[USN-6473-1] urllib3 vulnerabilities
== Ubuntu Security Notice USN-6473-1 November 07, 2023 python-urllib3 vulnerabilities == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in urllib3. Software Description: - python-urllib3: HTTP library with thread-safe connection pooling Details: It was discovered that urllib3 didn't strip HTTP Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091) It was discovered that urllib3 didn't strip HTTP Cookie header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-43804) It was discovered that urllib3 didn't strip HTTP body on status code 303 redirects under certain circumstances. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-45803) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: python3-urllib3 1.26.16-1ubuntu0.1 Ubuntu 23.04: python3-urllib3 1.26.12-1ubuntu0.1 Ubuntu 22.04 LTS: python3-urllib3 1.26.5-1~exp1ubuntu0.1 Ubuntu 20.04 LTS: python3-urllib3 1.25.8-2ubuntu0.3 Ubuntu 18.04 LTS (Available with Ubuntu Pro): python-urllib3 1.22-1ubuntu0.18.04.2+esm1 python3-urllib3 1.22-1ubuntu0.18.04.2+esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): python-urllib3 1.13.1-2ubuntu0.16.04.4+esm1 python3-urllib3 1.13.1-2ubuntu0.16.04.4+esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6473-1 CVE-2018-25091, CVE-2023-43804, CVE-2023-45803 Package Information: https://launchpad.net/ubuntu/+source/python-urllib3/1.26.16-1ubuntu0.1 https://launchpad.net/ubuntu/+source/python-urllib3/1.26.12-1ubuntu0.1 https://launchpad.net/ubuntu/+source/python-urllib3/1.26.5-1~exp1ubuntu0.1 https://launchpad.net/ubuntu/+source/python-urllib3/1.25.8-2ubuntu0.3 OpenPGP_signature.asc Description: OpenPGP digital signature
[USN-6472-1] GNU Scientific Library vulnerability
== Ubuntu Security Notice USN-6472-1 November 07, 2023 gsl vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.04 LTS (Available with Ubuntu Pro) - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: GNU Scientific Library could be made to crash or execute arbitrary code if it received specially crafted input. Software Description: - gsl: A modern numerical library for C and C++ programmers Details: It was discovered that GNU Scientific Library incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: gsl-bin 2.7.1+dfsg-3ubuntu0.23.04.1 libgsl-dev 2.7.1+dfsg-3ubuntu0.23.04.1 libgsl272.7.1+dfsg-3ubuntu0.23.04.1 libgslcblas02.7.1+dfsg-3ubuntu0.23.04.1 Ubuntu 22.04 LTS (Available with Ubuntu Pro): gsl-bin 2.7.1+dfsg-3ubuntu0.22.04.1~esm1 libgsl-dev 2.7.1+dfsg-3ubuntu0.22.04.1~esm1 libgsl272.7.1+dfsg-3ubuntu0.22.04.1~esm1 libgslcblas02.7.1+dfsg-3ubuntu0.22.04.1~esm1 Ubuntu 20.04 LTS: gsl-bin 2.5+dfsg-6+deb10u1build0.20.04.1 libgsl-dev 2.5+dfsg-6+deb10u1build0.20.04.1 libgsl232.5+dfsg-6+deb10u1build0.20.04.1 libgslcblas02.5+dfsg-6+deb10u1build0.20.04.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): gsl-bin 2.4+dfsg-6ubuntu0.1~esm1 libgsl-dev 2.4+dfsg-6ubuntu0.1~esm1 libgsl232.4+dfsg-6ubuntu0.1~esm1 libgslcblas02.4+dfsg-6ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): gsl-bin 2.1+dfsg-2ubuntu0.1~esm1 libgsl-dev 2.1+dfsg-2ubuntu0.1~esm1 libgsl2 2.1+dfsg-2ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6472-1 CVE-2020-35357 Package Information: https://launchpad.net/ubuntu/+source/gsl/2.7.1+dfsg-3ubuntu0.23.04.1 https://launchpad.net/ubuntu/+source/gsl/2.5+dfsg-6+deb10u1build0.20.04.1 OpenPGP_0x56383E35D153B8B2.asc Description: OpenPGP public key OpenPGP_signature.asc Description: OpenPGP digital signature