Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:0302-1

Опубликовано: 03 фев. 2020
Источник: suse-cvrf

Описание

Security update for python36

This update for python36 to version 3.6.10 fixes the following issues:

  • CVE-2017-18207: Fixed a denial of service in Wave_read._read_fmt_chunk() (bsc#1083507).
  • CVE-2019-16056: Fixed an issue where email parsing could fail for multiple @ signs (bsc#1149955).
  • CVE-2019-15903: Fixed a heap-based buffer over-read in libexpat (bsc#1149429).

Список пакетов

Image SLES12-SP5-Azure-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-HPC-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-HPC-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-SAP-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Standard-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-EC2-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-EC2-ECS-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-EC2-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-EC2-SAP-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-EC2-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-GCE-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-GCE-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-GCE-SAP-BYOS
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-GCE-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
libpython3_6m1_0-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
SUSE Linux Enterprise Server 12 SP5
libpython3_6m1_0-3.6.10-4.3.5
python36-3.6.10-4.3.5
python36-base-3.6.10-4.3.5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libpython3_6m1_0-3.6.10-4.3.5
python36-3.6.10-4.3.5
python36-base-3.6.10-4.3.5

Описание

** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions."


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки

Описание

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.3.5
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.3.5

Ссылки
Уязвимость SUSE-SU-2020:0302-1