Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5625-1[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5625-1 - It was discovered that Mako incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause a denial of service.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2022-40023[11]
- SHA-256 |
1518e9ab65af606e2b3478c1bc02d7277d99370e8ebac2f107d283198ef64bcc
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
=========================================================================
Ubuntu Security Notice USN-5625-1
September 21, 2022
mako vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Mako could be made to denial of service if it received a
specially crafted regular expression.
Software Description:
- mako: documentation for the Mako Python library
Details:
It was discovered that Mako incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
python3-mako 1.1.3+ds1-2ubuntu0.1
Ubuntu 20.04 LTS:
python-mako 1.1.0+ds1-1ubuntu2.1
python3-mako 1.1.0+ds1-1ubuntu2.1
Ubuntu 18.04 LTS:
python-mako 1.0.7+ds1-1ubuntu0.2
python3-mako 1.0.7+ds1-1ubuntu0.2
Ubuntu 16.04 ESM:
python-mako 1.0.3+ds1-1ubuntu1+esm1
python3-mako 1.0.3+ds1-1ubuntu1+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5625-1
CVE-2022-40023
Package Information:
https://launchpad.net/ubuntu/+source/mako/1.1.3+ds1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/mako/1.1.0+ds1-1ubuntu2.1
https://launchpad.net/ubuntu/+source/mako/1.0.7+ds1-1ubuntu0.2
File Tags
- ActiveX[21] (932)
- Advisory[22] (78,230)
- Arbitrary[23] (15,261)
- BBS[24] (2,859)
- Bypass[25] (1,585)
- CGI[26] (1,013)
- Code Execution[27] (6,761)
- Conference[28] (671)
- Cracker[29] (799)
- CSRF[30] (3,275)
- DoS[31] (22,049)
- Encryption[32] (2,339)
- Exploit[33] (50,097)
- File Inclusion[34] (4,160)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,564)
- Intrusion Detection[38] (860)
- Java[39] (2,822)
- JavaScript[40] (807)
- Kernel[41] (6,150)
- Local[42] (14,088)
- Magazine[43] (586)
- Overflow[44] (12,252)
- Perl[45] (1,413)
- PHP[46] (5,057)
- Proof of Concept[47] (2,284)
- Protocol[48] (3,347)
- Python[49] (1,405)
- Remote[50] (29,845)
- Root[51] (3,463)
- Ruby[52] (581)
- Scanner[53] (1,630)
- Security Tool[54] (7,734)
- Shell[55] (3,075)
- Shellcode[56] (1,203)
- Sniffer[57] (883)
- Spoof[58] (2,123)
- SQL Injection[59] (16,054)
- TCP[60] (2,368)
- Trojan[61] (682)
- UDP[62] (871)
- Virus[63] (660)
- Vulnerability[64] (30,643)
- Web[65] (9,104)
- Whitepaper[66] (3,723)
- x86[67] (943)
- XSS[68] (17,382)
- Other[69]
File Archives
- September 2022[70]
- August 2022[71]
- July 2022[72]
- June 2022[73]
- May 2022[74]
- April 2022[75]
- March 2022[76]
- February 2022[77]
- January 2022[78]
- December 2021[79]
- November 2021[80]
- October 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,899)
- BSD[85] (369)
- CentOS[86] (55)
- Cisco[87] (1,915)
- Debian[88] (5,948)
- Fedora[89] (1,690)
- FreeBSD[90] (1,242)
- Gentoo[91] (4,197)
- HPUX[92] (878)
- iOS[93] (323)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (42,876)
- Mac OS X[98] (684)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (478)
- RedHat[102] (11,991)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (8,009)
- UNIX[107] (9,113)
- UnixWare[108] (185)
- Windows[109] (6,470)
- Other[110]
Read more https://packetstormsecurity.com/files/168455/USN-5625-1.txt