USN-6139-1: Python vulnerability
5 June 2023
Python could be made to bypass blocklisting methods if a specially crafted URL was provided
Releases
- Ubuntu 23.04
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 ESM
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Packages
- python2.7 - An interactive high-level object-oriented language
- python3.10 - An interactive high-level object-oriented language
- python3.11 - An interactive high-level object-oriented language
- python3.5 - An interactive high-level object-oriented language
- python3.6 - An interactive high-level object-oriented language
- python3.8 - An interactive high-level object-oriented language
Details
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could use this issue to bypass blockinglisting methods.
This issue was first addressed in USN-5960-1, but was incomplete.
Here we address an additional fix to that issue. (CVE-2023-24329)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
python2.7
-
2.7.17-1~18.04ubuntu1.13
Available with Ubuntu Pro
-
python3.6
-
3.6.9-1~18.04ubuntu1.13
Available with Ubuntu Pro
Ubuntu 16.04
-
python2.7
-
2.7.12-1ubuntu0~16.04.18+esm5
Available with Ubuntu Pro
-
python3.5
-
3.5.2-2ubuntu0~16.04.13+esm8
Available with Ubuntu Pro
Ubuntu 14.04
-
python2.7
-
2.7.6-8ubuntu0.6+esm15
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.