News

Wednesday, November 21, 2012

ubuntu-security-announce Digest, Vol 98, Issue 7

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-1634-1] Python Keyring vulnerabilities (Marc Deslauriers)
2. [USN-1632-2] Django regression (Jamie Strandboge)


----------------------------------------------------------------------

Message: 1
Date: Tue, 20 Nov 2012 13:31:49 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1634-1] Python Keyring vulnerabilities
Message-ID: <50ABCC95.6090305@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"

==========================================================================
Ubuntu Security Notice USN-1634-1
November 20, 2012

python-keyring vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10

Summary:

Several security issues were fixed in Python Keyring.

Software Description:
- python-keyring: store and access your passwords safely

Details:

Dwayne Litzenberger discovered that Python Keyring's CryptedFileKeyring
file format used weak cryptography. A local attacker may use this issue to
brute-force CryptedFileKeyring keyring files. This issue only affected
Ubuntu 11.10 and Ubuntu 12.04 LTS. (CVE-2012-4571)

It was discovered that Python Keyring created keyring files with insecure
permissions. A local attacker could use this issue to access keyring files
belonging to other users.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-keyring 0.9.2-1ubuntu0.2
python3-keyring 0.9.2-1ubuntu0.2

Ubuntu 12.04 LTS:
python-keyring 0.9.2-0ubuntu0.12.04.2
python3-keyring 0.9.2-0ubuntu0.12.04.2

Ubuntu 11.10:
python-keyring 0.9.2-0ubuntu0.11.10.2

In general, a standard system update will make all the necessary changes.
This update uses a new upstream release, which includes additional bug
fixes, and will migrate existing keyring files to the new format upon first
use.

References:
http://www.ubuntu.com/usn/usn-1634-1
CVE-2012-4571, https://launchpad.net/bugs/1004845

Package Information:
https://launchpad.net/ubuntu/+source/python-keyring/0.9.2-1ubuntu0.2
https://launchpad.net/ubuntu/+source/python-keyring/0.9.2-0ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/python-keyring/0.9.2-0ubuntu0.11.10.2


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121120/9838a169/attachment-0001.pgp>

------------------------------

Message: 2
Date: Tue, 20 Nov 2012 12:32:33 -0600
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1632-2] Django regression
Message-ID: <50ABCCC1.5050405@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"


==========================================================================
Ubuntu Security Notice USN-1632-2
November 20, 2012

python-django regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

A testsuite regression was fixed in Django.

Software Description:
- python-django: High-level Python web development framework

Details:

USN-1632-1 fixed a vulnerability in Django. The upstream fix introduced
testsuite failures when ADMINS and/or MANAGERS were defined in settings.py.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

James Kettle discovered Django did not properly filter the Host HTTP header
when processing certain requests. An attacker could exploit this to
generate and display arbitrary URLs to users.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-django 1.4.1-2ubuntu0.2

Ubuntu 12.04 LTS:
python-django 1.3.1-4ubuntu1.4

Ubuntu 11.10:
python-django 1.3-2ubuntu1.5

Ubuntu 10.04 LTS:
python-django 1.1.1-2ubuntu1.7

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1632-2
http://www.ubuntu.com/usn/usn-1632-1
https://launchpad.net/bugs/1080204

Package Information:
https://launchpad.net/ubuntu/+source/python-django/1.4.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/python-django/1.3.1-4ubuntu1.4
https://launchpad.net/ubuntu/+source/python-django/1.3-2ubuntu1.5
https://launchpad.net/ubuntu/+source/python-django/1.1.1-2ubuntu1.7




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121120/46a43b9b/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 98, Issue 7
*******************************************************

No comments:

Blog Archive