[Trisquel-security] [USN-1449-1] feedparser vulnerability

Jamie Strandboge jamie at canonical.com
Tue May 22 21:23:01 CEST 2012


==========================================================================
Ubuntu Security Notice USN-1449-1
May 22, 2012

feedparser vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Applications using feedparser could be made to crash if they fetched a
specially crafted feed.

Software Description:
- feedparser: Universal Feed Parser for Python

Details:

It was discovered that feedparser did not properly sanitize ENTITY
declarations in encoded fields. A remote attacker could exploit this to
cause a denial of service via memory exhaustion.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  python-feedparser               5.1-0ubuntu3.1
  python3-feedparser              5.1-0ubuntu3.1

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1449-1
  CVE-2012-2921

Package Information:
  https://launchpad.net/ubuntu/+source/feedparser/5.1-0ubuntu3.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20120522/99466646/attachment.pgp>
-------------- next part --------------
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


More information about the Trisquel-security mailing list