[USN-6903-1] Thunderbird vulnerabilities
[USN-6905-1] Rack vulnerabilities
[USN-6904-1] PyMongo vulnerability
[USN-6903-1] Thunderbird vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6903-1
July 22, 2024
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2024-6600, CVE-2024-6601,
CVE-2024-6604)
Ronald Crane discovered that Thunderbird did not properly manage certain
memory operations in the NSS. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2024-6602)
Irvan Kurniawan discovered that Thunderbird did not properly manage memory
during thread creation. An attacker could potentially exploit this
issue to cause a denial of service, or execute arbitrary code.
(CVE-2024-6603)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
thunderbird 1:115.13.0+build5-0ubuntu0.22.04.1
Ubuntu 20.04 LTS
thunderbird 1:115.13.0+build5-0ubuntu0.20.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6903-1
CVE-2024-6600, CVE-2024-6601, CVE-2024-6602, CVE-2024-6603,
CVE-2024-6604
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:115.13.0+build5-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:115.13.0+build5-0ubuntu0.20.04.1
[USN-6905-1] Rack vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6905-1
July 23, 2024
ruby-rack vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Rack could be made to consume resources and cause long delays if it
processed certain input.
Software Description:
- ruby-rack: modular Ruby webserver interface
Details:
It was discovered that Rack incorrectly handled certain regular
expressions. A remote attacker could possibly use this issue to cause
Rack to consume resources, leading to a denial of service.
(CVE-2023-27539)
It was discovered that Rack incorrectly handled Multipart MIME parsing.
A remote attacker could possibly use this issue to cause Rack to consume
resources, leading to a denial of service. This issue only affected
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-27530)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
ruby-rack 2.1.4-5ubuntu1+esm4
Available with Ubuntu Pro
Ubuntu 20.04 LTS
ruby-rack 2.0.7-2ubuntu0.1+esm4
Available with Ubuntu Pro
Ubuntu 18.04 LTS
ruby-rack 1.6.4-4ubuntu0.2+esm5
Available with Ubuntu Pro
Ubuntu 16.04 LTS
ruby-rack 1.6.4-3ubuntu0.2+esm5
Available with Ubuntu Pro
Ubuntu 14.04 LTS
ruby-rack 1.5.2-3+deb8u3ubuntu1~esm7
Available with Ubuntu Pro
After a standard system update you need to restart any applications using
Rack to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6905-1
CVE-2023-27530, CVE-2023-27539
[USN-6904-1] PyMongo vulnerability
=========================================================================
Ubuntu Security Notice USN-6904-1
July 22, 2024
pymongo vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
PyMongo could be made to crash or expose sensitive information if it
received a crafted BSON.
Software Description:
- pymongo: Python interface to the MongoDB document-oriented database
Details:
It was discovered that PyMongo incorrectly handled certain BSON.
An attacker could possibly use this issue to read sensitive information
or cause a crash.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
python3-bson 3.11.0-1ubuntu0.24.04.1
python3-bson-ext 3.11.0-1ubuntu0.24.04.1
Ubuntu 22.04 LTS
python3-bson 3.11.0-1ubuntu0.22.04.1
python3-bson-ext 3.11.0-1ubuntu0.22.04.1
Ubuntu 20.04 LTS
python3-bson 3.10.1-0ubuntu2.1
python3-bson-ext 3.10.1-0ubuntu2.1
Ubuntu 18.04 LTS
python-bson 3.6.1+dfsg1-1ubuntu0.1~esm1
Available with Ubuntu Pro
python-bson-ext 3.6.1+dfsg1-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-bson 3.6.1+dfsg1-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-bson-ext 3.6.1+dfsg1-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
python-bson 3.2-1ubuntu0.1~esm1
Available with Ubuntu Pro
python-bson-ext 3.2-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-bson 3.2-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-bson-ext 3.2-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6904-1
CVE-2024-5629
Package Information:
https://launchpad.net/ubuntu/+source/pymongo/3.11.0-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/pymongo/3.11.0-1ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/pymongo/3.10.1-0ubuntu2.1