python3.1, python3.2 vulnerabilities

Related Vulnerabilities: CVE-2010-3493   CVE-2011-1521  

Applications using certain Python 3 modules could be made to crash or expose sensitive information over the network.

Giampaolo Rodola discovered that the smtpd module in Python 3 did not properly handle certain error conditions. A remote attacker could exploit this to cause a denial of service via daemon outage. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-3493)

19 December 2011

python3.1, python3.2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 11.04
  • Ubuntu 10.10
  • Ubuntu 10.04 LTS

Summary

Applications using certain Python 3 modules could be made to crash or expose sensitive information over the network.

Software Description

  • python3.1 - An interactive high-level object-oriented language (version 3.1)
  • python3.2 - An interactive high-level object-oriented language (version 3.2)

Details

Giampaolo Rodola discovered that the smtpd module in Python 3 did not properly handle certain error conditions. A remote attacker could exploit this to cause a denial of service via daemon outage. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-3493)

Niels Heinen discovered that the urllib module in Python 3 would process Location headers that specify a file:// URL. A remote attacker could use this to obtain sensitive information or cause a denial of service via resource consumption. (CVE-2011-1521)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04
python3.1-minimal - 3.1.3-1ubuntu1.1
python3.2-minimal - 3.2-1ubuntu1.1
Ubuntu 10.10
python3.1-minimal - 3.1.2+20100915-0ubuntu4.1
Ubuntu 10.04 LTS
python3.1-minimal - 3.1.2-0ubuntu3.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes. Daemons using the urllib or smtpd modules may also need to be restarted after a pplying this update.

References