Name | CVE-2021-32837 |
Description | mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3460-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-mechanize (PTS) | buster | 1:0.2.5-3 | vulnerable |
buster (security) | 1:0.2.5-3+deb10u1 | fixed | |
bullseye | 1:0.4.5-2 | vulnerable | |
bookworm | 1:0.4.8+pypi-5 | fixed | |
sid, trixie | 1:0.4.9+ds-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-mechanize | source | buster | 1:0.2.5-3+deb10u1 | DLA-3460-1 | ||
python-mechanize | source | (unstable) | 1:0.4.7-1 |
[bullseye] - python-mechanize <no-dsa> (Minor issue)
https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6 (v0.4.6)