USN-7015-1

Source
https://ubuntu.com/security/notices/USN-7015-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7015-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7015-1
Upstream
Related
Published
2024-09-16T12:15:27.236497Z
Modified
2025-10-13T04:38:39Z
Summary
python3.10, python3.12, python3.8 vulnerabilities
Details

It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. (CVE-2023-27043)

It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-6232)

It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. (CVE-2024-6923)

It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. (CVE-2024-7592)

It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service. (CVE-2024-8088)

References

Affected packages

Ubuntu:20.04:LTS / python3.8

Package

Name
python3.8
Purl
pkg:deb/ubuntu/python3.8@3.8.10-0ubuntu1~20.04.12?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.10-0ubuntu1~20.04.12

Affected versions

3.*

3.8.0-1
3.8.0-2
3.8.0-3
3.8.0-4
3.8.0-5
3.8.1-2ubuntu3
3.8.2~rc1-1ubuntu1
3.8.2-1
3.8.2-1ubuntu1
3.8.2-1ubuntu1.1
3.8.2-1ubuntu1.2
3.8.5-1~20.04
3.8.5-1~20.04.2
3.8.5-1~20.04.3
3.8.10-0ubuntu1~20.04
3.8.10-0ubuntu1~20.04.1
3.8.10-0ubuntu1~20.04.2
3.8.10-0ubuntu1~20.04.4
3.8.10-0ubuntu1~20.04.5
3.8.10-0ubuntu1~20.04.6
3.8.10-0ubuntu1~20.04.7
3.8.10-0ubuntu1~20.04.8
3.8.10-0ubuntu1~20.04.9
3.8.10-0ubuntu1~20.04.10
3.8.10-0ubuntu1~20.04.11

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "idle-python3.8"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "libpython3.8"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "libpython3.8-dev"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "libpython3.8-minimal"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "libpython3.8-stdlib"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "libpython3.8-testsuite"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8-dev"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8-examples"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8-full"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8-minimal"
        },
        {
            "binary_version": "3.8.10-0ubuntu1~20.04.12",
            "binary_name": "python3.8-venv"
        }
    ],
    "availability": "No subscription required"
}

Database specific

{
    "cves_map": {
        "cves": [
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2023-27043"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6232"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6923"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "low",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-7592"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/RE:L",
                        "type": "CVSS_V4"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-8088"
            }
        ],
        "ecosystem": "Ubuntu:20.04:LTS"
    }
}

Ubuntu:22.04:LTS / python3.10

Package

Name
python3.10
Purl
pkg:deb/ubuntu/python3.10@3.10.12-1~22.04.6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.10.12-1~22.04.6

Affected versions

3.*

3.10.0-2
3.10.0-3
3.10.0-4
3.10.0-5
3.10.0-5build1
3.10.1-1
3.10.1-2
3.10.2-1
3.10.2-5
3.10.2-7
3.10.3-1
3.10.4-3
3.10.4-3ubuntu0.1
3.10.6-1~22.04
3.10.6-1~22.04.1
3.10.6-1~22.04.2
3.10.6-1~22.04.2ubuntu1
3.10.6-1~22.04.2ubuntu1.1
3.10.12-1~22.04.2
3.10.12-1~22.04.3
3.10.12-1~22.04.4
3.10.12-1~22.04.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "idle-python3.10"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "libpython3.10"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "libpython3.10-dev"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "libpython3.10-minimal"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "libpython3.10-stdlib"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "libpython3.10-testsuite"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-dev"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-examples"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-full"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-minimal"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-nopie"
        },
        {
            "binary_version": "3.10.12-1~22.04.6",
            "binary_name": "python3.10-venv"
        }
    ],
    "availability": "No subscription required"
}

Database specific

{
    "cves_map": {
        "cves": [
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2023-27043"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6232"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6923"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "low",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-7592"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/RE:L",
                        "type": "CVSS_V4"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-8088"
            }
        ],
        "ecosystem": "Ubuntu:22.04:LTS"
    }
}

Ubuntu:24.04:LTS / python3.12

Package

Name
python3.12
Purl
pkg:deb/ubuntu/python3.12@3.12.3-1ubuntu0.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.3-1ubuntu0.2

Affected versions

3.*

3.12.0-1
3.12.0-5
3.12.0-6
3.12.0-7
3.12.1-2
3.12.2-1
3.12.2-4build3
3.12.2-4build4
3.12.2-5ubuntu3
3.12.3-1
3.12.3-1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "idle-python3.12"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "libpython3.12-dev"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "libpython3.12-minimal"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "libpython3.12-stdlib"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "libpython3.12-testsuite"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "libpython3.12t64"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-dev"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-examples"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-full"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-minimal"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-nopie"
        },
        {
            "binary_version": "3.12.3-1ubuntu0.2",
            "binary_name": "python3.12-venv"
        }
    ],
    "availability": "No subscription required"
}

Database specific

{
    "cves_map": {
        "cves": [
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2023-27043"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6232"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-6923"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "type": "CVSS_V3"
                    },
                    {
                        "score": "low",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-7592"
            },
            {
                "severity": [
                    {
                        "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/RE:L",
                        "type": "CVSS_V4"
                    },
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2024-8088"
            }
        ],
        "ecosystem": "Ubuntu:24.04:LTS"
    }
}