[USN-6473-1] urllib3 vulnerabilities

2023-11-07 Thread Jorge Sancho Larraz

==
Ubuntu Security Notice USN-6473-1
November 07, 2023

python-urllib3 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in urllib3.

Software Description:
- python-urllib3: HTTP library with thread-safe connection pooling

Details:

It was discovered that urllib3 didn't strip HTTP Authorization header
on cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091)

It was discovered that urllib3 didn't strip HTTP Cookie header on
cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-43804)

It was discovered that urllib3 didn't strip HTTP body on status code
303 redirects under certain circumstances. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-45803)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  python3-urllib3 1.26.16-1ubuntu0.1

Ubuntu 23.04:
  python3-urllib3 1.26.12-1ubuntu0.1

Ubuntu 22.04 LTS:
  python3-urllib3 1.26.5-1~exp1ubuntu0.1

Ubuntu 20.04 LTS:
  python3-urllib3 1.25.8-2ubuntu0.3

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python-urllib3  1.22-1ubuntu0.18.04.2+esm1
  python3-urllib3 1.22-1ubuntu0.18.04.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  python-urllib3  1.13.1-2ubuntu0.16.04.4+esm1
  python3-urllib3 1.13.1-2ubuntu0.16.04.4+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6473-1
  CVE-2018-25091, CVE-2023-43804, CVE-2023-45803

Package Information:
https://launchpad.net/ubuntu/+source/python-urllib3/1.26.16-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-urllib3/1.26.12-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-urllib3/1.26.5-1~exp1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-urllib3/1.25.8-2ubuntu0.3



OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6472-1] GNU Scientific Library vulnerability

2023-11-07 Thread Amir Naseredini

==
Ubuntu Security Notice USN-6472-1
November 07, 2023

gsl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

GNU Scientific Library could be made to crash or execute arbitrary code if it
received specially crafted input.

Software Description:
- gsl: A modern numerical library for C and C++ programmers

Details:

It was discovered that GNU Scientific Library incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to cause a
denial of service or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  gsl-bin 2.7.1+dfsg-3ubuntu0.23.04.1
  libgsl-dev  2.7.1+dfsg-3ubuntu0.23.04.1
  libgsl272.7.1+dfsg-3ubuntu0.23.04.1
  libgslcblas02.7.1+dfsg-3ubuntu0.23.04.1

Ubuntu 22.04 LTS (Available with Ubuntu Pro):
  gsl-bin 2.7.1+dfsg-3ubuntu0.22.04.1~esm1
  libgsl-dev  2.7.1+dfsg-3ubuntu0.22.04.1~esm1
  libgsl272.7.1+dfsg-3ubuntu0.22.04.1~esm1
  libgslcblas02.7.1+dfsg-3ubuntu0.22.04.1~esm1

Ubuntu 20.04 LTS:
  gsl-bin 2.5+dfsg-6+deb10u1build0.20.04.1
  libgsl-dev  2.5+dfsg-6+deb10u1build0.20.04.1
  libgsl232.5+dfsg-6+deb10u1build0.20.04.1
  libgslcblas02.5+dfsg-6+deb10u1build0.20.04.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  gsl-bin 2.4+dfsg-6ubuntu0.1~esm1
  libgsl-dev  2.4+dfsg-6ubuntu0.1~esm1
  libgsl232.4+dfsg-6ubuntu0.1~esm1
  libgslcblas02.4+dfsg-6ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  gsl-bin 2.1+dfsg-2ubuntu0.1~esm1
  libgsl-dev  2.1+dfsg-2ubuntu0.1~esm1
  libgsl2 2.1+dfsg-2ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6472-1
  CVE-2020-35357

Package Information:
  https://launchpad.net/ubuntu/+source/gsl/2.7.1+dfsg-3ubuntu0.23.04.1
  https://launchpad.net/ubuntu/+source/gsl/2.5+dfsg-6+deb10u1build0.20.04.1



OpenPGP_0x56383E35D153B8B2.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature