-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2511
                    USN-4428-1: Python vulnerabilities
                               23 July 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Python
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Denial of Service -- Remote/Unauthenticated
                   Reduced Security  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14422 CVE-2019-20907 CVE-2019-17514
                   CVE-2019-9674  

Reference:         ESB-2020.2465
                   ESB-2020.0765

Original Bulletin: 
   https://usn.ubuntu.com/4428-1/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4428-1: Python vulnerabilities
22 July 2020

Several security issues were fixed in Python.
Releases

  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 LTS
  o Ubuntu 16.04 LTS
  o Ubuntu 14.04 ESM
  o Ubuntu 12.04 ESM

Packages

  o python2.7 - An interactive high-level object-oriented language
  o python3.4 - An interactive high-level object-oriented language
  o python3.5 - An interactive high-level object-oriented language
  o python3.6 - An interactive high-level object-oriented language
  o python3.8 - Interactive high-level object-oriented language (version 3.8)

Details

It was discovered that Python documentation had a misleading information.
A security issue could be possibly caused by wrong assumptions of this
information.
This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS
and
Ubuntu 18.04 LTS. (CVE-2019-17514)

It was discovered that Python incorrectly handled certain TAR archives.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2019-20907)

It was discovered that incorrectly handled certain ZIP files. An attacker
could possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and Ubuntu 18.04
LTS.
(CVE-2019-9674)

It was discovered that Python incorrectly handled certain IP values.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
and
Ubuntu 20.04 LTS. (CVE-2020-14422)

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 20.04

  o python3.8 - 3.8.2-1ubuntu1.2
  o python3.8-minimal - 3.8.2-1ubuntu1.2

Ubuntu 18.04

  o python2.7 - 2.7.17-1~18.04ubuntu1.1
  o python2.7-minimal - 2.7.17-1~18.04ubuntu1.1
  o python3.6 - 3.6.9-1~18.04ubuntu1.1
  o python3.6-minimal - 3.6.9-1~18.04ubuntu1.1

Ubuntu 16.04

  o python2.7 - 2.7.12-1ubuntu0~16.04.12
  o python2.7-minimal - 2.7.12-1ubuntu0~16.04.12
  o python3.5 - 3.5.2-2ubuntu0~16.04.11
  o python3.5-minimal - 3.5.2-2ubuntu0~16.04.11

Ubuntu 14.04

  o python2.7 - 2.7.6-8ubuntu0.6+esm6
  o python2.7-minimal - 2.7.6-8ubuntu0.6+esm6
  o python3.4 - 3.4.3-1ubuntu1~14.04.7+esm7
  o python3.4-minimal - 3.4.3-1ubuntu1~14.04.7+esm7

Ubuntu 12.04

  o python2.7 - 2.7.3-0ubuntu3.18
  o python2.7-minimal - 2.7.3-0ubuntu3.18

In general, a standard system update will make all the necessary changes.

References

  o CVE-2019-20907
  o CVE-2019-9674
  o CVE-2019-17514
  o CVE-2020-14422

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXxjjN+NLKJtyKPYoAQgnaw//diPDCDQibqUUcmhkJFhM2Lg+ze8dlMFf
pRXm+BICPenpq6R8x9mKOMvMPaYKjx+azMPdebpx2DeHVaMX5+PyNN2TUfAOJsLl
Qje4duzNydhkt0G+kzNX0xoS2K4mkFafpkCudeiVcvulhvqtb4oZqQYy5W00zEnA
qfrtbkbkAguT9E6dQ0dvjxX1MV4hTi9NnDtN8gD6F8omNsdW+E/M/KEurYhZJrtC
auAyJ/gk01k5Lm9+srdR+sqZcaxA8pkkcBp87nVAviy1r6r01HPjA2kTafYc43NZ
1e93c01OLV4yYL7Ygqgx9n7Horg8v+J+QZOlw5LV1iPorM8eZsggW2+X9Mac9P4/
ZMsoEAw+LTXoz5ybZk2zd0QhWoYY/qlF1l2Rv8fYqlRBPsPdK9JzOhBr4FPy+n3J
MT7r0DEMnCvm+0G5rJxIqT9Tghnxa39jNgVaXKYNCTzreKYWMHmUR2pchTENJLaS
lQblBaJ+chnsb8LXir3CmbgEKy7W0acoG90NJe+j8F05EA0mcpqxLh8nBR4ECDOb
LeWpVpBTJQARoMQ4xkOpJl4iprxVpd5TdrlsihIn+Ugek/NPi0jmqt2zP1qptEME
jrZo9uoT4/SPtwtHfMxVLwSumM12pQ1FfYloaqBsUHY5oLeKNJyizkgIJwRxEeWZ
7Y7w+boyeAI=
=feyw
-----END PGP SIGNATURE-----