Description: | Summary: The remote host is missing an update for the Debian 'python3.7' package(s) announced via the DLA-3477-1 advisory.
Vulnerability Insight: Several vulnerabilities were fixed in the Python3 interpreter.
CVE-2015-20107
The mailcap module did not add escape characters into commands discovered in the system mailcap file.
CVE-2020-10735
Prevent DoS with very large int.
CVE-2021-3426
Remove the pydoc getfile feature which could be abused to read arbitrary files on the disk.
CVE-2021-3733
Regular Expression Denial of Service in urllib's AbstractBasicAuthHandler class.
CVE-2021-3737
Infinite loop in the HTTP client code.
CVE-2021-4189
Make ftplib not trust the PASV response.
CVE-2022-45061
Quadratic time in the IDNA decoder.
For Debian 10 buster, these problems have been fixed in version 3.7.3-2+deb10u5.
We recommend that you upgrade your python3.7 packages.
For the detailed security status of python3.7 please refer to its security tracker page at: [link moved to references]
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]
Affected Software/OS: 'python3.7' package(s) on Debian 10.
Solution: Please install the updated package(s).
CVSS Score: 8.0
CVSS Vector: AV:N/AC:L/Au:S/C:P/I:C/A:P
|