Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3520 python-babel security update 22 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-babel Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-42771 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running python-babel check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2790-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Sylvain Beucler October 21, 2021 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : python-babel Version : 2.3.4+dfsg.1-2+deb9u1 CVE ID : CVE-2021-42771 Debian Bug : 987824 Tenable discovered that in Babel, a set of tools for internationalizing Python applications, Babel.Locale allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. This vulnerability was also previously addressed under CVE-2021-20095 in other distributions and suites. For Debian 9 stretch, this problem has been fixed in version 2.3.4+dfsg.1-2+deb9u1. We recommend that you upgrade your python-babel packages. For the detailed security status of python-babel please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-babel Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmFxN74ACgkQDTl9HeUl XjBbHQ//V0e3pyFnYcIyqY5OPe9l/IGYlLihgc7l/J7QygHe8QdJJmP0FLlSRwiv OJMnSs7YrJYUx3H9EghYDzgMwhgaM5nh0qHpiiZA/c9lgKKoBpUo5aQkGqviUNA2 CKh4L8y3hMtJEBJgd4MhBDBaZIE8E0/NqoIGl0OAr+mHcqiKyA65pXnEEB/l8ULw TBrUabvibnMtzaZDbvrB6YEs5+YNnODLFgVT/CkvnHQapOTDRpa1KiaT2+G6QqmQ /W0onLZh6daBCmT/oEwlWOUQy0anx9RXpF6W0KX5ZwGPy2kTBZO7EVZFrk+lqwa1 V6QICMSAmqZuzGzA4lE7+UUUX6gY6mseJKnz5ced3FL+cHYqpZ2GXJHVYMlh/Mvs vXl73CD6MK088b4XEkrKl4M2LqBklfqZjAxZNQ4dOX803BgsslAgup57aPUHMm8i haqp/ja5qAbpajF3IYIOT2zu86nB8SGfbxCszKdDzN8DDRUMEJS83OpC9LTRdCEH ullNPUiwFHhRQAXP0hIdcWsf5EKxw/PoouKhEBnu+d1NOlvNaheAbqraPoUxbldj F05iMEKBhsG+qRrphDOmQWihdQfrT6Q2c9kX9equK1OPAwdYlVPPRPYY1bNXSJmX OUrW8fq+NMoi77GT94SyitWCa1QYAxgn19bvD4TBvg4gEClYvi4= =FqUV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYXICz+NLKJtyKPYoAQi2pg/9FmSlNVQO+bCxVVSWpirNBpm87vyGTjVt bp6Anwva25Y5cyRkI5r5QmaYKlng388A+AmXn9Nkf/TFZKB5xDSQPy/R/XrjrZt+ x+GgJn/gm0EUkR8I8FNE20/z8DgCYwZ1Gjms5MxaviJKvOs6kIvP3OA0MrwdFOZi mDnP0nurEYaNhH9sdMOo7vPUJqT8/VyQDvSfm+PbjQIS3GYrZeJnOGumvhpVAA6f wYTXpF1W6K350/RxD+FcG5RZm0vAdH/hPQ8eDASzAaeDikwySweOqOyQpdxtnkel wRhyW/VQlz6R+FxSXV7LU1Sfa+8gNYpO5ZXklkz5UcCXsYyw86pXYKkF2gOLHbbH oOsojyKUtzL/BQ+S8p4DgPUWPyLJ2/0Tf4LZTlJ0LutRC2BzN2TpH044/XvuyaiA K364nhtg6XvNCEcSamaKnNSFQ0ncV97piPwvRCfxirPPJdwW8D/OMoDNcfba9i/A +F21CAtjO2YqIF49wXECnV6aT9SrvXd/pMeHPL3NxCYhYjS9DkZGmGjYH9hcH1iu GibBTsTq6kzgmSnojaMnRjPsecjehapuOtsM3F2EbMjv6N6JthvQwdIsudEvTzI9 qVoR90/uqMGlBJ1rStZ3yuZzx+niMpXu3OWGdrc75kRj0tptqkL5Qaw+7+1j84du oRX2Yu/57CQ= =RejP -----END PGP SIGNATURE-----