[USN-4127-2] Python vulnerabilities

Leonidas S. Barbosa leo.barbosa at canonical.com
Tue Sep 10 14:01:14 UTC 2019


==========================================================================
Ubuntu Security Notice USN-4127-2
September 10, 2019

python2.7, python3.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Python.

Software Description:
- python2.7: An interactive high-level object-oriented language
- python3.4: An interactive high-level object-oriented language

Details:

USN-4127-1 fixed several vulnerabilities in Python. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that Python incorrectly handled certain pickle files. An
 attacker could possibly use this issue to consume memory, leading to a
 denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2018-20406)

 It was discovered that Python incorrectly validated the domain when
 handling cookies. An attacker could possibly trick Python into sending
 cookies to the wrong domain. (CVE-2018-20852)

 Jonathan Birch and Panayiotis Panayiotou discovered that Python incorrectly
 handled Unicode encoding during NFKC normalization. An attacker could
 possibly use this issue to obtain sensitive information. (CVE-2019-9636,
 CVE-2019-10160)

 Colin Read and Nicolas Edet discovered that Python incorrectly handled
 parsing certain X509 certificates. An attacker could possibly use this
 issue to cause Python to crash, resulting in a denial of service. This
 issue only affected Ubuntu 14.04 ESM. (CVE-2019-5010)

 It was discovered that Python incorrectly handled certain urls. A remote
 attacker could possibly use this issue to perform CRLF injection attacks.
 (CVE-2019-9740, CVE-2019-9947)

 Sihoon Lee discovered that Python incorrectly handled the local_file:
 scheme. A remote attacker could possibly use this issue to bypass blacklist
 meschanisms. (CVE-2019-9948)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  python2.7                       2.7.6-8ubuntu0.6+esm2
  python2.7-minimal               2.7.6-8ubuntu0.6+esm2
  python3.4                       3.4.3-1ubuntu1~14.04.7+esm2
  python3.4-minimal               3.4.3-1ubuntu1~14.04.7+esm2

Ubuntu 12.04 ESM:
  python2.7                       2.7.3-0ubuntu3.14
  python2.7-minimal               2.7.3-0ubuntu3.14

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4127-2
  https://usn.ubuntu.com/4127-1
  CVE-2018-20406, CVE-2018-20852, CVE-2019-10160, CVE-2019-5010,
  CVE-2019-9636, CVE-2019-9740, CVE-2019-9947, CVE-2019-9948
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20190910/d64e014d/attachment.sig>


More information about the ubuntu-security-announce mailing list