Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:3489-1

Опубликовано: 20 окт. 2021
Источник: suse-cvrf

Описание

Security update for python

This update for python fixes the following issues:

  • CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
  • CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)

Список пакетов

Image SLES15-Azure-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-EC2-HVM-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-GCE-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-Azure-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-Azure-LI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-Azure-VLI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-EC2-HVM-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SAP-GCE-BYOS
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP1-SAPCAL-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP1-SAPCAL-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP1-SAPCAL-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-Azure
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP2-SAP-BYOS-Azure
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-BYOS-GCE
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP2-SAP-GCE
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAP-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
libpython2_7-1_0-2.7.18-33.1
python-base-2.7.18-33.1
Image SLES15-SP3-SAP-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAP-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAPCAL-Azure
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAPCAL-EC2-HVM
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
Image SLES15-SP3-SAPCAL-GCE
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
python-xml-2.7.18-33.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
SUSE Linux Enterprise Module for Basesystem 15 SP3
libpython2_7-1_0-2.7.18-33.1
python-2.7.18-33.1
python-base-2.7.18-33.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP2
python-tk-2.7.18-33.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP3
python-tk-2.7.18-33.1
SUSE Linux Enterprise Module for Python 2 15 SP2
python-curses-2.7.18-33.1
python-devel-2.7.18-33.1
python-gdbm-2.7.18-33.1
python-xml-2.7.18-33.1
SUSE Linux Enterprise Module for Python 2 15 SP3
python-curses-2.7.18-33.1
python-devel-2.7.18-33.1
python-gdbm-2.7.18-33.1
python-xml-2.7.18-33.1

Описание

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.


Затронутые продукты
Image SLES15-Azure-BYOS:libpython2_7-1_0-2.7.18-33.1
Image SLES15-Azure-BYOS:python-2.7.18-33.1
Image SLES15-Azure-BYOS:python-base-2.7.18-33.1
Image SLES15-Azure-BYOS:python-xml-2.7.18-33.1

Ссылки

Описание

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES15-Azure-BYOS:libpython2_7-1_0-2.7.18-33.1
Image SLES15-Azure-BYOS:python-2.7.18-33.1
Image SLES15-Azure-BYOS:python-base-2.7.18-33.1
Image SLES15-Azure-BYOS:python-xml-2.7.18-33.1

Ссылки
Уязвимость SUSE-SU-2021:3489-1