USN-4962-1: Babel vulnerability
19 May 2021
Babel code be made to execute arbitrary code if it received a specially crafted input.
Releases
Packages
- python-babel - tools for internationalizing Python applications
Details
It was discovered that Babel incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04
Ubuntu 20.10
Ubuntu 20.04
-
python-babel
-
2.6.0+dfsg.1-1ubuntu2.2
-
python-babel-localedata
-
2.6.0+dfsg.1-1ubuntu2.2
-
python3-babel
-
2.6.0+dfsg.1-1ubuntu2.2
Ubuntu 18.04
-
python-babel
-
2.4.0+dfsg.1-2ubuntu1.1
-
python-babel-localedata
-
2.4.0+dfsg.1-2ubuntu1.1
-
python3-babel
-
2.4.0+dfsg.1-2ubuntu1.1
Ubuntu 16.04
-
python-babel
-
1.3+dfsg.1-6ubuntu0.1~esm1
Available with Ubuntu Pro
-
python-babel-localedata
-
1.3+dfsg.1-6ubuntu0.1~esm1
Available with Ubuntu Pro
-
python3-babel
-
1.3+dfsg.1-6ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
python-babel
-
1.3+dfsg.1-2ubuntu2+esm1
Available with Ubuntu Pro
-
python-babel-localedata
-
1.3+dfsg.1-2ubuntu2+esm1
Available with Ubuntu Pro
-
python3-babel
-
1.3+dfsg.1-2ubuntu2+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.