[USN-6887-1] OpenSSH vulnerability
[USN-6888-1] Django vulnerabilities
[USN-6881-1] Exim vulnerability
[USN-6887-1] OpenSSH vulnerability
==========================================================================
Ubuntu Security Notice USN-6887-1
July 09, 2024
openssh vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
OpenSSH could be made to expose timing information over the network.
Software Description:
- openssh: secure shell (SSH) for secure access to remote machines
Details:
Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair
Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did
not work as expected. A remote attacker could possibly use this issue to
determine timing information about keystrokes.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
openssh-client 1:9.6p1-3ubuntu13.4
openssh-server 1:9.6p1-3ubuntu13.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6887-1
CVE-2024-39894
Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:9.6p1-3ubuntu13.4
[USN-6888-1] Django vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6888-1
July 09, 2024
python-django vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Django.
Software Description:
- python-django: High-level Python web development framework
Details:
Elias Myllymäki discovered that Django incorrectly handled certain inputs
with a large number of brackets. A remote attacker could possibly use this
issue to cause Django to consume resources or stop responding, resulting in
a denial of service. (CVE-2024-38875)
It was discovered that Django incorrectly handled authenticating users with
unusable passwords. A remote attacker could possibly use this issue to
perform a timing attack and enumerate users. (CVE-2024-39329)
Josh Schneier discovered that Django incorrectly handled file path
validation when the storage class is being derived. A remote attacker could
possibly use this issue to save files into arbitrary directories.
(CVE-2024-39330)
It was discovered that Django incorrectly handled certain long strings that
included a specific set of characters. A remote attacker could possibly use
this issue to cause Django to consume resources or stop responding,
resulting in a denial of service. (CVE-2024-39614)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
python3-django 3:4.2.11-1ubuntu1.1
Ubuntu 23.10
python3-django 3:4.2.4-1ubuntu2.3
Ubuntu 22.04 LTS
python3-django 2:3.2.12-2ubuntu1.12
Ubuntu 20.04 LTS
python3-django 2:2.2.12-1ubuntu0.23
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6888-1
CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614
Package Information:
https://launchpad.net/ubuntu/+source/python-django/3:4.2.11-1ubuntu1.1
https://launchpad.net/ubuntu/+source/python-django/3:4.2.4-1ubuntu2.3
https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.12
https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.23
[USN-6881-1] Exim vulnerability
==========================================================================
Ubuntu Security Notice USN-6881-1
July 08, 2024
exim4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Exim could be made to allow response injection if it received a specially
crafted response.
Software Description:
- exim4: Exim is a mail transport agent
Details:
It was discovered that Exim did not enforce STARTTLS sync point on client
side. An attacker could possibly use this issue to perform response
injection during MTA SMTP sending.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
exim4 4.93-13ubuntu1.11
exim4-base 4.93-13ubuntu1.11
eximon4 4.93-13ubuntu1.11
Ubuntu 18.04 LTS
exim4 4.90.1-1ubuntu1.10+esm4
Available with Ubuntu Pro
exim4-base 4.90.1-1ubuntu1.10+esm4
Available with Ubuntu Pro
eximon4 4.90.1-1ubuntu1.10+esm4
Available with Ubuntu Pro
Ubuntu 16.04 LTS
exim4 4.86.2-2ubuntu2.6+esm7
Available with Ubuntu Pro
exim4-base 4.86.2-2ubuntu2.6+esm7
Available with Ubuntu Pro
eximon4 4.86.2-2ubuntu2.6+esm7
Available with Ubuntu Pro
Ubuntu 14.04 LTS
exim4 4.82-3ubuntu2.4+esm8
Available with Ubuntu Pro
exim4-base 4.82-3ubuntu2.4+esm8
Available with Ubuntu Pro
eximon4 4.82-3ubuntu2.4+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6881-1
( https://ubuntu.com/security/notices/USN-6881-1)
CVE-2021-38371
Package Information:
https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.11
( https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.11)