First published: Mon Mar 24 2025(Updated: )
It was discovered that NLTK contained a regex that is susceptible to catastrophic backtracking. An attacker could possibly use this issue to cause a denial of service. (CVE-2021-3842, CVE-2021-43854)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-nltk | <3.4.5-2ubuntu0.1~esm2 | 3.4.5-2ubuntu0.1~esm2 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/python-nltk | <3.2.5-1ubuntu0.1+esm2 | 3.2.5-1ubuntu0.1+esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-nltk | <3.2.5-1ubuntu0.1+esm2 | 3.2.5-1ubuntu0.1+esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/python-nltk | <3.1-1ubuntu0.1+esm2 | 3.1-1ubuntu0.1+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/python3-nltk | <3.1-1ubuntu0.1+esm2 | 3.1-1ubuntu0.1+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/python-nltk | <2.0~b9-0ubuntu4.1~esm4 | 2.0~b9-0ubuntu4.1~esm4 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7365-1 is categorized as capable of causing a denial of service due to catastrophic backtracking in a regex.
To fix USN-7365-1, upgrade the affected NLTK package to the recommended version specified in the advisory.
USN-7365-1 affects multiple versions of the NLTK package across various Ubuntu distributions.
Yes, USN-7365-1 can potentially be exploited remotely by an attacker to trigger a denial of service.
According to USN-7365-1, vulnerable NLTK versions include 3.4.5, 3.2.5, 3.1, and 2.0~b9 based on the specific Ubuntu release.