=========================================================================Ubuntu Security Notice USN-4962-1
May 19, 2021

python-babel vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Babel code be made to execute arbitrary code if it received a specially
crafted input.

Software Description:
- python-babel: tools for internationalizing Python applications

Details:

It was discovered that Babel incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
  python-babel-localedata         2.8.0+dfsg.1-6ubuntu0.1
  python3-babel                   2.8.0+dfsg.1-6ubuntu0.1

Ubuntu 20.10:
  python-babel-localedata         2.8.0+dfsg.1-4ubuntu0.1
  python3-babel                   2.8.0+dfsg.1-4ubuntu0.1

Ubuntu 20.04 LTS:
  python-babel                    2.6.0+dfsg.1-1ubuntu2.2
  python-babel-localedata         2.6.0+dfsg.1-1ubuntu2.2
  python3-babel                   2.6.0+dfsg.1-1ubuntu2.2

Ubuntu 18.04 LTS:
  python-babel                    2.4.0+dfsg.1-2ubuntu1.1
  python-babel-localedata         2.4.0+dfsg.1-2ubuntu1.1
  python3-babel                   2.4.0+dfsg.1-2ubuntu1.1

Ubuntu 16.04 ESM:
  python-babel                    1.3+dfsg.1-6ubuntu0.1~esm1
  python-babel-localedata         1.3+dfsg.1-6ubuntu0.1~esm1
  python3-babel                   1.3+dfsg.1-6ubuntu0.1~esm1

Ubuntu 14.04 ESM:
  python-babel                    1.3+dfsg.1-2ubuntu2+esm1
  python-babel-localedata         1.3+dfsg.1-2ubuntu2+esm1
  python3-babel                   1.3+dfsg.1-2ubuntu2+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-4962-1
  CVE-2021-20095

Package Information:
  https://launchpad.net/ubuntu/+source/python-babel/2.8.0+dfsg.1-6ubuntu0.1
  https://launchpad.net/ubuntu/+source/python-babel/2.8.0+dfsg.1-4ubuntu0.1
  https://launchpad.net/ubuntu/+source/python-babel/2.6.0+dfsg.1-1ubuntu2.2
  https://launchpad.net/ubuntu/+source/python-babel/2.4.0+dfsg.1-2ubuntu1.1

Ubuntu 4962-1: Babel vulnerability

May 19, 2021
Babel code be made to execute arbitrary code if it received a specially crafted input.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: python-babel-localedata 2.8.0+dfsg.1-6ubuntu0.1 python3-babel 2.8.0+dfsg.1-6ubuntu0.1 Ubuntu 20.10: python-babel-localedata 2.8.0+dfsg.1-4ubuntu0.1 python3-babel 2.8.0+dfsg.1-4ubuntu0.1 Ubuntu 20.04 LTS: python-babel 2.6.0+dfsg.1-1ubuntu2.2 python-babel-localedata 2.6.0+dfsg.1-1ubuntu2.2 python3-babel 2.6.0+dfsg.1-1ubuntu2.2 Ubuntu 18.04 LTS: python-babel 2.4.0+dfsg.1-2ubuntu1.1 python-babel-localedata 2.4.0+dfsg.1-2ubuntu1.1 python3-babel 2.4.0+dfsg.1-2ubuntu1.1 Ubuntu 16.04 ESM: python-babel 1.3+dfsg.1-6ubuntu0.1~esm1 python-babel-localedata 1.3+dfsg.1-6ubuntu0.1~esm1 python3-babel 1.3+dfsg.1-6ubuntu0.1~esm1 Ubuntu 14.04 ESM: python-babel 1.3+dfsg.1-2ubuntu2+esm1 python-babel-localedata 1.3+dfsg.1-2ubuntu2+esm1 python3-babel 1.3+dfsg.1-2ubuntu2+esm1 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-4962-1

CVE-2021-20095

Severity
May 19, 2021

Package Information

https://launchpad.net/ubuntu/+source/python-babel/2.8.0+dfsg.1-6ubuntu0.1 https://launchpad.net/ubuntu/+source/python-babel/2.8.0+dfsg.1-4ubuntu0.1 https://launchpad.net/ubuntu/+source/python-babel/2.6.0+dfsg.1-1ubuntu2.2 https://launchpad.net/ubuntu/+source/python-babel/2.4.0+dfsg.1-2ubuntu1.1

Related News