drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in Python (Aktualisierung)
Name: |
Pufferüberlauf in Python (Aktualisierung) |
|
ID: |
USN-3199-3 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM |
|
Datum: |
Mo, 28. August 2017, 23:12 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459 |
|
Applikationen: |
Python |
|
Update von: |
Pufferüberlauf in Python |
|
Originalnachricht |
--===============4650544865466986466== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-lO5vLLEmT5D01XYyyH/y"
--=-lO5vLLEmT5D01XYyyH/y Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3199-3 August 28, 2017
python-crypto vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Programs using the Python Cryptography Toolkit could be made to crash or run programs if they receive specially crafted network traffic or other input.
Software Description: - python-crypto: cryptographic algorithms and protocols for Python
Details:
USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
 It was discovered that the ALGnew function in block_templace.c in the  Python Cryptography Toolkit contained a heap-based buffer overflow  vulnerability. A remote attacker could use this flaw to execute  arbitrary code by using a crafted initialization vector parameter.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM:  python-crypto                   2.4.1-1ubuntu0.2  python3-crypto                  2.4.1-1ubuntu0.2
In general, a standard system update will make all the necessary changes.
References: Â https://www.ubuntu.com/usn/usn-3199-3 Â https://www.ubuntu.com/usn/usn-3199-1 Â CVE-2013-7459
--ÕO5vLLEmT5D01XYyyH/y Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIbBAABCAAGBQJZpCsvAAoJEEW851uECx9p11cP+PDBQ481/bCb0HMszQRfGBiU QZWgMWfFxlz/BfWwL+AAAGpBd+cd2RCEIvUQkKeC1/Tqs3GGt6ICiS+k6az6B9Le cnP9WS6abzJ6P9NRsstWUOgckwxCcKgXgilAhqYVx+oeigr6sWwnDdDDFLh8eYU1 nXRfwZg9r503rE7Wi7zMiwLvj/RoGdGT4ZmA7Fvh2IL0cmBWKS/BV2NfxcQi7EPK ECCDZzCovUON+pUK/2b3qRe6CbKAPvxUKrK7ps9ENTkEULijxhL9iBfcM4TZkeOo U/TJO8VHCF6Oruz8wmQgSQvAAqR9DlR8bGazv9cf/lVspZ5Q2Aq+Tnh1nLIxuuLW 499a5qFSmpCvLRu3ZdFYpfiFz5efdMq/0ZOu/tOOjpOivePq5IU3gJBwKfFpT726 nxo9O2A9aRo/xPjVsOIbDnkvCgQZ++hDMwqqMizvyjye8K8AE0qXnknk16/7P8rf uAtfeRU7xhlLBE16tTAHy9kAY76QqtmgAmBkd6MfbafDt12hB15pPFq3yV31XirE i2+fMW1Vy2t3pffWThEftjV0FYZ4X4FYtBvaCeudqrQFwl3uPFWK9xTT9TQLJNMy BcIlHAmVYAPwRolFnvD3hk0WVAUnGMPdzF9SE0ysqoX7EX6WCmUKIA+yd05+bGl0 na1XpQSoSCeLhKKfxuA= =B4/V -----END PGP SIGNATURE-----
--=-lO5vLLEmT5D01XYyyH/y--
--===============4650544865466986466== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4650544865466986466==--
|
|
|
|