-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEE2WgtvmwmcgaEBLlnCAvK1QvD6SAFAmVk46kFAwAAAAAACgkQCAvK1QvD6SCv
nw/7BW23ysi1L9q33I+dU5AKrHQQVDX4CUJneeVpa5SqfuYx8BwZlHEFgwVjuhALyPHyx4LTND5a
ZY5WkSHUnCsS49W/efNg/1iPkvcCN5YZXT2t5l1DycC5MDzsJcwWYJDtuwDZRzaMTmUHQxK5TXJd
uBYKMRkJfqFy92pxu3C2fq/LeRfWXcbJbJo25bbWZxyHR55DwhBT1P0As5YS5cs/LkK7xmiIrKXH
LL9jXZksZgO9EYFYrOX1QtuvwgZHaNupC88Vpx04NGbfioReyJjOYPnoSFrs7rathh6el40hxm2T
BwAxItBWpdhWOs8hVB1Yhw7Zxgf4l7yBKZPwxxwN6/RetTAVEVdDwXD2Y2y58qgyceN6bxmuD6RR
UEKrU00sDL66LArvMpaO+H1MYmL4NFd1TN8BVOeM2tHzFoDezAGT4/oWQ1wAF4YKMG8Lii5q7mTc
4EWs7ymmhcz7DVyxj54yr4bX4pZLV7x5yIENRAJ4QK15SQ3gOzFzxA1oeTeSIIftVt2E3C+2p2f8
o0SFvRt6ip7wIvbn6tdyONzh6g+0UUW/fsLRFOFWMmCPSBVdGinc89nenw8Hr4Z++ZGS+iFzcs3r
Fg1uWhFaAYsDDLwdiBpVv//Gr5E9qe+q3D7jkZMgdduLrDpQZjdUrfhzDyW2mfAo5eP5dsSM7GLx
Imk=
=cxIn
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6513-2
November 27, 2023
python3.8, python3.10, python3.11 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Python.
Software Description:
- python3.11: An interactive high-level object-oriented language
- python3.10: An interactive high-level object-oriented language
- python3.8: An interactive high-level object-oriented language
Details:
USN-6513-1 fixed vulnerabilities in Python. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04.
Original advisory details:
It was discovered that Python incorrectly handled certain plist files.
If a user or an automated system were tricked into processing a specially
crafted plist file, an attacker could possibly use this issue to consume
resources, resulting in a denial of service. (CVE-2022-48564)
It was discovered that Python instances of ssl.SSLSocket were vulnerable
to a bypass of the TLS handshake. An attacker could possibly use this
issue to cause applications to treat unauthenticated received data before
TLS handshake as authenticated data after TLS handshake. (CVE-2023-40217)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
python3.11 3.11.4-1~23.04.1
Ubuntu 22.04 LTS:
python3.10 3.10.12-1~22.04.3
Ubuntu 20.04 LTS:
python3.8 3.8.10-0ubuntu1~20.04.9
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6513-1
CVE-2023-40217
Package Information:
https://launchpad.net/ubuntu/+source/python3.11/3.11.4-1~23.04.1
https://launchpad.net/ubuntu/+source/python3.10/3.10.12-1~22.04.3
https://launchpad.net/ubuntu/+source/python3.8/3.8.10-0ubuntu1~20.04.9
No comments:
Post a Comment