Debian 10239 Published by

Debian GNU/Linux has received security updates for Python and SimpleSAMLphp:

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 3980-1] python3.9 security update
[DLA 3981-1] simplesamlphp security update

Debian GNU/Linux 12 (Bookworm):
[DSA 5822-1] simplesamlphp security update




[SECURITY] [DLA 3980-1] python3.9 security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3980-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
December 02, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : python3.9
Version : 3.9.2-1+deb11u2
CVE ID : CVE-2015-20107 CVE-2020-10735 CVE-2021-3426 CVE-2021-3733
CVE-2021-3737 CVE-2021-4189 CVE-2021-28861 CVE-2021-29921
CVE-2022-42919 CVE-2022-45061 CVE-2023-6597 CVE-2023-24329
CVE-2023-27043 CVE-2023-40217 CVE-2024-0397 CVE-2024-0450
CVE-2024-4032 CVE-2024-6232 CVE-2024-6923 CVE-2024-7592
CVE-2024-8088 CVE-2024-9287 CVE-2024-11168
Debian Bug : 989195 1070135 1059298 1070133

Multiple vulnerabilities have been fixed in the Python3 interpreter.

CVE-2015-20107

The mailcap module did not add escape characters into commands
discovered in the system mailcap file

CVE-2020-10735

Prevent DoS with very large int

CVE-2021-3426

Remove the pydoc getfile feature which could be abused to read
arbitrary files on the disk

CVE-2021-3733

Regular Expression Denial of Service in urllib's
AbstractBasicAuthHandler class

CVE-2021-3737

Infinite loop in the HTTP client code

CVE-2021-4189

Make ftplib not trust the PASV response

CVE-2021-28861

Open redirection vulnerability in http.server

CVE-2021-29921

Leading zeros in IPv4 addresses are no longer tolerated

CVE-2022-42919

Don't use Linux abstract sockets for multiprocessing

CVE-2022-45061

Quadratic time in the IDNA decoder

CVE-2023-6597

tempfile.TemporaryDirectory failure to remove dir

CVE-2023-24329

Strip C0 control and space chars in urlsplit

CVE-2023-27043

Reject malformed addresses in email.parseaddr()

CVE-2023-40217

ssl.SSLSocket bypass of the TLS handshake

CVE-2024-0397

Race condition in ssl.SSLContext

CVE-2024-0450

Quoted-overlap zipbomb DoS

CVE-2024-4032

Incorrect information about private addresses in the ipaddress
module

CVE-2024-6232

ReDoS when parsing tarfile headers

CVE-2024-6923

Encode newlines in headers in the email module

CVE-2024-7592

Quadratic complexity parsing cookies with backslashes

CVE-2024-8088

Infinite loop when iterating over zip archive entry names

CVE-2024-9287

venv activation scripts did't quote paths

CVE-2024-11168

urllib functions improperly validated bracketed hosts

For Debian 11 bullseye, these problems have been fixed in version
3.9.2-1+deb11u2.

We recommend that you upgrade your python3.9 packages.

For the detailed security status of python3.9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.9

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 3981-1] simplesamlphp security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3981-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Santiago Ruano Rincón
December 02, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : simplesamlphp
Version : 1.19.0-1+deb11u1
CVE ID : CVE-2024-52596

It was discovered that in SimpleSAMLphp, an implementation of the SAML 2.0
protocol, is prone to an XXE vulnerability when loading an (untrusted) XML
document.

For Debian 11 bullseye, this problem has been fixed in version
1.19.0-1+deb11u1.

We recommend that you upgrade your simplesamlphp packages.

For the detailed security status of simplesamlphp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/simplesamlphp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DSA 5822-1] simplesamlphp security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5822-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 02, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : simplesamlphp
CVE ID : CVE-2024-52596

It was discovered that in SimpleSAMLphp, an implementation of the SAML
2.0 protocol, is prone to a XXE vulnerability when loading an
(untrusted) XML document.

For the stable distribution (bookworm), this problem has been fixed in
version 1.19.7-1+deb12u1.

We recommend that you upgrade your simplesamlphp packages.

For the detailed security status of simplesamlphp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/simplesamlphp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/