (e.g. curl) but also to “aid” in dealing with that spam
- as the shine wears of AI likely expect OSS projects to ban contributions generated with the aid of AI - whether CVE reports or code
- but also expect companies to try and prove the worth of AI by finding novel vulns - e.g. apparent first 0-day discovered with AI doing vuln research https://googleprojectzero.blogspot.com/2024/06/project-naptime.html
- also more expected uses of AI like automating tasks used in the process of security-related SW dev - automatically generating fuzz targets and then improving the fuzz targets via AI as well https://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html
- More malware targeting Linux
- didn’t mention it earlier but we covered a number of Linux malware teardowns this year and expect that trend to increase as Linux keeps growing in popularity
- Full LSM stacking still won’t make it into the upstream Linux kernel
- Integrity of code and data will play more of a role
- both in terms of software supply chain and integrity of distro repos etc, but also efforts to try and guarantee the integrity of a Linux system itself - whether via new IPE LSM or other mechanisms - mainstream distros will start to care about integrity more
- More collaboration across distros to aid in efforts to collectively handle deluge of CVEs
- More efforts to try and fund OSS to learn from lessons of Heartbleed and xz-utils
- some more and less successful
- More interesting vulns in more software
- During 2024 Qualys have done some of the most interesting vuln research on Linux - expect more from them and from others (whether aided by AI or not)
Get in contact
248 Episoden
Alle Folgen
×Willkommen auf Player FM!
Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.