Ubuntu alert USN-3199-3 (python-crypto)
From: | "Leonidas S. Barbosa" <leo.barbosa@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-3199-3] Python Crypto vulnerability | |
Date: | Mon, 28 Aug 2017 11:39:43 -0300 | |
Message-ID: | <1503931183.2468.2.camel@canonical.com> |
========================================================================== Ubuntu Security Notice USN-3199-3 August 28, 2017 python-crypto vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Programs using the Python Cryptography Toolkit could be made to crash or run programs if they receive specially crafted network traffic or other input. Software Description: - python-crypto: cryptographic algorithms and protocols for Python Details: USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that the ALGnew function in block_templace.c in the Python Cryptography Toolkit contained a heap-based buffer overflow vulnerability. A remote attacker could use this flaw to execute arbitrary code by using a crafted initialization vector parameter. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: python-crypto 2.4.1-1ubuntu0.2 python3-crypto 2.4.1-1ubuntu0.2 In general, a standard system update will make all the necessary changes. References: https://www.ubuntu.com/usn/usn-3199-3 https://www.ubuntu.com/usn/usn-3199-1 CVE-2013-7459 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...