[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3432-1] python2.7 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3432-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
May 24, 2023                                  https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python2.7
Version        : 2.7.16-2+deb10u2
CVE ID         : CVE-2015-20107 CVE-2019-20907 CVE-2020-8492 CVE-2020-26116 
                 CVE-2021-3177 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 
                 CVE-2022-45061
Debian Bug     : 970099

Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. An attacker may cause command
injection, denial of service (DoS), request smuggling and port
scanning.

CVE-2015-20107

    The mailcap module does not add escape characters into commands
    discovered in the system mailcap file. This may allow attackers to
    inject shell commands into applications that call
    mailcap.findmatch with untrusted input (if they lack validation of
    user-provided filenames or arguments).

CVE-2019-20907

    In Lib/tarfile.py, an attacker is able to craft a TAR archive
    leading to an infinite loop when opened by tarfile.open, because
    _proc_pax lacks header validation.

CVE-2020-8492

    Python allows an HTTP server to conduct Regular Expression Denial
    of Service (ReDoS) attacks against a client because of
    urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVE-2020-26116

    http.client allows CRLF injection if the attacker controls the
    HTTP request method, as demonstrated by inserting CR and LF
    control characters in the first argument of
    HTTPConnection.request.

CVE-2021-3177

    Python has a buffer overflow in PyCArg_repr in _ctypes/callproc.c,
    which may lead to remote code execution in certain Python
    applications that accept floating-point numbers as untrusted
    input, as demonstrated by a 1e300 argument to
    c_double.from_param. This occurs because sprintf is used unsafely.

CVE-2021-3733

    There's a flaw in urllib's AbstractBasicAuthHandler class. An
    attacker who controls a malicious HTTP server that an HTTP client
    (such as web browser) connects to, could trigger a Regular
    Expression Denial of Service (ReDOS) during an authentication
    request with a specially crafted payload that is sent by the
    server to the client.

CVE-2021-3737

    An improperly handled HTTP response in the HTTP client code of
    python may allow a remote attacker, who controls the HTTP server,
    to make the client script enter an infinite loop, consuming CPU
    time.

CVE-2021-4189

    The FTP (File Transfer Protocol) client library in PASV (passive)
    mode trusts the host from the PASV response by default. This flaw
    allows an attacker to set up a malicious FTP server that can trick
    FTP clients into connecting back to a given IP address and
    port. This vulnerability could lead to FTP client scanning
    ports. For the rare user who wants the previous behavior, set a
    `trust_server_pasv_ipv4_address` attribute on your `ftplib.FTP`
    instance to True.

CVE-2022-45061

    An unnecessary quadratic algorithm exists in one path when
    processing some inputs to the IDNA (RFC 3490) decoder, such that a
    crafted, unreasonably long name being presented to the decoder
    could lead to a CPU denial of service.

For Debian 10 buster, these problems have been fixed in version
2.7.16-2+deb10u2.

We recommend that you upgrade your python2.7 packages.

For the detailed security status of python2.7 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python2.7

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmRuSaMACgkQDTl9HeUl
XjC5DBAAu3EocF61WC0lC2kAslYhYXuPe/lyNn6Pb+m2wBqlhYpH+/QBRuMo8PJG
omsbvzKZb4Gu6aG8PB1Oluu32sFKmNnYSM2yNu9K7VsxO7dGIqxYSaJgB2XZbOFd
FGjhxDhLVvJf6UyNmW3is6xnCas7F0q/EWxJ7lEYkboU4fnfwiCO0+0UT4reyDfr
RQ298Y+Zqire1UBOhoZQI/4xMs/3YHDl1pVYaqqsopPRGcgB2OGitDHasf9lVnsq
8AJKhVjmLPsHbuJFs3i2trxW4L+6lqtl+EO8SxqhWKmVpEbxXdPLIUMWoLECdEVL
DKS8sDjxnLT2SGycOPNlO9DYI0gO81DgjZhXhiGuUlMdlOyNwndDp31ianH0ZxxM
77fMWuKp/7xIBvEx39v+2Mcp2czETmbuCH5SvV+J86Mfq7wo+k4+g0rEBBCYnjbp
UQKYHAXSoDsZMjfsQgFLAyzH7Q381PY2ZkpapfJWwugzbnvgvxLsD2cQL4DawUKO
BhUE6qzt6qqB9rIa6uAU6Xqz9BkxWVsp6BkuHZPnNkJ2E3jUmYs6toDeHNzljQVy
gWnk/WzzwjfwdqaXpaRr/afzIX/3s0U21Cyn1YxtK/B1B5glIA4Ziw/GrMDi4tHe
JfId2g5Ava9vYyEhrCXP/b3yx0qCv1joSF9nrN14igBdpJUadNA=
=orjL
-----END PGP SIGNATURE-----


Reply to: