Mehrere Probleme in Python (Aktualisierung)
ID: | USN-4127-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM, Ubuntu 14.04 ESM |
Datum: | Di, 10. September 2019, 18:56 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010 |
Applikationen: | Python |
Update von: | Mehrere Probleme in Python |
Originalnachricht |
|
--===============0765329192643685210== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="oyUTqETQ0mS9luUI" Content-Disposition: inline --oyUTqETQ0mS9luUI Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-4127-2 September 10, 2019 python2.7, python3.4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Several security issues were fixed in Python. Software Description: - python2.7: An interactive high-level object-oriented language - python3.4: An interactive high-level object-oriented language Details: USN-4127-1 fixed several vulnerabilities in Python. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that Python incorrectly handled certain pickle files. An attacker could possibly use this issue to consume memory, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2018-20406) It was discovered that Python incorrectly validated the domain when handling cookies. An attacker could possibly trick Python into sending cookies to the wrong domain. (CVE-2018-20852) Jonathan Birch and Panayiotis Panayiotou discovered that Python incorrectly handled Unicode encoding during NFKC normalization. An attacker could possibly use this issue to obtain sensitive information. (CVE-2019-9636, CVE-2019-10160) Colin Read and Nicolas Edet discovered that Python incorrectly handled parsing certain X509 certificates. An attacker could possibly use this issue to cause Python to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2019-5010) It was discovered that Python incorrectly handled certain urls. A remote attacker could possibly use this issue to perform CRLF injection attacks. (CVE-2019-9740, CVE-2019-9947) Sihoon Lee discovered that Python incorrectly handled the local_file: scheme. A remote attacker could possibly use this issue to bypass blacklist meschanisms. (CVE-2019-9948) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: python2.7 2.7.6-8ubuntu0.6+esm2 python2.7-minimal 2.7.6-8ubuntu0.6+esm2 python3.4 3.4.3-1ubuntu1~14.04.7+esm2 python3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm2 Ubuntu 12.04 ESM: python2.7 2.7.3-0ubuntu3.14 python2.7-minimal 2.7.3-0ubuntu3.14 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4127-2 https://usn.ubuntu.com/4127-1 CVE-2018-20406, CVE-2018-20852, CVE-2019-10160, CVE-2019-5010, CVE-2019-9636, CVE-2019-9740, CVE-2019-9947, CVE-2019-9948 --oyUTqETQ0mS9luUI Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJdd6ypAAoJEEW851uECx9pzekQALiBkDihW2TzY8HkcbEczWt6 hjk0dmr9HYQRXon65/SwyHxLHxkwdHJCeMbgW2Y3VNMV5NwqcJFc3vm9kQFwXCUV /+fzjmPJl7IGvI1aMyHfwGw90vG1BhzVkTUy37/UhgAUkwpXbqdE4lkDy6sISuxk VViVKggokPPsDnNRwjHixkNQHWVitvLHSKypXqkgktLPxhgITCTDKj4PjnSrI56m T2sh8Gc4OlGoAs5Z4soqWOQpJdO5SLq0t83rQFOw8JcjrbBZofmjIP5iW2BIVsHt 9DVEsjGhEaSiUBDsKQGzf2TAs4fm/pDj2HXV3prr3QDrXXgDIMEeMD3MvOmvnKv0 u+4UGzoYShrvI0xEaRF9FP2D5q9aEzjVelIM9s/6UqRkoKocyJcYYQG/lWF4wodz YvXFKpCapqV7ngaB2cq3PZkwl9Gbu8kXC6nRJfANTFH6QxoE/HGdQgoph0XeWJHN bZoTIBDwuigdv42lkgf6dnQHrJFZijjC8W+t7tac+JET3GEfbxDBR1hwiedTq5nJ d5TyxKWBM0j1o3exKIXfZdl5+oewYtuJymrs0iiwslanr6SDbXHGPmsZjcN1FifP s8l2ohzd8aR4qQ1xwN1X2jHF2nLCWUp9YKURWRUO2U6Za1MiGnpSp/Zvdd/FbSVP Xrjy66Zx1RfTqmLCOIWf =l+nY -----END PGP SIGNATURE----- --oyUTqETQ0mS9luUI-- --===============0765329192643685210== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce |