USN-4127-2

Source
https://ubuntu.com/security/notices/USN-4127-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4127-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-4127-2
Upstream
Related
Published
2019-09-10T13:08:17.663523Z
Modified
2025-10-13T04:34:56Z
Summary
python2.7, python3.4 vulnerabilities
Details

USN-4127-1 fixed several vulnerabilities in Python. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Python incorrectly handled certain pickle files. An attacker could possibly use this issue to consume memory, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2018-20406)

It was discovered that Python incorrectly validated the domain when handling cookies. An attacker could possibly trick Python into sending cookies to the wrong domain. (CVE-2018-20852)

Jonathan Birch and Panayiotis Panayiotou discovered that Python incorrectly handled Unicode encoding during NFKC normalization. An attacker could possibly use this issue to obtain sensitive information. (CVE-2019-9636, CVE-2019-10160)

Colin Read and Nicolas Edet discovered that Python incorrectly handled parsing certain X509 certificates. An attacker could possibly use this issue to cause Python to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2019-5010)

It was discovered that Python incorrectly handled certain urls. A remote attacker could possibly use this issue to perform CRLF injection attacks. (CVE-2019-9740, CVE-2019-9947)

Sihoon Lee discovered that Python incorrectly handled the local_file: scheme. A remote attacker could possibly use this issue to bypass blocklist meschanisms. (CVE-2019-9948)

References

Affected packages

Ubuntu:Pro:14.04:LTS / python2.7

Package

Name
python2.7
Purl
pkg:deb/ubuntu/python2.7@2.7.6-8ubuntu0.6+esm2?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.6-8ubuntu0.6+esm2

Affected versions

2.*

2.7.5-8ubuntu3
2.7.5-8ubuntu4
2.7.6-2
2.7.6-2ubuntu1
2.7.6-3
2.7.6-3ubuntu1
2.7.6-4
2.7.6-4ubuntu1
2.7.6-5
2.7.6-7
2.7.6-8
2.7.6-8ubuntu0.2
2.7.6-8ubuntu0.3
2.7.6-8ubuntu0.4
2.7.6-8ubuntu0.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "idle-python2.7",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "libpython2.7",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "libpython2.7-dev",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "libpython2.7-minimal",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "libpython2.7-stdlib",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "libpython2.7-testsuite",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "python2.7",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "python2.7-dev",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "python2.7-examples",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        },
        {
            "binary_name": "python2.7-minimal",
            "binary_version": "2.7.6-8ubuntu0.6+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2018-20406"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2018-20852"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-5010"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9636"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9740"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9947"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9948"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-10160"
        }
    ]
}

Ubuntu:Pro:14.04:LTS / python3.4

Package

Name
python3.4
Purl
pkg:deb/ubuntu/python3.4@3.4.3-1ubuntu1~14.04.7+esm2?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.3-1ubuntu1~14.04.7+esm2

Affected versions

3.*

3.4~b1-0ubuntu3
3.4~b1-4ubuntu4
3.4~b1-4ubuntu6
3.4~b1-5ubuntu2
3.4~b2-1
3.4~b3-1ubuntu1
3.4~rc1-1build1
3.4~rc2-1
3.4~rc3-0ubuntu1
3.4.0-1
3.4.0-2ubuntu1
3.4.0-2ubuntu1.1
3.4.3-1ubuntu1~14.04.1
3.4.3-1ubuntu1~14.04.3
3.4.3-1ubuntu1~14.04.4
3.4.3-1ubuntu1~14.04.5
3.4.3-1ubuntu1~14.04.6
3.4.3-1ubuntu1~14.04.7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "idle-python3.4",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "libpython3.4",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "libpython3.4-dev",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "libpython3.4-minimal",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "libpython3.4-stdlib",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "libpython3.4-testsuite",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "python3.4",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "python3.4-dev",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "python3.4-examples",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "python3.4-minimal",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        },
        {
            "binary_name": "python3.4-venv",
            "binary_version": "3.4.3-1ubuntu1~14.04.7+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2018-20406"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2018-20852"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-5010"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9636"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9740"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9947"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-9948"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-10160"
        }
    ]
}