===========================================================================
ZMCIRT Vulnerability Bulletin
ZMC-2021.11.5.0800
python3.5: Denial of service - Remote with user interaction
5th November 2021
===========================================================================
Product: python3.5
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Denial of Service -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3737 CVE-2021-3733
Reference: ESB-2021.3659
ESB-2021.3589
ESB-2021.3138
Original Bulletin:
http://www.debian.org/lts/security/2021/dla-2808
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2808-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
November 05, 2021 https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------
Package : python3.5
Version : 3.5.3-1+deb9u5
CVE ID : CVE-2021-3733 CVE-2021-3737
There were a couple of vulnerabilites found in src:python3.5, the
Python interpreter v3.5, and are as follows:
CVE-2021-3733
The ReDoS-vulnerable regex has quadratic worst-case complexity
and it allows cause a denial of service when identifying
crafted invalid RFCs. This ReDoS issue is on the client side
and needs remote attackers to control the HTTP server.
CVE-2021-3737
HTTP client can get stuck infinitely reading len(line) < 64k
lines after receiving a '100 Continue' HTTP response. This
could lead to the client being a bandwidth sink for anyone
in control of a server.
For Debian 9 stretch, these problems have been fixed in version
3.5.3-1+deb9u5.
We recommend that you upgrade your python3.5 packages.
For the detailed security status of python3.5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.5
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- --------------------------END INCLUDED TEXT--------------------
ZMCIRT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. ZMCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Internet Email: report@cirt.zm
Telephone: 7070
ZMCIRT personnel answer during Zambian business hours
which are 8am to 5pm.
On call after hours for member emergencies only.
===========================================================================
Copyright @2023 ZAMBIA CIRT