USN-2915-2: Django regression

Ubuntu Security Notice USN-2915-2

7th March, 2016

python-django regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

USN-2915-1 introduced a regression in Django.

Software description

  • python-django
    – High-level Python web development framework

Details

USN-2915-1 fixed vulnerabilities in Django. The upstream fix for
CVE-2016-2512 introduced a regression for certain applications. This update
fixes the problem.

Original advisory details:

Mark Striemer discovered that Django incorrectly handled user-supplied
redirect URLs containing basic authentication credentials. A remote
attacker could possibly use this issue to perform a cross-site scripting
attack or a malicious redirect. (CVE-2016-2512)

Sjoerd Job Postmus discovered that Django incorrectly handled timing when
doing password hashing operations. A remote attacker could possibly use
this issue to perform user enumeration. (CVE-2016-2513)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
python3-django

1.7.9-1ubuntu5.3
python-django

1.7.9-1ubuntu5.3
Ubuntu 14.04 LTS:
python-django

1.6.1-2ubuntu0.13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1553251

USN-2921-1: Squid vulnerabilities

Ubuntu Security Notice USN-2921-1

7th March, 2016

squid3 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Squid.

Software description

  • squid3
    – Web proxy cache server

Details

Sebastian Krahmer discovered that Squid incorrectly handled certain SNMP
requests. If SNMP is enabled, a remote attacker could use this issue to
cause Squid to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2014-6270)

Alex Rousskov discovered that Squid incorrectly handled certain malformed
responses. A remote attacker could possibly use this issue to cause Squid
to crash, resulting in a denial of service. (CVE-2016-2571)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
squid3

3.3.8-1ubuntu16.2
Ubuntu 14.04 LTS:
squid3

3.3.8-1ubuntu6.6
Ubuntu 12.04 LTS:
squid3

3.1.19-1ubuntu3.12.04.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-6270,

CVE-2016-2571

USN-2915-3: Django regression

Ubuntu Security Notice USN-2915-3

7th March, 2016

python-django regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

USN-2915-1 introduced a regression in Django.

Software description

  • python-django
    – High-level Python web development framework

Details

USN-2915-1 fixed vulnerabilities in Django. The upstream fix for
CVE-2016-2512 introduced a regression for certain applications. This update
fixes the problem by applying the complete upstream regression fix.

Original advisory details:

Mark Striemer discovered that Django incorrectly handled user-supplied
redirect URLs containing basic authentication credentials. A remote
attacker could possibly use this issue to perform a cross-site scripting
attack or a malicious redirect. (CVE-2016-2512)

Sjoerd Job Postmus discovered that Django incorrectly handled timing when
doing password hashing operations. A remote attacker could possibly use
this issue to perform user enumeration. (CVE-2016-2513)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
python3-django

1.7.9-1ubuntu5.4
python-django

1.7.9-1ubuntu5.4
Ubuntu 14.04 LTS:
python-django

1.6.1-2ubuntu0.14

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1553251

USN-2904-1: Thunderbird vulnerabilities

Ubuntu Security Notice USN-2904-1

8th March, 2016

thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Thunderbird.

Software description

  • thunderbird
    – Mozilla Open Source mail and newsgroup client

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information. (CVE-2015-7575)

Yves Younan discovered that graphite2 incorrectly handled certain malformed
fonts. If a user were tricked into opening a specially crafted website in a
browsing context, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitary code with the
privileges of the user invoking Thunderbird. (CVE-2016-1523)

Bob Clary, Christian Holler, Nils Ohlmeier, Gary Kwong, Jesse Ruderman,
Carsten Book, and Randell Jesup discovered multiple memory safety issues
in Thunderbird. If a user were tricked in to opening a specially crafted
website in a browsing context, an attacker could potentially exploit these
to cause a denial of service via application crash, or execute arbitrary
code with the privileges of the user invoking Thunderbird. (CVE-2016-1930)

Aki Helin discovered a buffer overflow when rendering WebGL content in
some circumstances. If a user were tricked in to opening a specially
crafted website in a browsing context, an attacker could potentially
exploit this to cause a denial of service via application crash, or
execute arbitrary code with the privileges of the user invoking
Thunderbird. (CVE-2016-1935)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
thunderbird

1:38.6.0+build1-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
thunderbird

1:38.6.0+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
thunderbird

1:38.6.0+build1-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References

CVE-2015-7575,

CVE-2016-1523,

CVE-2016-1930,

CVE-2016-1935