UBUNTU-CVE-2023-37920

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2023-37920
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-37920.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-37920
Related
Published
2023-07-25T21:15:00Z
Modified
2023-07-25T21:15:00Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.

References

Affected packages

Ubuntu:Pro:14.04:LTS / python-pip

Package

Name
python-pip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.4.1-2
1.5.4-1
1.5.4-1ubuntu1
1.5.4-1ubuntu3
1.5.4-1ubuntu4
1.5.4-1ubuntu4+esm1
1.5.4-1ubuntu4+esm2
1.5.4-1ubuntu4+esm3
1.5.4-1ubuntu4+esm4

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:Pro:16.04:LTS / python-certifi

Package

Name
python-certifi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2015.*

2015.9.6.2-3
2015.11.20-1
2015.11.20.1-2

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:Pro:16.04:LTS / python-pip

Package

Name
python-pip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5.6-7ubuntu1
1.5.6-7ubuntu2

8.*

8.0.2-7
8.0.3-1
8.0.3-2
8.1.0-1
8.1.0-2
8.1.1-1
8.1.1-2
8.1.1-2ubuntu0.1
8.1.1-2ubuntu0.2
8.1.1-2ubuntu0.4
8.1.1-2ubuntu0.6
8.1.1-2ubuntu0.6+esm2
8.1.1-2ubuntu0.6+esm3
8.1.1-2ubuntu0.6+esm4
8.1.1-2ubuntu0.6+esm5
8.1.1-2ubuntu0.6+esm6

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:Pro:18.04:LTS / python-certifi

Package

Name
python-certifi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2017.*

2017.4.17-2
2017.7.27.1-2
2017.11.5-1

2018.*

2018.1.18-1
2018.1.18-2

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:Pro:18.04:LTS / python-pip

Package

Name
python-pip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.1-2
9.0.1-2.3~ubuntu1
9.0.1-2.3~ubuntu1.18.04.1
9.0.1-2.3~ubuntu1.18.04.2
9.0.1-2.3~ubuntu1.18.04.3
9.0.1-2.3~ubuntu1.18.04.4
9.0.1-2.3~ubuntu1.18.04.5
9.0.1-2.3~ubuntu1.18.04.5+esm2
9.0.1-2.3~ubuntu1.18.04.5+esm3
9.0.1-2.3~ubuntu1.18.04.6
9.0.1-2.3~ubuntu1.18.04.6+esm1
9.0.1-2.3~ubuntu1.18.04.7
9.0.1-2.3~ubuntu1.18.04.7+esm1
9.0.1-2.3~ubuntu1.18.04.8
9.0.1-2.3~ubuntu1.18.04.8+esm1
9.0.1-2.3~ubuntu1.18.04.8+esm2

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:20.04:LTS / python-certifi

Package

Name
python-certifi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2018.*

2018.8.24-1

2019.*

2019.11.28-1

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:20.04:LTS / python-pip

Package

Name
python-pip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.1-5
18.1-5build1
18.1-5ubuntu1

20.*

20.0.2-2
20.0.2-4
20.0.2-5
20.0.2-5ubuntu1
20.0.2-5ubuntu1.1
20.0.2-5ubuntu1.3
20.0.2-5ubuntu1.4
20.0.2-5ubuntu1.5
20.0.2-5ubuntu1.6
20.0.2-5ubuntu1.7
20.0.2-5ubuntu1.8
20.0.2-5ubuntu1.9
20.0.2-5ubuntu1.10

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:22.04:LTS / python-certifi

Package

Name
python-certifi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2020.*

2020.6.20-1

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}

Ubuntu:22.04:LTS / python-pip

Package

Name
python-pip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*

20.3.4-4

21.*

21.3.1+dfsg-3

22.*

22.0.2+dfsg-1
22.0.2+dfsg-1ubuntu0.1
22.0.2+dfsg-1ubuntu0.2
22.0.2+dfsg-1ubuntu0.3
22.0.2+dfsg-1ubuntu0.4

Ecosystem specific

{
    "ubuntu_priority": "negligible",
    "priority_reason": "python-certifi in Debian and Ubuntu is patched to use the system CA certificates"
}