- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3477-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk June 30, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : python3.7 Version : 3.7.3-2+deb10u5 CVE ID : CVE-2015-20107 CVE-2020-10735 CVE-2021-3426 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 CVE-2022-45061 Several vulnerabilities were fixed in the Python3 interpreter. CVE-2015-20107 The mailcap module did not add escape characters into commands discovered in the system mailcap file. CVE-2020-10735 Prevent DoS with very large int. CVE-2021-3426 Remove the pydoc getfile feature which could be abused to read arbitrary files on the disk. CVE-2021-3733 Regular Expression Denial of Service in urllib's AbstractBasicAuthHandler class. CVE-2021-3737 Infinite loop in the HTTP client code. CVE-2021-4189 Make ftplib not trust the PASV response. CVE-2022-45061 Quadratic time in the IDNA decoder. For Debian 10 buster, these problems have been fixed in version 3.7.3-2+deb10u5. We recommend that you upgrade your python3.7 packages. For the detailed security status of python3.7 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python3.7 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS