ELA-164-1 python2.7 security update

multiple vulnerabilities

Related CVEs CVE-2013-1753 CVE-2014-4616 CVE-2014-4650 CVE-2014-7185 CVE-2019-16056

Vulnerabilities have been discovered in Python, an interactive high-level object-oriented language.


The email module wrongly parses email addresses that contain
multiple @ characters. An application that uses the email module and 
implements some kind of checks on the From/To headers of a message
could be tricked into accepting an email address that should be


A denial of service (resource exhaustion, excessive memory
consumption) can be triggered in the xmlrpc library by a specially
crafted HTTP request.


An attacker is able to read arbitrary process memory by a specially
crafted JSON string.


Information disclosure or arbirtary code execution is possible via a
specially crafted URL because of improper handling of URL-encoded
path separators in the CGIHTTPServer module.


A context-dependent attacker can take advantage of an integer
overflow to obtain sensitive information from process memory via a
large size and offset in a "buffer" function.     

For Debian 7 Wheezy, these problems have been fixed in version 2.7.3-6+deb7u8.

We recommend that you upgrade your python2.7 packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/