USN-5960-1: Python vulnerability
16 March 2023
Python could be made to bypass blocklisting methods if a specially crafted URL was provided.
Releases
Packages
- python2.7 - An interactive high-level object-oriented language
- python3.10 - An interactive high-level object-oriented language
- python3.5 - An interactive high-level object-oriented language
- python3.6 - An interactive high-level object-oriented language
- python3.8 - An interactive high-level object-oriented language
Details
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could possibly use this issue to bypass blocklisting
methods by supplying a URL that starts with blank characters.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04
-
python2.7
-
2.7.12-1ubuntu0~16.04.18+esm4
Available with Ubuntu Pro
-
python3.5
-
3.5.2-2ubuntu0~16.04.13+esm7
Available with Ubuntu Pro
Ubuntu 14.04
-
python2.7
-
2.7.6-8ubuntu0.6+esm14
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.