Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Python (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Python (Aktualisierung)
ID: USN-3199-3
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM
Datum: Mo, 28. August 2017, 23:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459
Update von: Pufferüberlauf in Python

Originalnachricht


--===============4650544865466986466==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-lO5vLLEmT5D01XYyyH/y"


--=-lO5vLLEmT5D01XYyyH/y
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3199-3
August 28, 2017

python-crypto vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Programs using the Python Cryptography Toolkit could be made to
crash or run programs if they receive specially crafted network
traffic or other input.

Software Description:
- python-crypto: cryptographic algorithms and protocols for Python

Details:

USN-3199-1 fixed a vulnerability in Python Crypto. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that the ALGnew function in block_templace.c in the
 Python Cryptography Toolkit contained a heap-based buffer overflow
 vulnerability. A remote attacker could use this flaw to execute
 arbitrary code by using a crafted initialization vector parameter.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  python-crypto                   2.4.1-1ubuntu0.2
  python3-crypto                  2.4.1-1ubuntu0.2

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3199-3
  https://www.ubuntu.com/usn/usn-3199-1
  CVE-2013-7459

--ÕO5vLLEmT5D01XYyyH/y
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=B4/V
-----END PGP SIGNATURE-----

--=-lO5vLLEmT5D01XYyyH/y--



--===============4650544865466986466==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4650544865466986466==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung