DEBIAN-CVE-2021-32837

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-32837
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-32837.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-32837
Upstream
Published
2023-01-17T22:15:10Z
Modified
2025-09-19T06:06:36Z
Summary
[none]
Details

mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.

References

Affected packages

Debian:12 / python-mechanize

Package

Name
python-mechanize
Purl
pkg:deb/debian/python-mechanize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.4.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-mechanize

Package

Name
python-mechanize
Purl
pkg:deb/debian/python-mechanize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.4.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / python-mechanize

Package

Name
python-mechanize
Purl
pkg:deb/debian/python-mechanize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.4.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}