drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in Python
Name: |
Pufferüberlauf in Python |
|
ID: |
USN-3199-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10 |
|
Datum: |
Fr, 17. Februar 2017, 07:30 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459 |
|
Applikationen: |
Python |
|
Originalnachricht |
--===============3857755209562713261== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-1TRbjDQxCuF2EsVdvWAh"
--=-1TRbjDQxCuF2EsVdvWAh Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3199-1 February 16, 2017
Python Crypto vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
Programs using the Python Cryptography Toolkit could be made to crash or run programs if they receive specially crafted network traffic or other input.
Software Description: - python-crypto: cryptographic algorithms and protocols for Python
Details:
It was discovered that the ALGnew function in block_templace.c in the Python Cryptography Toolkit contained a heap-based buffer overflow vulnerability. A remote attacker could use this flaw to execute arbitrary code by using a crafted initialization vector parameter.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10:  python-crypto                   2.6.1-6ubuntu0.16.10.2  python3-crypto                  2.6.1-6ubuntu0.16.10.2
Ubuntu 16.04 LTS:  python-crypto                   2.6.1-6ubuntu0.16.04.1  python3-crypto                  2.6.1-6ubuntu0.16.04.1
Ubuntu 14.04 LTS:  python-crypto                   2.6.1-4ubuntu0.1  python3-crypto                  2.6.1-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: Â http://www.ubuntu.com/usn/usn-3199-1 Â CVE-2013-7459
Package Information: Â https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.10.2 Â https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.04.1 Â https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-4ubuntu0.1 --ÑTRbjDQxCuF2EsVdvWAh Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAABCAAGBQJYplaIAAoJEEK++w9AZDrpsV4P/0HTKXNL9yS53R179wsjskvM UAYv3xErMpG8v0Xts6a+tNWnrxk3uvW3y5UnX074iXu1BxP+t0O+toHPQB39+V10 iqS2kMsiPzUFcPHavv9NSqPdfekOK3Y7KsJCP1NK+cGQSGIXV4604tCU0WQJA76m eKrbpAt9Gh1vRcnV+zOAhAUI8Fo86q5M6lw8y3+ESTAwSmJJWFVREFdv8z/a5d/k l9sqN6ER7kDykpnWLAekmGSuxhaAl+++oHE04gQaoC32w+N7YRuoobLjJIj62iN6 SkUw6yP6eHbp1WRyvgn41r24yT4pqnXYV6FsyMopz6jA31n92ffaYUbOH9bCzyy4 Tt7TCzBo7ysZG5ioSfgpFe4ZyN5czR+CVHSZvo+gx6bSDCUYH3A/Ri7V8wHn7iQH PQMwxWkjmXZsJyLD+SmNvgv7R5Eu8CX21aOH/U0GMj8eWwVkT7YE+syP4UpnUmmF jWHQAcS+2XK2ng8L8XNq/rYJ+jkUjcry7PiF1SXrtQRpwczdFL+ht68nUkb3rrqB Gf5m0PT1d/VriIO/KKHVyxABsVu41Bu3/35jkwzaL7WQJVAR1onKv+tqCHnAOl7H 3yU8688la4K6TSN9HOAc2vZmPtDFXtxVDap7V8qxbwSJUaBVfhHqMryK07dksDnr eWgtWnOnBasEKfdqytQK =HRj+ -----END PGP SIGNATURE-----
--=-1TRbjDQxCuF2EsVdvWAh--
--===============3857755209562713261== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3857755209562713261==--
|
|
|
|