==========================================================================
Ubuntu Security Notice USN-3463-1
October 25, 2017
python-werkzeug vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Werkzeug could be made to run arbitrary code if it opened a
specially crafted file.
Software Description:
– python-werkzeug: collection of utilities for WSGI applications
Details:
It was discovered that Werkzeug did not properly handle certain
web scripts. A remote attacker could use this to inject arbitrary
code via a field that contains an exception message.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
python-werkzeug 0.10.4+dfsg1-1ubuntu1.1
python3-werkzeug 0.10.4+dfsg1-1ubuntu1.1
Ubuntu 14.04 LTS:
python-werkzeug 0.9.4+dfsg-1.1ubuntu2.1
python3-werkzeug 0.9.4+dfsg-1.1ubuntu2.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3463-1
CVE-2016-10516
Package Information:
https://launchpad.net/ubuntu/+source/python-werkzeug/0.10.4+dfsg1-1ub
untu1.1
https://launchpad.net/ubuntu/+source/python-werkzeug/0.9.4+dfsg-1.1ub
untu2.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=jgLe
—–END PGP SIGNATURE—–
—