Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Python
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Python
ID: USN-3199-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10
Datum: Fr, 17. Februar 2017, 07:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459
Applikationen: Python

Originalnachricht


--===============3857755209562713261==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-1TRbjDQxCuF2EsVdvWAh"


--=-1TRbjDQxCuF2EsVdvWAh
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3199-1
February 16, 2017

Python Crypto vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Programs using the Python Cryptography Toolkit could be made to crash or run
programs if they receive specially crafted network traffic or other input.

Software Description:
- python-crypto: cryptographic algorithms and protocols for Python

Details:

It was discovered that the ALGnew function in block_templace.c in the Python
Cryptography Toolkit contained a heap-based buffer overflow vulnerability.
A remote attacker could use this flaw to execute arbitrary code by using
a crafted initialization vector parameter.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  python-crypto                   2.6.1-6ubuntu0.16.10.2
  python3-crypto                  2.6.1-6ubuntu0.16.10.2

Ubuntu 16.04 LTS:
  python-crypto                   2.6.1-6ubuntu0.16.04.1
  python3-crypto                  2.6.1-6ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  python-crypto                   2.6.1-4ubuntu0.1
  python3-crypto                  2.6.1-4ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-3199-1
  CVE-2013-7459

Package Information:
  https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.10.2
  https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.04.1
  https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-4ubuntu0.1
--ÑTRbjDQxCuF2EsVdvWAh
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=HRj+
-----END PGP SIGNATURE-----

--=-1TRbjDQxCuF2EsVdvWAh--



--===============3857755209562713261==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3857755209562713261==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung