[USN-3817-1] Python vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”iPCOok3zPnBmrLjCtHJvkQVDB8uAaV0bp”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–iPCOok3zPnBmrLjCtHJvkQVDB8uAaV0bp

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3817-1] Python vulnerabilities

–0LnJKnkVICPZmzVAi57xViM4g5c34ZPrp

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3817-1
November 13, 2018

python2.7, python3.4, python3.5 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Python.

Software Description:
– python2.7: An interactive high-level object-oriented language
– python3.5: An interactive high-level object-oriented language
– python3.4: An interactive high-level object-oriented language

Details:

It was discovered that Python incorrectly handled large amounts of data. =
A
remote attacker could use this issue to cause Python to crash, resulting =
in
a denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1000030)

It was discovered that Python incorrectly handled running external comman=
ds
in the shutil module. A remote attacker could use this issue to cause
Python to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2018-1000802)

It was discovered that Python incorrectly used regular expressions
vulnerable to catastrophic backtracking. A remote attacker could possibly=

use this issue to cause a denial of service. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1060, CVE-2018-1061)

It was discovered that Python failed to initialize Expat’s hash salt. A
remote attacker could possibly use this issue to cause hash collisions,
leading to a denial of service. (CVE-2018-14647)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
python2.7 2.7.15~rc1-1ubuntu0.1
python2.7-minimal 2.7.15~rc1-1ubuntu0.1

Ubuntu 16.04 LTS:
python2.7 2.7.12-1ubuntu0~16.04.4
python2.7-minimal 2.7.12-1ubuntu0~16.04.4
python3.5 3.5.2-2ubuntu0~16.04.5
python3.5-minimal 3.5.2-2ubuntu0~16.04.5

Ubuntu 14.04 LTS:
python2.7 2.7.6-8ubuntu0.5
python2.7-minimal 2.7.6-8ubuntu0.5
python3.4 3.4.3-1ubuntu1~14.04.7
python3.4-minimal 3.4.3-1ubuntu1~14.04.7

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3817-1
CVE-2018-1000030, CVE-2018-1000802, CVE-2018-1060, CVE-2018-1061,
CVE-2018-14647

Package Information:
https://launchpad.net/ubuntu/+source/python2.7/2.7.15~rc1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python2.7/2.7.12-1ubuntu0~16.04.4
https://launchpad.net/ubuntu/+source/python3.5/3.5.2-2ubuntu0~16.04.5
https://launchpad.net/ubuntu/+source/python2.7/2.7.6-8ubuntu0.5
https://launchpad.net/ubuntu/+source/python3.4/3.4.3-1ubuntu1~14.04.7

–0LnJKnkVICPZmzVAi57xViM4g5c34ZPrp–

–iPCOok3zPnBmrLjCtHJvkQVDB8uAaV0bp

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=Hhys
—–END PGP SIGNATURE—–

–iPCOok3zPnBmrLjCtHJvkQVDB8uAaV0bp–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK