Mangelnde Prüfung von Schlüsseln in PyJWT
ID: | USN-3407-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 16.04 LTS, Ubuntu 17.04 |
Datum: | Do, 31. August 2017, 07:22 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11424 |
Applikationen: | PyJWT |
Originalnachricht |
|
--===============5904577487412712409== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-rbaIxBg3mz3a3uO9yqUy" --=-rbaIxBg3mz3a3uO9yqUy Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3407-1 August 30, 2017 pyjwt vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.04 - Ubuntu 16.04 LTS Summary: PyJWT could be made to crash if it received specially crafted input. Software Description: - pyjwt: Python implementation of JSON Web Token Details: It was discovered that a vulnerability in PyJWT doesn't check invalid_strings properly for some public keys. A remote attacker could take advantage of a key confusion to craft JWTs from scratch. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.04:  python-jwt                      1.4.2-1ubuntu0.1  python3-jwt                     1.4.2-1ubuntu0.1 Ubuntu 16.04 LTS:  python-jwt                      1.3.0-1ubuntu0.1  python3-jwt                     1.3.0-1ubuntu0.1 In general, a standard system update will make all the necessary changes. References:  https://www.ubuntu.com/usn/usn-3407-1  CVE-2017-11424 Package Information:  https://launchpad.net/ubuntu/+source/pyjwt/1.4.2-1ubuntu0.1  https://launchpad.net/ubuntu/+source/pyjwt/1.3.0-1ubuntu0.1 --ÛbaIxBg3mz3a3uO9yqUy Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJZpyV3AAoJEEW851uECx9pp8wP/3eHuBRLWieuIhoILddnO3ug m/Wathbwq08R+6m+JW19wadvbgN+3UPrHQ/vfKZIqgvaASq76YVY8kmzoa2Kbq1U YA3mLmIM9Uj7UsN9LX2xrtqiQrXkVDqECJjDz0pX3x9YCng5F63bqTxNj4IX/USm noTiyY43oT0A5YWArV1pyQXy3QjIdcnr51m1bGmhBo0wIK/e4HP1D2bLLvobOcmV dFfOcH20jURFapb670Tz5Oxcxz4Z3UInMNP2IsMN5vllCB/+iv8oBEz+dSpeNS2E 2wIASSm7iqdRd4vgrVtsOm+COMMRXMpK4h5oQ0KQ4TEkyQto/z1oI9YTjc5cs2fl U0rFZjtUdZbO0XveMhn36VMniIo4ZfEv4gVo/kCP6HoocGWnieImypIBaWi1uKGz kTVlNVa6BQUL368l8EyjPUDwgzGFTfTNM4/DpCHaHtnv1OPTRmxLrZ8Lxr0sRDq5 Ugo6Zj1C+fQasCFLoM77AOqJpyt66S5eB5wfN718/JWo86PXc6V6X4VyZV5PUPXp Pf8HPou/G8ARaI1zw5LUZ6DGUYogGQOWkxKLTXgEB4ql26EMl+lAAtn9EEqTGitB zV9+PolyiFUtP751gV1X6hARtmQcL0FWspeLEBvnqmYK4/Bq+L0w2NkKzgSDRK30 kXVFjUCwuJ25Uxmfgndt =PPf3 -----END PGP SIGNATURE----- --=-rbaIxBg3mz3a3uO9yqUy-- --===============5904577487412712409== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============5904577487412712409==-- |