Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5519-1[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5519-1 - It was discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2015-20107[11]
- SHA-256 |
5d14f39f1eb4bd189e0b727ddf12f2568325e99366d052607e964063bdb10d56
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
=========================================================================
Ubuntu Security Notice USN-5519-1
July 14, 2022
python2.7, python3.10, python3.4, python3.5, python3.6, python3.8,
python3.9 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Python could be made to run arbitrary code if it received a specially
crafted input.
Software Description:
- python2.7: An interactive high-level object-oriented language
- python3.10: Interactive high-level object-oriented language (version 3.10)
- python3.9: Interactive high-level object-oriented language (version 3.9)
- python3.8: An interactive high-level object-oriented language
- python3.6: An interactive high-level object-oriented language
- python3.5: An interactive high-level object-oriented language
- python3.4: An interactive high-level object-oriented language
Details:
It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
python2.7 2.7.18-13ubuntu1.1
python2.7-minimal 2.7.18-13ubuntu1.1
python3.10 3.10.4-3ubuntu0.1
python3.10-minimal 3.10.4-3ubuntu0.1
Ubuntu 21.10:
python2.7 2.7.18-8ubuntu0.2
python2.7-minimal 2.7.18-8ubuntu0.2
python3.9 3.9.7-2ubuntu0.1
python3.9-minimal 3.9.7-2ubuntu0.1
Ubuntu 20.04 LTS:
python2.7 2.7.18-1~20.04.3
python2.7-minimal 2.7.18-1~20.04.3
python3.8 3.8.10-0ubuntu1~20.04.5
python3.8-minimal 3.8.10-0ubuntu1~20.04.5
Ubuntu 18.04 LTS:
python2.7 2.7.17-1~18.04ubuntu1.8
python2.7-minimal 2.7.17-1~18.04ubuntu1.8
python3.6 3.6.9-1~18.04ubuntu1.8
python3.6-minimal 3.6.9-1~18.04ubuntu1.8
Ubuntu 16.04 ESM:
python2.7 2.7.12-1ubuntu0~16.04.18+esm2
python2.7-minimal 2.7.12-1ubuntu0~16.04.18+esm2
python3.5 3.5.2-2ubuntu0~16.04.13+esm3
python3.5-minimal 3.5.2-2ubuntu0~16.04.13+esm3
Ubuntu 14.04 ESM:
python2.7 2.7.6-8ubuntu0.6+esm11
python2.7-minimal 2.7.6-8ubuntu0.6+esm11
python3.4 3.4.3-1ubuntu1~14.04.7+esm13
python3.4-minimal 3.4.3-1ubuntu1~14.04.7+esm13
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5519-1
CVE-2015-20107
Package Information:
https://launchpad.net/ubuntu/+source/python2.7/2.7.18-13ubuntu1.1
https://launchpad.net/ubuntu/+source/python3.10/3.10.4-3ubuntu0.1
https://launchpad.net/ubuntu/+source/python2.7/2.7.18-8ubuntu0.2
https://launchpad.net/ubuntu/+source/python3.9/3.9.7-2ubuntu0.1
https://launchpad.net/ubuntu/+source/python2.7/2.7.18-1~20.04.3
https://launchpad.net/ubuntu/+source/python3.8/3.8.10-0ubuntu1~20.04.5
https://launchpad.net/ubuntu/+source/python2.7/2.7.17-1~18.04ubuntu1.8
https://launchpad.net/ubuntu/+source/python3.6/3.6.9-1~18.04ubuntu1.8
File Tags
- ActiveX[21] (932)
- Advisory[22] (77,762)
- Arbitrary[23] (15,161)
- BBS[24] (2,859)
- Bypass[25] (1,572)
- CGI[26] (1,012)
- Code Execution[27] (6,690)
- Conference[28] (670)
- Cracker[29] (797)
- CSRF[30] (3,272)
- DoS[31] (21,883)
- Encryption[32] (2,335)
- Exploit[33] (49,901)
- File Inclusion[34] (4,148)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,550)
- Intrusion Detection[38] (856)
- Java[39] (2,793)
- JavaScript[40] (798)
- Kernel[41] (6,064)
- Local[42] (14,026)
- Magazine[43] (586)
- Overflow[44] (12,218)
- Perl[45] (1,411)
- PHP[46] (5,048)
- Proof of Concept[47] (2,283)
- Protocol[48] (3,321)
- Python[49] (1,404)
- Remote[50] (29,730)
- Root[51] (3,451)
- Ruby[52] (577)
- Scanner[53] (1,630)
- Security Tool[54] (7,705)
- Shell[55] (3,064)
- Shellcode[56] (1,203)
- Sniffer[57] (881)
- Spoof[58] (2,085)
- SQL Injection[59] (16,020)
- TCP[60] (2,361)
- Trojan[61] (676)
- UDP[62] (866)
- Virus[63] (659)
- Vulnerability[64] (30,495)
- Web[65] (9,045)
- Whitepaper[66] (3,718)
- x86[67] (943)
- XSS[68] (17,344)
- Other[69]
File Archives
- July 2022[70]
- June 2022[71]
- May 2022[72]
- April 2022[73]
- March 2022[74]
- February 2022[75]
- January 2022[76]
- December 2021[77]
- November 2021[78]
- October 2021[79]
- September 2021[80]
- August 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,883)
- BSD[85] (368)
- CentOS[86] (55)
- Cisco[87] (1,913)
- Debian[88] (5,948)
- Fedora[89] (1,690)
- FreeBSD[90] (1,241)
- Gentoo[91] (4,152)
- HPUX[92] (878)
- iOS[93] (318)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (42,426)
- Mac OS X[98] (683)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (478)
- RedHat[102] (11,714)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (7,888)
- UNIX[107] (9,088)
- UnixWare[108] (185)
- Windows[109] (6,428)
- Other[110]
Read more https://packetstormsecurity.com/files/167753/USN-5519-1.txt