Monday, November 27, 2023

[USN-6513-2] Python vulnerability

-----BEGIN PGP SIGNATURE-----
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=cxIn
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6513-2
November 27, 2023

python3.8, python3.10, python3.11 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Python.

Software Description:
- python3.11: An interactive high-level object-oriented language
- python3.10: An interactive high-level object-oriented language
- python3.8: An interactive high-level object-oriented language

Details:

USN-6513-1 fixed vulnerabilities in Python. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04.

Original advisory details:

 It was discovered that Python incorrectly handled certain plist files.
 If a user or an automated system were tricked into processing a specially
 crafted plist file, an attacker could possibly use this issue to consume
 resources, resulting in a denial of service. (CVE-2022-48564)

 It was discovered that Python instances of ssl.SSLSocket were vulnerable
 to a bypass of the TLS handshake. An attacker could possibly use this
 issue to cause applications to treat unauthenticated received data before
 TLS handshake as authenticated data after TLS handshake. (CVE-2023-40217)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  python3.11                      3.11.4-1~23.04.1

Ubuntu 22.04 LTS:
  python3.10                      3.10.12-1~22.04.3

Ubuntu 20.04 LTS:
  python3.8                       3.8.10-0ubuntu1~20.04.9

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6513-2
  https://ubuntu.com/security/notices/USN-6513-1
  CVE-2023-40217

Package Information:
  https://launchpad.net/ubuntu/+source/python3.11/3.11.4-1~23.04.1
https://launchpad.net/ubuntu/+source/python3.10/3.10.12-1~22.04.3
https://launchpad.net/ubuntu/+source/python3.8/3.8.10-0ubuntu1~20.04.9

No comments:

Post a Comment