7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8 High
AI Score
Confidence
High
0.016 Low
EPSS
Percentile
87.3%
Debian LTS Advisory DLA-2808-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
November 05, 2021 https://wiki.debian.org/LTS
Package : python3.5
Version : 3.5.3-1+deb9u5
CVE ID : CVE-2021-3733 CVE-2021-3737
There were a couple of vulnerabilites found in src:python3.5, the
Python interpreter v3.5, and are as follows:
CVE-2021-3733
The ReDoS-vulnerable regex has quadratic worst-case complexity
and it allows cause a denial of service when identifying
crafted invalid RFCs. This ReDoS issue is on the client side
and needs remote attackers to control the HTTP server.
CVE-2021-3737
HTTP client can get stuck infinitely reading len(line) < 64k
lines after receiving a '100 Continue' HTTP response. This
could lead to the client being a bandwidth sink for anyone
in control of a server.
For Debian 9 stretch, these problems have been fixed in version
3.5.3-1+deb9u5.
We recommend that you upgrade your python3.5 packages.
For the detailed security status of python3.5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.5
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | arm64 | python3.7-dbg | < 3.7.3-2+deb10u5 | python3.7-dbg_3.7.3-2+deb10u5_arm64.deb |
Debian | 10 | i386 | python2.7 | < 2.7.16-2+deb10u2 | python2.7_2.7.16-2+deb10u2_i386.deb |
Debian | 10 | all | libpython2.7-testsuite | < 2.7.16-2+deb10u2 | libpython2.7-testsuite_2.7.16-2+deb10u2_all.deb |
Debian | 10 | i386 | libpython2.7-dbg | < 2.7.16-2+deb10u2 | libpython2.7-dbg_2.7.16-2+deb10u2_i386.deb |
Debian | 10 | arm64 | libpython2.7-stdlib | < 2.7.16-2+deb10u2 | libpython2.7-stdlib_2.7.16-2+deb10u2_arm64.deb |
Debian | 9 | i386 | python3.5-dev | < 3.5.3-1+deb9u5 | python3.5-dev_3.5.3-1+deb9u5_i386.deb |
Debian | 10 | armhf | python3.7-dbg | < 3.7.3-2+deb10u5 | python3.7-dbg_3.7.3-2+deb10u5_armhf.deb |
Debian | 9 | all | idle-python3.5 | < 3.5.3-1+deb9u5 | idle-python3.5_3.5.3-1+deb9u5_all.deb |
Debian | 10 | armhf | libpython3.7-dbg | < 3.7.3-2+deb10u5 | libpython3.7-dbg_3.7.3-2+deb10u5_armhf.deb |
Debian | 10 | armhf | python3.7-minimal | < 3.7.3-2+deb10u5 | python3.7-minimal_3.7.3-2+deb10u5_armhf.deb |
7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8 High
AI Score
Confidence
High
0.016 Low
EPSS
Percentile
87.3%