-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.3034
                         python2.7 security update
                                25 May 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python2.7
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-45061 CVE-2021-4189 CVE-2021-3737
                   CVE-2021-3733 CVE-2021-3177 CVE-2020-26116
                   CVE-2020-8492 CVE-2019-20907 CVE-2015-20107

Original Bulletin: 
   http://www.debian.org/lts/security/2023/dla-3432

Comment: CVSS (Max):  9.8 CVE-2021-3177 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-3432-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
May 24, 2023                                  https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : python2.7
Version        : 2.7.16-2+deb10u2
CVE ID         : CVE-2015-20107 CVE-2019-20907 CVE-2020-8492 CVE-2020-26116 
                 CVE-2021-3177 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 
                 CVE-2022-45061
Debian Bug     : 970099

Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. An attacker may cause command
injection, denial of service (DoS), request smuggling and port
scanning.

CVE-2015-20107

    The mailcap module does not add escape characters into commands
    discovered in the system mailcap file. This may allow attackers to
    inject shell commands into applications that call
    mailcap.findmatch with untrusted input (if they lack validation of
    user-provided filenames or arguments).

CVE-2019-20907

    In Lib/tarfile.py, an attacker is able to craft a TAR archive
    leading to an infinite loop when opened by tarfile.open, because
    _proc_pax lacks header validation.

CVE-2020-8492

    Python allows an HTTP server to conduct Regular Expression Denial
    of Service (ReDoS) attacks against a client because of
    urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVE-2020-26116

    http.client allows CRLF injection if the attacker controls the
    HTTP request method, as demonstrated by inserting CR and LF
    control characters in the first argument of
    HTTPConnection.request.

CVE-2021-3177

    Python has a buffer overflow in PyCArg_repr in _ctypes/callproc.c,
    which may lead to remote code execution in certain Python
    applications that accept floating-point numbers as untrusted
    input, as demonstrated by a 1e300 argument to
    c_double.from_param. This occurs because sprintf is used unsafely.

CVE-2021-3733

    There's a flaw in urllib's AbstractBasicAuthHandler class. An
    attacker who controls a malicious HTTP server that an HTTP client
    (such as web browser) connects to, could trigger a Regular
    Expression Denial of Service (ReDOS) during an authentication
    request with a specially crafted payload that is sent by the
    server to the client.

CVE-2021-3737

    An improperly handled HTTP response in the HTTP client code of
    python may allow a remote attacker, who controls the HTTP server,
    to make the client script enter an infinite loop, consuming CPU
    time.

CVE-2021-4189

    The FTP (File Transfer Protocol) client library in PASV (passive)
    mode trusts the host from the PASV response by default. This flaw
    allows an attacker to set up a malicious FTP server that can trick
    FTP clients into connecting back to a given IP address and
    port. This vulnerability could lead to FTP client scanning
    ports. For the rare user who wants the previous behavior, set a
    `trust_server_pasv_ipv4_address` attribute on your `ftplib.FTP`
    instance to True.

CVE-2022-45061

    An unnecessary quadratic algorithm exists in one path when
    processing some inputs to the IDNA (RFC 3490) decoder, such that a
    crafted, unreasonably long name being presented to the decoder
    could lead to a CPU denial of service.

For Debian 10 buster, these problems have been fixed in version
2.7.16-2+deb10u2.

We recommend that you upgrade your python2.7 packages.

For the detailed security status of python2.7 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python2.7

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmRuSaMACgkQDTl9HeUl
XjC5DBAAu3EocF61WC0lC2kAslYhYXuPe/lyNn6Pb+m2wBqlhYpH+/QBRuMo8PJG
omsbvzKZb4Gu6aG8PB1Oluu32sFKmNnYSM2yNu9K7VsxO7dGIqxYSaJgB2XZbOFd
FGjhxDhLVvJf6UyNmW3is6xnCas7F0q/EWxJ7lEYkboU4fnfwiCO0+0UT4reyDfr
RQ298Y+Zqire1UBOhoZQI/4xMs/3YHDl1pVYaqqsopPRGcgB2OGitDHasf9lVnsq
8AJKhVjmLPsHbuJFs3i2trxW4L+6lqtl+EO8SxqhWKmVpEbxXdPLIUMWoLECdEVL
DKS8sDjxnLT2SGycOPNlO9DYI0gO81DgjZhXhiGuUlMdlOyNwndDp31ianH0ZxxM
77fMWuKp/7xIBvEx39v+2Mcp2czETmbuCH5SvV+J86Mfq7wo+k4+g0rEBBCYnjbp
UQKYHAXSoDsZMjfsQgFLAyzH7Q381PY2ZkpapfJWwugzbnvgvxLsD2cQL4DawUKO
BhUE6qzt6qqB9rIa6uAU6Xqz9BkxWVsp6BkuHZPnNkJ2E3jUmYs6toDeHNzljQVy
gWnk/WzzwjfwdqaXpaRr/afzIX/3s0U21Cyn1YxtK/B1B5glIA4Ziw/GrMDi4tHe
JfId2g5Ava9vYyEhrCXP/b3yx0qCv1joSF9nrN14igBdpJUadNA=
=orjL
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZG7DbMkNZI30y1K9AQi6vA/+P/SU4Xx3agNTcXHF3+nDbBx7qSvRhAUP
PYDo1GuzDilTqCzd6Q7w/wQEjkZCUcvJg1Qg7PYWsapsb6ewFJS4AgHlE39EpNIO
3ZJyhfsZCfVz+wh1qhrC9v9Ti8OBF7WNRx0uUULnIatnJv0VKtcX9kU4VwrT+LM3
ckhN6ck6nnUyalNtFDvvGnwpfjj5gu1TwcRC/4nWcut3/SrLkrL3tghxyVy7jMTB
n3sYPUgBo9eN4jvaA4S6IVBr4fw/UUlNlQ6ytPLWT4HhhfUbYQthWIYE+8yuGKr3
z0iCICX2XyLfyXfbof3tyLnD2ugDeStzNH/NNc/t2S3l+OR7bYdisF7HnQPVB3Pu
JlqlcPQVujHvcdqy3Yc9lddNR7Q+IwGaaZsB/7qCl9KpPFb7NQwIr1ja65tZlOL7
ya/wfcqcnuS3Y+jtLGe62iHUD+UnTVs2hyiwp6Cr3wiC8jdtuO+NmRGxbd9fn42h
pe01mcjWEtO/XhnO7UJX+qck5poqjSuoifwhx3OHxkRjHlnjaMkTBFqATd/55cSs
DIzgWXjY86K5AgOKVhO8YedPpp3vdkSg9JMcuke6d2ZXgNFTea0ZVLF62njL2ijw
iCdf1qK+RPRsvcfWtr0EUczk4vGo6yIgY6sIIPUdkDo+zgvrojoTaOoYLyDSysoi
kCpJ7kwHuUs=
=sQXv
-----END PGP SIGNATURE-----