-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2020.4112
python3.5 security update
19 November 2020
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: python3.5
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Denial of Service -- Remote/Unauthenticated
Provide Misleading Information -- Remote/Unauthenticated
Access Confidential Data -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-26116 CVE-2019-20907
Reference: ESB-2020.4006
ESB-2020.3995
ESB-2020.3785
ESB-2020.3614
ESB-2020.2871
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
- --------------------------BEGIN INCLUDED TEXT--------------------
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2456-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Roberto C. S=E1nchez
November 18, 2020 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : python3.5
Version : 3.5.3-1+deb9u3
CVE ID : CVE-2019-20907 CVE-2020-26116
Debian Bug :=20
Multiple security issues were discovered in Python.
CVE-2019-20907
In Lib/tarfile.py, an attacker is able to craft a TAR
archive leading to an infinite loop when opened by tarfile.open,
because _proc_pax lacks header validation
CVE-2020-26116
http.client allows CRLF injection if the attacker controls
the HTTP request method
For Debian 9 stretch, these problems have been fixed in version
3.5.3-1+deb9u3.
We recommend that you upgrade your python3.5 packages.
For the detailed security status of python3.5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.5
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----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=x90g
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=R0F2
-----END PGP SIGNATURE-----
The post ESB-2020.4112 – [Debian] python3.5: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2020/11/19/esb-2020-4112-debian-python3-5-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-4112-debian-python3-5-multiple-vulnerabilities
No comments:
Post a Comment