ELA-165-1 python2.6 security update

multiple vulnerabilities

Related CVE CVE-2013-4238 CVE-2014-1912 CVE-2014-7185 CVE-2019-16056

Vulnerabilities have been discovered in Python, an interactive high-level object-oriented language.


The email module wrongly parses email addresses that contain
multiple @ characters. An application that uses the email module and
implements some kind of checks on the From/To headers of a message
could be tricked into accepting an email address that should be


A man-in-the-middle attack is possible by spoof of arbitrary SSL
servers via a crafted certificate resulting from improper handling
of '\0' characters in a domain name in the Subject Alternative Name
field of an X.509 certificate.


Arbitrary remote code execution is possible via a crafted string
resulting from a buffer overflow in the socket.recvfrom_into


A context-dependent attacker can take advantage of an integer
overflow to obtain sensitive information from process memory via a
large size and offset in a "buffer" function.

For Debian 7 Wheezy, these problems have been fixed in version 2.6.8-1.1+deb7u4.

We recommend that you upgrade your python2.6 packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/