USN-4151-1: Python vulnerabilities
9 October 2019
Several security issues were fixed in Python.
Releases
Packages
- python2.7 - An interactive high-level object-oriented language
- python3.5 - An interactive high-level object-oriented language
- python3.6 - An interactive high-level object-oriented language
- python3.7 - An interactive high-level object-oriented language
Details
It was discovered that Python incorrectly parsed certain email addresses. A
remote attacker could possibly use this issue to trick Python applications
into accepting email addresses that should be denied. (CVE-2019-16056)
It was discovered that the Python documentation XML-RPC server incorrectly
handled certain fields. A remote attacker could use this issue to execute a
cross-site scripting (XSS) attack. (CVE-2019-16935)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
-
python2.7
-
2.7.16-2ubuntu0.2
-
python2.7-minimal
-
2.7.16-2ubuntu0.2
-
python3.7
-
3.7.3-2ubuntu0.2
-
python3.7-minimal
-
3.7.3-2ubuntu0.2
Ubuntu 18.04
-
python2.7
-
2.7.15-4ubuntu4~18.04.2
-
python2.7-minimal
-
2.7.15-4ubuntu4~18.04.2
-
python3.6
-
3.6.8-1~18.04.3
-
python3.6-minimal
-
3.6.8-1~18.04.3
Ubuntu 16.04
-
python2.7
-
2.7.12-1ubuntu0~16.04.9
-
python2.7-minimal
-
2.7.12-1ubuntu0~16.04.9
-
python3.5
-
3.5.2-2ubuntu0~16.04.9
-
python3.5-minimal
-
3.5.2-2ubuntu0~16.04.9
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4151-2: libpython3.4-stdlib, python2.7-minimal, libpython3.4-testsuite, python2.7-dev, idle-python3.4, libpython3.4, libpython2.7-testsuite, python3.4-doc, libpython3.4-minimal, python2.7, libpython2.7-dev, python3.4-dev, libpython2.7-minimal, python3.4-examples, python2.7-examples, python3.4-minimal, python3.4-venv, libpython3.4-dev, idle-python2.7, libpython2.7-stdlib, python3.4, python2.7-doc, libpython2.7