Ubuntu 6588 Published by

The following three security updates have been released for Ubuntu Linux:

[USN-6887-1] OpenSSH vulnerability
[USN-6888-1] Django vulnerabilities
[USN-6881-1] Exim vulnerability




[USN-6887-1] OpenSSH vulnerability


==========================================================================
Ubuntu Security Notice USN-6887-1
July 09, 2024

openssh vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

OpenSSH could be made to expose timing information over the network.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

Philippos Giavridis, Jacky Wei En Kung, Daniel Hugenroth, and Alastair
Beresford discovered that the OpenSSH ObscureKeystrokeTiming feature did
not work as expected. A remote attacker could possibly use this issue to
determine timing information about keystrokes.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
openssh-client 1:9.6p1-3ubuntu13.4
openssh-server 1:9.6p1-3ubuntu13.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6887-1
CVE-2024-39894

Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:9.6p1-3ubuntu13.4



[USN-6888-1] Django vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6888-1
July 09, 2024

python-django vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Django.

Software Description:
- python-django: High-level Python web development framework

Details:

Elias Myllymäki discovered that Django incorrectly handled certain inputs
with a large number of brackets. A remote attacker could possibly use this
issue to cause Django to consume resources or stop responding, resulting in
a denial of service. (CVE-2024-38875)

It was discovered that Django incorrectly handled authenticating users with
unusable passwords. A remote attacker could possibly use this issue to
perform a timing attack and enumerate users. (CVE-2024-39329)

Josh Schneier discovered that Django incorrectly handled file path
validation when the storage class is being derived. A remote attacker could
possibly use this issue to save files into arbitrary directories.
(CVE-2024-39330)

It was discovered that Django incorrectly handled certain long strings that
included a specific set of characters. A remote attacker could possibly use
this issue to cause Django to consume resources or stop responding,
resulting in a denial of service. (CVE-2024-39614)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
python3-django 3:4.2.11-1ubuntu1.1

Ubuntu 23.10
python3-django 3:4.2.4-1ubuntu2.3

Ubuntu 22.04 LTS
python3-django 2:3.2.12-2ubuntu1.12

Ubuntu 20.04 LTS
python3-django 2:2.2.12-1ubuntu0.23

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6888-1
CVE-2024-38875, CVE-2024-39329, CVE-2024-39330, CVE-2024-39614

Package Information:
https://launchpad.net/ubuntu/+source/python-django/3:4.2.11-1ubuntu1.1
https://launchpad.net/ubuntu/+source/python-django/3:4.2.4-1ubuntu2.3
https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.12
https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.23



[USN-6881-1] Exim vulnerability


==========================================================================
Ubuntu Security Notice USN-6881-1
July 08, 2024

exim4 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Exim could be made to allow response injection if it received a specially
crafted response.

Software Description:
- exim4: Exim is a mail transport agent

Details:

It was discovered that Exim did not enforce STARTTLS sync point on client
side. An attacker could possibly use this issue to perform response
injection during MTA SMTP sending.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
  exim4                           4.93-13ubuntu1.11
  exim4-base                      4.93-13ubuntu1.11
  eximon4  4.93-13ubuntu1.11

Ubuntu 18.04 LTS
  exim4                           4.90.1-1ubuntu1.10+esm4
                                  Available with Ubuntu Pro
  exim4-base                      4.90.1-1ubuntu1.10+esm4
                                  Available with Ubuntu Pro
  eximon4                         4.90.1-1ubuntu1.10+esm4
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  exim4                           4.86.2-2ubuntu2.6+esm7
                                  Available with Ubuntu Pro
  exim4-base                      4.86.2-2ubuntu2.6+esm7
                                  Available with Ubuntu Pro
  eximon4                         4.86.2-2ubuntu2.6+esm7
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  exim4                           4.82-3ubuntu2.4+esm8
                                  Available with Ubuntu Pro
  exim4-base                      4.82-3ubuntu2.4+esm8
                                  Available with Ubuntu Pro
  eximon4                         4.82-3ubuntu2.4+esm8
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6881-1
( https://ubuntu.com/security/notices/USN-6881-1)
  CVE-2021-38371

Package Information:
https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.11
( https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.11)