StackPatch is liveSee product

Back to CVE digest
Ubuntu USN · USN-8214-1

NLTK vulnerability

Published: Tue, 28 Apr 2026 08:10

CVE-2025-14009

Summary

NLTK could be made to crash or run programs as your login if it opened a specially crafted zip file.

Details

It was discovered that NLTK incorrectly handled file extraction when opening a maliciously crafted zip file. An attacker could possibly use this issue to create or overwrite files on the system and execute arbitrary code.

Recommended actions per Ubuntu release

StackPatch playbook auto-generated per release codename and per affected package.

Ubuntu bionic

  • nltk3.2.5-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.2.5-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

  • python-nltk3.2.5-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.2.5-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y python-nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

  • python3-nltk3.2.5-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.2.5-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

Ubuntu focal

  • nltk3.4.5-2ubuntu0.1~esm3apt_upgrade_esm

    Fixed at 3.4.5-2ubuntu0.1~esm3 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk=3.4.5-2ubuntu0.1~esm3

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • python3-nltk3.4.5-2ubuntu0.1~esm3apt_upgrade_esm

    Fixed at 3.4.5-2ubuntu0.1~esm3 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk=3.4.5-2ubuntu0.1~esm3

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu jammy

  • nltk3.7-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.7-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk=3.7-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • python3-nltk3.7-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.7-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk=3.7-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu noble

  • nltk3.8.1-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.8.1-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk=3.8.1-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • python3-nltk3.8.1-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.8.1-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk=3.8.1-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu resolute

  • nltk3.9.2-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.9.2-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk=3.9.2-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • python3-nltk3.9.2-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 3.9.2-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk=3.9.2-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu trusty

  • nltk2.0~b9-0ubuntu4.1~esm5apt_upgrade_esm

    Fixed at 2.0~b9-0ubuntu4.1~esm5 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk=2.0~b9-0ubuntu4.1~esm5

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • python-nltk2.0~b9-0ubuntu4.1~esm5apt_upgrade_esm

    Fixed at 2.0~b9-0ubuntu4.1~esm5 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y python-nltk=2.0~b9-0ubuntu4.1~esm5

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu xenial

  • nltk3.1-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.1-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

  • python-nltk3.1-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.1-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y python-nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

  • python3-nltk3.1-1ubuntu0.1+esm3apt_upgrade

    Standard apt upgrade. Install 3.1-1ubuntu0.1+esm3 from the apt repo.

    sudo apt-get update
    sudo apt-get install --only-upgrade -y python3-nltk

    Most apt upgrades restart their service automatically. needrestart lists anything else.

Are YOU affected by USN-8214-1?

5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether USN-8214-1 (and any other live CVE) applies. Anonymous, no signup.

curl https://mindsparkstack.com/scan.sh | bash
Want this automated for your servers?

StackPatch runs this match against YOUR installed packages every hour

Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.