|
|
Subscribe / Log in / New account

Ubuntu alert USN-7015-2 (python2.7, python3.5)

From:  Julia Sarris <julia.sarris@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7015-2] Python vulnerabilities
Date:  Thu, 19 Sep 2024 14:08:09 -0400
Message-ID:  <315180aa-059d-49db-b2d0-f938801debef@canonical.com>

========================================================================== Ubuntu Security Notice USN-7015-2 September 19, 2024 python2.7, python3.5 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Python. Software Description: - python2.7: An interactive high-level object-oriented language - python3.5: An interactive high-level object-oriented language Details: USN-7015-1 fixed several vulnerabilities in Python. This update provides one of the corresponding updates for python2.7 for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS, and a second for python3.5 for Ubuntu 16.04 LTS. Original advisory details:  It was discovered that Python allowed excessive backtracking while  parsing certain tarfile headers. A remote attacker could possibly use  this issue to cause Python to consume resources, leading to a denial  of service. This issue only affected python3.5 for  Ubuntu 16.04 LTS (CVE-2024-6232)  It was discovered that the Python http.cookies module incorrectly  handled parsing cookies that contained backslashes for quoted  characters. A remote attacker could possibly use this issue to  cause Python to consume resources, leading to a denial  of service. (CVE-2024-7592) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS   python2.7                       2.7.18-13ubuntu1.2+esm2                                   Available with Ubuntu Pro   python2.7-minimal               2.7.18-13ubuntu1.2+esm2                                   Available with Ubuntu Pro Ubuntu 20.04 LTS   python2.7                       2.7.18-1~20.04.4+esm2                                   Available with Ubuntu Pro   python2.7-minimal               2.7.18-1~20.04.4+esm2                                   Available with Ubuntu Pro Ubuntu 18.04 LTS   python2.7                       2.7.17-1~18.04ubuntu1.13+esm5                                   Available with Ubuntu Pro   python2.7-minimal               2.7.17-1~18.04ubuntu1.13+esm5                                   Available with Ubuntu Pro Ubuntu 16.04 LTS   python2.7                       2.7.12-1ubuntu0~16.04.18+esm10                                   Available with Ubuntu Pro   python2.7-minimal               2.7.12-1ubuntu0~16.04.18+esm10                                   Available with Ubuntu Pro   python3.5                       3.5.2-2ubuntu0~16.04.13+esm14                                   Available with Ubuntu Pro   python3.5-minimal               3.5.2-2ubuntu0~16.04.13+esm14                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7015-2 <https://ubuntu.com/security/notices/USN-7015-2> https://ubuntu.com/security/notices/USN-7015-1 <https://ubuntu.com/security/notices/USN-7015-1>   CVE-2024-6232, CVE-2024-7592


Attachment: None (type=text/html)

(HTML attachment elided)


Attachment: OpenPGP_0x401EFCBCDA0FF1BD.asc (type=application/pgp-keys)

