lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20200123220359.wibf6jvn3mtabm4d@seger.debian.org> Date: Thu, 23 Jan 2020 22:03:59 +0000 From: Moritz Muehlenhoff <jmm@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4609-1] python-apt security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4609-1 security@...ian.org https://www.debian.org/security/ Moritz Muehlenhoff January 23, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : python-apt CVE ID : CVE-2019-15795 CVE-2019-15796 Debian Bug : 944696 Two security issues were found in the Python interface to the apt package manager; package downloads from unsigned repositories were incorrectly rejected and the hash validation relied on MD5. For the oldstable distribution (stretch), these problems have been fixed in version 1.4.1. For the stable distribution (buster), these problems have been fixed in version 1.8.4.1. We recommend that you upgrade your python-apt packages. For the detailed security status of python-apt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-apt Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl4qF5EACgkQEMKTtsN8 TjZykBAAvhDU3w5rns+G9IxyaO8h6WVlMQpZ1KVgST2esqtPUVcpFs3fW4pfv2+U 7T7Y8bggvq/AQCGuQ5wCL3OGqRQB4eic3czMSOGJi0Bvakg2rf5DuejPz9UV/IDm XfZcYHaJ+aG+1Cnq3bCdQUGXNYb+cPIUgHeeGKuVdFOFQ6mpXby9JM+BjXEd3wTw 2D64Ri9PZcGK8loqHrK0IjteX+OXB0x/RSqSmoLOp2Dojyh0qOYlSvIWcI1mi1Ai 8CRoLJpGDCT+uir2e/Eo16GHimSvty629jsdTitzHjP5kbqr8vfMoiPOR4eRQfEk HN0tGfeHVv6Zml1pOiCUh9RC9oXIKQyoMzd8XBcUNM+/O8C/sodKBdX9HEpIsGq/ lddCgyWTymevaq0LkHdKLQBO4/iXK2o7+cSYR9RWHYXHJQbsuPHins3Mos4H49Bk /LW8OA2mzZOoWy20FMAmZWSeyUZJwO6jvPjnS2Y+1yl17enK9Z3DN5/Nr6ESFJWR ZbdlMSBCpWqvdgzujmtnsdW4QDJ0apI7lTWi8o+RZJAARaVCIL1VIWe+xB5AKrPC Whmxo51QQXFTyAxbtlxiiARa63zVAQGZGwUWnXosHwVuMIgu0kKuZyF7xUHX46Xp GcssWD03bFW6DwMc5GhEmHOHoNjtSCf/8i2HsH+NNpOwuyGrkss= =vTM3 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists