Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2511 USN-4428-1: Python vulnerabilities 23 July 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Python Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Denial of Service -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-14422 CVE-2019-20907 CVE-2019-17514 CVE-2019-9674 Reference: ESB-2020.2465 ESB-2020.0765 Original Bulletin: https://usn.ubuntu.com/4428-1/ - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4428-1: Python vulnerabilities 22 July 2020 Several security issues were fixed in Python. Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS o Ubuntu 16.04 LTS o Ubuntu 14.04 ESM o Ubuntu 12.04 ESM Packages o python2.7 - An interactive high-level object-oriented language o python3.4 - An interactive high-level object-oriented language o python3.5 - An interactive high-level object-oriented language o python3.6 - An interactive high-level object-oriented language o python3.8 - Interactive high-level object-oriented language (version 3.8) Details It was discovered that Python documentation had a misleading information. A security issue could be possibly caused by wrong assumptions of this information. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17514) It was discovered that Python incorrectly handled certain TAR archives. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-20907) It was discovered that incorrectly handled certain ZIP files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9674) It was discovered that Python incorrectly handled certain IP values. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14422) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o python3.8 - 3.8.2-1ubuntu1.2 o python3.8-minimal - 3.8.2-1ubuntu1.2 Ubuntu 18.04 o python2.7 - 2.7.17-1~18.04ubuntu1.1 o python2.7-minimal - 2.7.17-1~18.04ubuntu1.1 o python3.6 - 3.6.9-1~18.04ubuntu1.1 o python3.6-minimal - 3.6.9-1~18.04ubuntu1.1 Ubuntu 16.04 o python2.7 - 2.7.12-1ubuntu0~16.04.12 o python2.7-minimal - 2.7.12-1ubuntu0~16.04.12 o python3.5 - 3.5.2-2ubuntu0~16.04.11 o python3.5-minimal - 3.5.2-2ubuntu0~16.04.11 Ubuntu 14.04 o python2.7 - 2.7.6-8ubuntu0.6+esm6 o python2.7-minimal - 2.7.6-8ubuntu0.6+esm6 o python3.4 - 3.4.3-1ubuntu1~14.04.7+esm7 o python3.4-minimal - 3.4.3-1ubuntu1~14.04.7+esm7 Ubuntu 12.04 o python2.7 - 2.7.3-0ubuntu3.18 o python2.7-minimal - 2.7.3-0ubuntu3.18 In general, a standard system update will make all the necessary changes. References o CVE-2019-20907 o CVE-2019-9674 o CVE-2019-17514 o CVE-2020-14422 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXxjjN+NLKJtyKPYoAQgnaw//diPDCDQibqUUcmhkJFhM2Lg+ze8dlMFf pRXm+BICPenpq6R8x9mKOMvMPaYKjx+azMPdebpx2DeHVaMX5+PyNN2TUfAOJsLl Qje4duzNydhkt0G+kzNX0xoS2K4mkFafpkCudeiVcvulhvqtb4oZqQYy5W00zEnA qfrtbkbkAguT9E6dQ0dvjxX1MV4hTi9NnDtN8gD6F8omNsdW+E/M/KEurYhZJrtC auAyJ/gk01k5Lm9+srdR+sqZcaxA8pkkcBp87nVAviy1r6r01HPjA2kTafYc43NZ 1e93c01OLV4yYL7Ygqgx9n7Horg8v+J+QZOlw5LV1iPorM8eZsggW2+X9Mac9P4/ ZMsoEAw+LTXoz5ybZk2zd0QhWoYY/qlF1l2Rv8fYqlRBPsPdK9JzOhBr4FPy+n3J MT7r0DEMnCvm+0G5rJxIqT9Tghnxa39jNgVaXKYNCTzreKYWMHmUR2pchTENJLaS lQblBaJ+chnsb8LXir3CmbgEKy7W0acoG90NJe+j8F05EA0mcpqxLh8nBR4ECDOb LeWpVpBTJQARoMQ4xkOpJl4iprxVpd5TdrlsihIn+Ugek/NPi0jmqt2zP1qptEME jrZo9uoT4/SPtwtHfMxVLwSumM12pQ1FfYloaqBsUHY5oLeKNJyizkgIJwRxEeWZ 7Y7w+boyeAI= =feyw -----END PGP SIGNATURE-----