drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Python
Name: |
Mehrere Probleme in Python |
|
ID: |
USN-2653-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10 |
|
Datum: |
Do, 25. Juni 2015, 15:12 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185 |
|
Applikationen: |
Python |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7446672337482344241== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="PwM5h65fg5QjFoTL9PA5nEcenuw4sjgBU"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --PwM5h65fg5QjFoTL9PA5nEcenuw4sjgBU Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2653-1 June 25, 2015
python2.7, python3.2, python3.4 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Python.
Software Description: - python2.7: An interactive high-level object-oriented language - python3.4: An interactive high-level object-oriented language - python3.2: An interactive high-level object-oriented language
Details:
It was discovered that multiple Python protocol libraries incorrectly limited certain data when connecting to servers. A malicious ftp, http, imap, nntp, pop or smtp server could use this issue to cause a denial of service. (CVE-2013-1752)
It was discovered that the Python xmlrpc library did not limit unpacking gzip-compressed HTTP bodies. A malicious server could use this issue to cause a denial of service. (CVE-2013-1753)
It was discovered that the Python json module incorrectly handled a certain argument. An attacker could possibly use this issue to read arbitrary memory and expose sensitive information. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-4616)
It was discovered that the Python CGIHTTPServer incorrectly handled URL-encoded path separators in URLs. A remote attacker could use this issue to expose sensitive information, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-4650)
It was discovered that Python incorrectly handled sizes and offsets in buffer functions. An attacker could possibly use this issue to read arbitrary memory and obtain sensitive information. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-7185)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: python2.7 2.7.8-10ubuntu1.1 python2.7-minimal 2.7.8-10ubuntu1.1 python3.4 3.4.2-1ubuntu0.1 python3.4-minimal 3.4.2-1ubuntu0.1
Ubuntu 14.04 LTS: python2.7 2.7.6-8ubuntu0.2 python2.7-minimal 2.7.6-8ubuntu0.2 python3.4 3.4.0-2ubuntu1.1 python3.4-minimal 3.4.0-2ubuntu1.1
Ubuntu 12.04 LTS: python2.7 2.7.3-0ubuntu3.8 python2.7-minimal 2.7.3-0ubuntu3.8 python3.2 3.2.3-0ubuntu3.7 python3.2-minimal 3.2.3-0ubuntu3.7
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2653-1 CVE-2013-1752, CVE-2013-1753, CVE-2014-4616, CVE-2014-4650, CVE-2014-7185
Package Information: https://launchpad.net/ubuntu/+source/python2.7/2.7.8-10ubuntu1.1 https://launchpad.net/ubuntu/+source/python3.4/3.4.2-1ubuntu0.1 https://launchpad.net/ubuntu/+source/python2.7/2.7.6-8ubuntu0.2 https://launchpad.net/ubuntu/+source/python3.4/3.4.0-2ubuntu1.1 https://launchpad.net/ubuntu/+source/python2.7/2.7.3-0ubuntu3.8 https://launchpad.net/ubuntu/+source/python3.2/3.2.3-0ubuntu3.7
--PwM5h65fg5QjFoTL9PA5nEcenuw4sjgBU Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVi/SyAAoJEGVp2FWnRL6TUJ4QALuPVIKZhCvkXpbLruWbGwBi T8yT+onIi28CvYrGpxWo25xXKpbL1NTWAhbE5pnucbH2UiC7V6wIhEJxOMNki+xA Gv+DSuT2ztOxxdYz5TXcAWI/vYej3D+hNKaHWjGjEj2pGUU+DzGGy0xxB77Ubecc ax5DS5V9gJ858GKMew1F0n3R6djI/7FiY2FTEum6DIE5VnkUAZkqsfcQIK/dYZ15 Z40xL0BHHH9xrZPawHatNtHJTABzWWrM95nQOl/NW+ZJKk6yNhKh8Ktg5CKR+D9h zpc6idlXQY57zNx7L1s1X2wkHRu6z5zXPfowR+2Q3PxiPHTk0/rjCaDC7V4A7QJv ijiCMCLkmuZ0EUicK0cscjnlNR3HqYJ+VpAOnLCJ4RXkJDxo+pINJ3uHluZbu+cQ MdgDyC6ltzjPeW/QehZ2jFU4RDLvE8omxUJ3dfFs7HviTXOSUvI7H9H8UcfJc1qz 0pJPBl/zxsj8bSiTXguf/uDz8gjmYFBBIMKzB+LIyE9N71AtFibqvs0vZ8Bj8NmN 0fEXnvTt+oG0IGxVxMzPIN5UokA8vOlK1j8Vmx9zGkpGU36wgJbJelw9b5sh8GyG Jv6WX6k07HPw+WDxLoL2iiDsWz9CRwEzV7/UdNdQzZbvJVsSNOVNCRiRnYi1FFDt eq+O7TTGHAyF4EXx6xyN =fS+y -----END PGP SIGNATURE-----
--PwM5h65fg5QjFoTL9PA5nEcenuw4sjgBU--
--===============7446672337482344241== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7446672337482344241==--
|
|
|
|