USN-2125-1: Python vulnerability

Ubuntu Security Notice USN-2125-1

3rd March, 2014

python2.6, python2.7, python3.2, python3.3 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Python could be made to crash or run programs if it received specially crafted network traffic.

Software description

  • python2.6 - An interactive high-level object-oriented language
  • python2.7 - An interactive high-level object-oriented language
  • python3.2 - An interactive high-level object-oriented language
  • python3.3 - An interactive high-level object-oriented language

Details

Ryan Smith-Roberts discovered that Python incorrectly handled buffer sizes
when using the socket.recvfrom_into() function. An attacker could possibly
use this issue to cause Python to crash, resulting in denial of service, or
possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 13.10:
python2.7-minimal 2.7.5-8ubuntu3.1
python3.3-minimal 3.3.2-7ubuntu3.1
python2.7 2.7.5-8ubuntu3.1
python3.3 3.3.2-7ubuntu3.1
Ubuntu 12.10:
python3.3-minimal 3.3.0-1ubuntu0.2
python2.7 2.7.3-5ubuntu4.4
python2.7-minimal 2.7.3-5ubuntu4.4
python3.2 3.2.3-6ubuntu3.5
python3.3 3.3.0-1ubuntu0.2
python3.2-minimal 3.2.3-6ubuntu3.5
Ubuntu 12.04 LTS:
python3.2 3.2.3-0ubuntu3.6
python2.7-minimal 2.7.3-0ubuntu3.5
python2.7 2.7.3-0ubuntu3.5
python3.2-minimal 3.2.3-0ubuntu3.6
Ubuntu 10.04 LTS:
python2.6-minimal 2.6.5-1ubuntu6.3
python2.6 2.6.5-1ubuntu6.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-1912