Operating System:

[Debian]

Published:

19 November 2020

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.4112
                         python3.5 security update
                             19 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python3.5
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service              -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
                   Access Confidential Data       -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-26116 CVE-2019-20907 

Reference:         ESB-2020.4006
                   ESB-2020.3995
                   ESB-2020.3785
                   ESB-2020.3614
                   ESB-2020.2871

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2456-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                  Roberto C. S=E1nchez
November 18, 2020                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : python3.5
Version        : 3.5.3-1+deb9u3
CVE ID         : CVE-2019-20907 CVE-2020-26116
Debian Bug     :=20

Multiple security issues were discovered in Python.

CVE-2019-20907

    In Lib/tarfile.py, an attacker is able to craft a TAR
    archive leading to an infinite loop when opened by tarfile.open,
    because _proc_pax lacks header validation

CVE-2020-26116

    http.client allows CRLF injection if the attacker controls
    the HTTP request method

For Debian 9 stretch, these problems have been fixed in version
3.5.3-1+deb9u3.

We recommend that you upgrade your python3.5 packages.

For the detailed security status of python3.5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.5

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=x90g
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=R0F2
-----END PGP SIGNATURE-----