Zwei Probleme in Python
ID: | USN-1984-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 12.10 |
Datum: | Mi, 2. Oktober 2013, 07:54 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238 |
Applikationen: | Python |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7181968178124856084== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="H2JGmQIIroe1TML03UWLCjsfbduOgnUEL" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --H2JGmQIIroe1TML03UWLCjsfbduOgnUEL Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1984-1 October 01, 2013 python3.2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: Several security issues were fixed in Python. Software Description: - python3.2: An interactive high-level object-oriented language Details: Florian Weimer discovered that Python incorrectly handled matching multiple wildcards in ssl certificate hostnames. An attacker could exploit this to cause Python to consume resources, resulting in a denial of service. (CVE-2013-2099) Ryan Sleevi discovered that Python did not properly handle certificates with NULL characters in the Subject Alternative Name field. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2013-4238) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: python3.2 3.2.3-6ubuntu3.4 python3.2-minimal 3.2.3-6ubuntu3.4 Ubuntu 12.04 LTS: python3.2 3.2.3-0ubuntu3.5 python3.2-minimal 3.2.3-0ubuntu3.5 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1984-1 CVE-2013-2099, CVE-2013-4238 Package Information: https://launchpad.net/ubuntu/+source/python3.2/3.2.3-6ubuntu3.4 https://launchpad.net/ubuntu/+source/python3.2/3.2.3-0ubuntu3.5 --H2JGmQIIroe1TML03UWLCjsfbduOgnUEL Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBCgAGBQJSSulmAAoJEGVp2FWnRL6Txb0QAIS9CnuLnsk/Qof07zE7Vxfi 4WF23FrFS5Ypo0D1gnSRDWpkKHnLkdgp6lgMmdTlo1neidMSKjT6tNPv/LY1ibnl 8fb80eLcjDqzEIeJUWcTBXK98d2tsjllPGWdh/tmYgkdxhvGb7T2lwtaOM0BnRgJ PbYnm//rukrjHq/Vm2mobDhNI2Ed+fbdfcVbG2qc1Ltg1F7Rz/AcXR9TTToKyv3D t7jDH4JiW8hJ+k+PargSsyzpDBAAtWkH8zezxtQH9z/Ln/Fk9MsHpPwW5xx/HG22 XbMabybfQvG1f8YDmmsFYUblRYSybwVfaLZ1UL+YAIpYgu2/gcF+yk2VWgw8aKce 3ivEsXjCGd7b0Q3h76hC77Ay5OuYAVF6jF/1bjQRPcKU90jRtn6NqA+ZRJ6BaYNX HOlQhWXm22paB/5eoCMNklGd/ofjyyzIwtSIsq77EICYO+2kZSWTNiUyHufF+EHY 5ndXSHOKLipdrczLJoRL0mATEQft6jENZXw2nHPYnoA03VzNK9VVbDHZlO+vCPwv NgHYPWyFNGQUi5RlggzpI5+awpGfNlslmgJ0/Vy8udeiHxGLnGbRBjHmkCFKy3+8 yy915qBXngcJSUKR2k42UJw6MyP/x4VWeYhEM0Fbsqo+F7YFIrRlT0OtDYqykAi1 97yymXSyy+TbXN6Sjh+9 =sASB -----END PGP SIGNATURE----- --H2JGmQIIroe1TML03UWLCjsfbduOgnUEL-- --===============7181968178124856084== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============7181968178124856084==-- |