Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0865 [DLA 1717-1] rdflib security update 19 March 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-rdflib-tools Publisher: Debian Operating System: Debian GNU/Linux 8 Linux variants Impact/Access: Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-7653 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/03/msg00019.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running python-rdflib-tools check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : rdflib Version : 4.1.2-3+deb8u1 CVE ID : CVE-2019-7653 Debian Bug : #921751 The CLI tools in python-rdflib-tools can load python modules found in the current directory. This happens because "python -m" appends the current directory in the python path. For Debian 8 "Jessie", this problem has been fixed in version 4.1.2-3+deb8u1. We recommend that you upgrade your rdflib packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAlyPO24ACgkQKpJZkldk SvpuLw//S2zb9NiB9sMKVyZkLLLh4++DmJc5CSIdtquSkzfwGOV0AvD4Jr5Ls9nk v1VjVSNM1Nty93x5XEeAJHZCO+YAUKFTGjMEhn3Mry380UAiZzZquvIR15xohDaT hhslKlVOgSSM8BhEM42Vyd27zsoZ3DJkFg7kE45f7hEkfz8KKrK8ZAYbF8d3LqmC TQuhv1vUbOyKgnMVXYQwuX7yLTWyu0CRCc6co2n2K1YZyfb6wIhXzAty8EAFu4SR Mg75itoOhrx/75drLLn4/T/zttYQL+Zf9rbFYI8En8vW/57o4jnrR9KldBigmjKD YmNb8ESdmOW06ElDVvJdIY55yCt5Uc0F/2ZV9DrotEdMi0kONznU0A1aqx95CU0R r/D+yyAM+kVOVsg4Xvm5e0rs/g8UxIbfwrzEYfqqOp/nEdMSW/Gz8A9XtD4N2m5U XHfSoM7Grm0I0hTRhcbKTID9rIaZYEQpQFyeJ9eEGPcDSTVORRLJIXVfuJ5DyjO9 4GoBLI+QB2Xd4AVObdMFtPFKBVSH/wSFD4+8utlLyWUi5BR+2Gp84m6Z8qMBSTBW Cc6pg4Aj4yslTKaOjM15B+/gqWwxzE2BMOxP+fP0I5ho5WVFiIq+2HnFW3t3ZHV0 fpk6HBpuyGecbS3lqmTOumc7Gur+rJVfJ+5aBMVfoYh64wcu1dU= =wwN5 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXJBEmmaOgq3Tt24GAQj4EQ/+MAb8hJdg51m2IOusJEC6ent7npYpIoYg RVHv6aJi8XYQg6PvMPofUoST4INCu3zxKVvDkr78B6JoWBNEpEoa7eUkRfuxRcgN evxQNUpujNs8qY3EmAp97VGNzuyS0QrORR/22UUtIgxuXLpO4lVy2i2QqptavGNZ elVPYsM41UaE++ytbNdC8CgU9TJ2lxCz2eM9ey6hqXlfmAMBzKwIbxTwOsZn/Ltv 5MB5WROeGnki5RntzggFEQVMuRPoR0u6/3ijBouAkPgQiAFWm6muAZLzCve6suzF jDUtp7YfSCJg6XL5jH/KYf2kf9RRiBl+AhwacGPf6Ulk/FiQ+/4tEDSEj+j1U/k+ LNwd3Kkhb5o1i98WAxNk/fX8n94xU0/jyN6ozrQ1+5V58Od+cKwo/a7H4yfqLPHq doe/8/keds7IpnyUdqQpRMznPM4eJpc0riIhiNyXqdbq+Sl/Rq5tH+ReY48ajMjm YFPs7rk7Ntl8TmpgOvg1w3goyAkgaA+OxVlp+d0rbaHJbHLHafu+14pEHtjMbtIu ZlaG5u7jbXUboY7puV4S58cODOouz1GO+KT7j2CicZttRS//x4ulUTgikZDSdbYp 1i3Sld6QlYAEHpW1yVSonTj7Mir65b+mo2xsrbqSbQJb7il2JOMfbdcVTcJ/o5NH Yd4fNxE1i1c= =HDNE -----END PGP SIGNATURE-----