USN-7015-4: Python vulnerability
14 October 2024
Python could me made to bypass some restrictions if it received specially crafted input.
Releases
Packages
- python2.7 - An interactive high-level object-oriented language
- python3.5 - An interactive high-level object-oriented language
Details
USN-7015-1 fixed several vulnerabilities in Python. This update provides the
corresponding update for CVE-2023-27043 for python2.7 and python3.5 in
Ubuntu 14.04 LTS.
Original advisory details:
It was discovered that the Python email module incorrectly parsed email
addresses that contain special characters. A remote attacker could
possibly use this issue to bypass certain protection mechanisms.
(CVE-2023-27043)
It was discovered that Python allowed excessive backtracking while parsing
certain tarfile headers. A remote attacker could possibly use this issue
to cause Python to consume resources, leading to a denial of service.
(CVE-2024-6232)
It was discovered that the Python email module incorrectly quoted newlines
for email headers. A remote attacker could possibly use this issue to
perform header injection. (CVE-2024-6923)
It was discovered that the Python http.cookies module incorrectly handled
parsing cookies that contained backslashes for quoted characters. A remote
attacker could possibly use this issue to cause Python to consume
resources, leading to a denial of service. (CVE-2024-7592)
It was discovered that the Python zipfile module incorrectly handled
certain malformed zip files. A remote attacker could possibly use this
issue to cause Python to stop responding, resulting in a denial of
service. (CVE-2024-8088)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
python2.7
-
2.7.6-8ubuntu0.6+esm20
Available with Ubuntu Pro
-
python2.7-minimal
-
2.7.6-8ubuntu0.6+esm20
Available with Ubuntu Pro
-
python3.5
-
3.5.2-2ubuntu0~16.04.4~14.04.1+esm3
Available with Ubuntu Pro
-
python3.5-minimal
-
3.5.2-2ubuntu0~16.04.4~14.04.1+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-7015-1: libpython3.10-stdlib, libpython3.8, libpython3.8-testsuite, libpython3.10-testsuite, libpython3.10-dev, python3.8-minimal, python3.12-venv, libpython3.12-dev, python3.10, python3.12-doc, python3.10-minimal, libpython3.12-testsuite, python3.10-nopie, libpython3.12-stdlib, idle-python3.8, python3.12-examples, libpython3.8-minimal, python3.12-dev, python3.12-full, python3.8-venv, libpython3.12t64, python3.10-doc, libpython3.8-dev, libpython3.12-minimal, libpython3.10, python3.12, python3.8-doc, python3.10-venv, python3.10-dev, libpython3.8-stdlib, python3.8, idle-python3.10, python3.10-examples, python3.12-nopie, python3.8-full, python3.8-dev, libpython3.10-minimal, python3.10-full, idle-python3.12, python3.8-examples, python3.12-minimal
- USN-7015-3: python3.5-minimal, libpython2.7-minimal, libpython3.5, python3.5-examples, libpython2.7-testsuite, libpython3.5-testsuite, libpython2.7-stdlib, libpython2.7, python3.5-doc, python3.5-dev, idle-python3.5, python2.7-dev, libpython3.5-stdlib, python2.7-minimal, idle-python2.7, python3.5, python2.7, libpython2.7-dev, python2.7-doc, python2.7-examples, python3.5-venv, libpython3.5-minimal, libpython3.5-dev