USN-2494-1: file vulnerabilities

Ubuntu Security Notice USN-2494-1

4th February, 2015

file vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

file could be made to crash if it opened a specially crafted file.

Software description

  • file
    – Tool to determine file types

Details

Francisco Alonso discovered that file incorrectly handled certain ELF
files. An attacker could use this issue to cause file to crash, resulting
in a denial of service. (CVE-2014-3710)

Thomas Jarosch discovered that file incorrectly handled certain ELF files.
An attacker could use this issue to cause file to hang or crash, resulting
in a denial of service. (CVE-2014-8116)

Thomas Jarosch discovered that file incorrectly limited recursion. An
attacker could use this issue to cause file to hang or crash, resulting in
a denial of service. (CVE-2014-8117)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
file

1:5.19-1ubuntu1.2
Ubuntu 14.04 LTS:
file

1:5.14-2ubuntu3.3
Ubuntu 12.04 LTS:
file

5.09-2ubuntu0.6
Ubuntu 10.04 LTS:
file

5.03-5ubuntu1.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3710,

CVE-2014-8116,

CVE-2014-8117

USN-2469-2: Django regression

Ubuntu Security Notice USN-2469-2

4th February, 2015

python-django regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

USN-2469-1 caused a regression in Django.

Software description

  • python-django
    – High-level Python web development framework

Details

USN-2469-1 fixed vulnerabilities in Django. The security fix for
CVE-2015-0221 introduced a regression on Ubuntu 10.04 LTS and Ubuntu 12.04
LTS when serving static content through GZipMiddleware. This update fixes
the problem.

We apologize for the inconvenience.

Original advisory details:

Jedediah Smith discovered that Django incorrectly handled underscores in
WSGI headers. A remote attacker could possibly use this issue to spoof
headers in certain environments. (CVE-2015-0219)

Mikko Ohtamaa discovered that Django incorrectly handled user-supplied
redirect URLs. A remote attacker could possibly use this issue to perform a
cross-site scripting attack. (CVE-2015-0220)

Alex Gaynor discovered that Django incorrectly handled reading files in
django.views.static.serve(). A remote attacker could possibly use this
issue to cause Django to consume resources, resulting in a denial of
service. (CVE-2015-0221)

Keryn Knight discovered that Django incorrectly handled forms with
ModelMultipleChoiceField. A remote attacker could possibly use this issue
to cause a large number of SQL queries, resulting in a database denial of
service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-0222)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
python-django

1.3.1-4ubuntu1.15
Ubuntu 10.04 LTS:
python-django

1.1.1-2ubuntu1.16

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1417274

Fedora 20 Security Update: bugzilla-4.2.13-1.fc20

Resolved Bugs
1185484 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes [fedora-all]
1070979 – Access to /var/lib/bugzilla/data/webdot is denied by default bugzilla.conf
1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes<br
This is a security update for Bugzilla which fixes two issues:
* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.
The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.

Fedora 20 Security Update: puppetlabs-stdlib-4.5.1-2.20150121git7a91f20.fc20

Resolved Bugs
1182579 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [fedora-all]
1182578 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability
1182580 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [epel-all]<br
Install metadata.json for Puppet to pick stdlib release when “puppet module list” is called
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029

Fedora 21 Security Update: puppetlabs-stdlib-4.5.1-2.20150121git7a91f20.fc21

Resolved Bugs
1182578 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability
1182580 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [epel-all]
1182579 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [fedora-all]<br
Install metadata.json for Puppet to pick stdlib release when “puppet module list” is called
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029

Fedora 21 Security Update: bugzilla-4.4.8-1.fc21.1

Resolved Bugs
1185484 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes [fedora-all]
1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes
1070979 – Access to /var/lib/bugzilla/data/webdot is denied by default bugzilla.conf<br
This is a security update for Bugzilla which fixes two issues:
* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.
The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.