First published: Mon Nov 27 2023(Updated: )
USN-6513-1 fixed vulnerabilities in Python. This update provides the corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. Original advisory details: It was discovered that Python incorrectly handled certain plist files. If a user or an automated system were tricked into processing a specially crafted plist file, an attacker could possibly use this issue to consume resources, resulting in a denial of service. (CVE-2022-48564) It was discovered that Python instances of ssl.SSLSocket were vulnerable to a bypass of the TLS handshake. An attacker could possibly use this issue to cause applications to treat unauthenticated received data before TLS handshake as authenticated data after TLS handshake. (CVE-2023-40217)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3.11 | <3.11.4-1~23.04.1 | 3.11.4-1~23.04.1 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/python3.10 | <3.10.12-1~22.04.3 | 3.10.12-1~22.04.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/python3.8 | <3.8.10-0ubuntu1~20.04.9 | 3.8.10-0ubuntu1~20.04.9 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6513-2 is a security advisory for a Python vulnerability in Ubuntu.
The severity of USN-6513-2 is not specified in the given information.
Ubuntu 23.04, Ubuntu 22.04 LTS, and Ubuntu 20.04 LTS are affected by USN-6513-2.
To fix USN-6513-2, update Python to the specified versions: Python 3.11.4-1~23.04.1 for Ubuntu 23.04, Python 3.10.12-1~22.04.3 for Ubuntu 22.04 LTS, and Python 3.8.10-0ubuntu1~20.04.9 for Ubuntu 20.04 LTS.
You can find more information about USN-6513-2 at the following references: [CVE-2023-40217](https://ubuntu.com/security/CVE-2023-40217), [USN-6513-1](https://ubuntu.com/security/notices/USN-6513-1), [Python 3.11.4-1~23.04.1](https://launchpad.net/ubuntu/+source/python3.11/3.11.4-1~23.04.1).