Thursday, August 1, 2024

[USN-6941-1] Python vulnerability

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmarjNoACgkQZWnYVadE
vpPYWQ//TuldV9DcyV+swDpuqetyFLRrAn7vPh1MlU8I3I+V9MxsINBYZRfacW7i
mxf887DWsP7a3qsagIiVEXPUiwUqiKMKMFHG9CE4NLZ1vFODZhZhLx5xIYJqYN8h
OmV/wuPR9tx8JNNrKwTJSUt7bmeTSkGNoHnYg0YhJ4lpFpP48o6hoOoV8ZChUYGC
ul/nfZKOFEzPOBInr0uZpWQU6tDLUiP7FD3WY2ynf9ZSqhgI9TaDKXHgS40apdRO
ANBkfuQ/dS6hnmfaKGDDI25rR2wvSI1Oih//csZI8vaFVF0fZm/JNGCD+QHpYbZv
ujaS9LluPme3RzQ1AFHAVsQdvbl4MhL1VzOgiJQSawgiOFYY1MFAhmqNwhVqeMrn
C2Dd65vRg83iEp1JnZoWBTA9sUqLTl4R5BaSPHTf4QHY2/VtKrNcWLsHvijhsPaT
0h0Q/3VQh2DxVagAsyLd57nHYagd4Q9UjUeO0RlJmBV0u2nL49UUIq64ozliwpsr
OQq8B38kFSEylI4Gu97dl/8nBxhuQT+3puH6qtU9BBBogj1H5p+YqmYri2D5EjX5
SnZ1CD5vUarka/AsyxBx1f0d8VnIm5iXpm2Kp5h0WTwCN2Nma1eqZ0tcYwLzod5R
eHQc6g167I0w5scf07RT1REx8Jk5IU7PbGTvYujpI6UasSqi00k=
=hSqQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6941-1
August 01, 2024

python3.12 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Python could allow unintended access to network services.

Software Description:
- python3.12: An interactive high-level object-oriented language

Details:

It was discovered that the Python ipaddress module contained incorrect
information about which IP address ranges were considered "private" or
"globally reachable". This could possibly result in applications applying
incorrect security policies.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
python3.12 3.12.3-1ubuntu0.1
python3.12-minimal 3.12.3-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6941-1
CVE-2024-4032

Package Information:
https://launchpad.net/ubuntu/+source/python3.12/3.12.3-1ubuntu0.1

No comments:

Post a Comment