-----BEGIN PGP PUBLIC KEY BLOCK----- xsBNBGao8McBCAD/mTHpWpp0rMyhX+xQYmuj1DoCiadFZysyAyKIFXODXRSOAQ58 YTf6BEuhPtEamZq+aJEGOTBJmUZxvGMv0Fo5yBN+OGoMA2CJQwxWQCZCptfivOCI D5p2eANebDVXpZHHgpNwCyFVZR/UfSLMqX/y2wEi1AC4CKc3ihFBWdMJVdDk6zz0 4g/x4w76CZczUpe17QWD1XuAWUxmaVGM/TiKjktq3Lp6yZrb0QSYjCovXAGwfBmz beludDi+EMDmh76PeKWfqQ38QSPEvN+Lv6OTjPWDfilfuOPpDZA2gsjNj3TaBllL k9YW98OrqsbegQ0BhPgoPYQ3S15ikv53M8o/ABEBAAHNKUp1bGlhIFNhcnJpcyA8 anVsaWEuc2FycmlzQGNhbm9uaWNhbC5jb20+wsCRBBMBCgA7FiEEOMd9M4Vpc6WH Yvv+QB78vNoP8b0FAmao8McCGwMFCwkIBwICIgIGFQoJCAsCBBYCAwECHgcCF4AA CgkQQB78vNoP8b3fXQf6Awx8Nd5FkMMGdrWqBjIPZv1Ogkka2+PiIqwqcIeQGvam V/bpIKOCb4QOS4kgQ+hNS1mmK+T/aWXRCYhiBIPAOIbo7jcMGxNz7V3+43RxlNVl zt3feYM/QAJmgK8bjdCzI5ZQHiyX8pgOieCylRrcjroQHa9CxHej4aJGCaPGLFGo 81lYWJm21NP4LJTLk03ncJT8Ss64R28cOWUHujysxftAPHVYpPLdlwuJ3lgC8M5n eq0qwsv22j62ldd/J7u2psRSczaU1ve/TfX71ZCyZZiw2Tm5HvaskD+CilXOaL2H +KediuEtkQk5KKQikg2XtjbqCYyIxQT50v1TIu86ss7ATQRmqPDHAQgA5zGDufJq 9MhhDPJqM3Qz4kQXLKDXz2l5EovU5olrYerGmskpUBUSwfgAeBu9gMP5Y24spir3 eMm6O7m8EJsihMPCw4Iblzi9YZZX1TY3wegRXFIiaqW5kELnjhVnRpS9WQi9FDd9 gGPp7X3iQ8/B6+nyHitqhcj2A+Vpk5HaguY8zl3yEOwFnud5TEbSb/xYz7DhX5uv B/FZ9rgn+j2N0hC/RVN1MpSRHZEbOCfpaYr/teiQexOWBlVVnZgCkHb9F0NiNImv dXVZ18jY5wfgxemfgm8l4nDUlSMUIMiwGYekPMEuYvoDNPwfzzlYHKrVoqp54KMd JALMUar1bVZtxQARAQABwsB2BBgBCgAgFiEEOMd9M4Vpc6WHYvv+QB78vNoP8b0F Amao8McCGwwACgkQQB78vNoP8b10+ggA8nW+R2g9BDvkpurM0lwpaCtgKbaENIGg lpxNXEEUEW7AaR4Mme+4PA/SdpWrFzVa0OGhqtZxkovUZXpgiLlx5/eR1Bl+TUuO rjZkjGBy3r2Ce1JLwKilSZk7Bk45L7QDxA+NOLSFS7ADqzv37J2jhpfczqrYdpSj kHgUvkapbuB0ONpQ/mhH9UDquY3eMGv3GSrvggVS0mKjR6bMl1plBWcfJ+Y//xQc 6S1bBdjbmwKMZjYbvhTpPbVeUOUdOg/0mYC/3rjSO+2OEn1Q+YIdfGqbLpDAbruG m7XHtUOXesWorhDMzQGRpj7R+ed/9uJs0Nvg5FqAKTrzh+90ngEGuA== =Qkbp -----END PGP PUBLIC KEY BLOCK-----


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsB5BAABCAAjFiEEOMd9M4Vpc6WHYvv+QB78vNoP8b0FAmbsaIkFAwAAAAAACgkQQB78vNoP8b3k mgf/enFT4FHWhSQB0dkOPP2gQ7Vwj/yVIRV7/gJIgWvUEM8zuuTJOGoAZjS5fZkeJgDKkH7sIThB qW6DEwW/MlUgPKHdK3VO3uZ9UAHMv6gVxpTA+KK71/zdxdQnrbi6qS7sEKVcrkFmoBVnIPuzUuiK 1MylCbUmzh2w3S4yHl2jmoNQzWyr4ZWoMZnvfpUwxu2UyNr8RmXNnryIiNwH6Wm/HJrHxapMUA9q CJqFbyyq8QcH+6bsvdKM+J8lLnOwHSjO06wP3Ae2MeCJNIq1O7Ws+T6oWSizSe96HJczLAYWTHyh EBuMMgDODMwNPDs29/a+xNb6965LrTgEZizHlp9VMg== =46CM -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds