Описание
Security update for python310
This update for python310 fixes the following issues:
- CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
Update to 3.10.10:
- Add provides for readline and sqlite3 to the main Python package.
- Disable NIS for new products, it's deprecated and gets removed
Update to 3.10.9:
-
python -m http.server no longer allows terminal control characters sent within a garbage request to be printed to the stderr server lo This is done by changing the http.server BaseHTTPRequestHandler .log_message method to replace control characters with a \xHH hex escape before printin
-
Avoid publishing list of active per-interpreter audit hooks via the gc module
-
The IDNA codec decoder used on DNS hostnames by socket or asyncio related name resolution functions no longer involves a quadratic algorithm. This prevents a potential CPU denial of service if an out-of-spec excessive length hostname involving bidirectional characters were decoded. Some protocols such as urllib http 3xx redirects potentially allow for an attacker to supply such a name.
-
Update bundled libexpat to 2.5.0
-
Port XKCP’s fix for the buffer overflows in SHA-3 (CVE-2022-37454).
-
On Linux the multiprocessing module returns to using filesystem backed unix domain sockets for communication with the forkserver process instead of the Linux abstract socket namespace. Only code that chooses to use the “forkserver” start method is affected Abstract sockets have no permissions and could allow any user on the system in the same network namespace (often the whole system) to inject code into the multiprocessing forkserver process. This was a potential privilege escalation. Filesystem based socket permissions restrict this to the forkserver process user as was the default in Python 3.8 and earlier This prevents Linux CVE-2022-42919
-
Fix a reference bug in _imp.create_builtin() after the creation of the first sub-interpreter for modules builtins and sys. Patch by Victor Stinner.
-
Fixed a bug that was causing a buffer overflow if the tokenizer copies a line missing the newline caracter from a file that is as long as the available tokenizer buffer. Patch by Pablo galindo
-
Update faulthandler to emit an error message with the proper unexpected signal number. Patch by Dong-hee Na.
-
Fix subscription of types.GenericAlias instances containing bare generic types: for example tuple[A, T][int], where A is a generic type, and T is a type variable.
-
Fix detection of MAC addresses for uuid on certain OSs. Patch by Chaim Sanders
-
Print exception class name instead of its string representation when raising errors from ctypes calls.
-
Allow pdb to locate source for frozen modules in the standard library.
-
Raise ValueError instead of SystemError when methods of uninitialized io.IncrementalNewlineDecoder objects are called. Patch by Oren Milman.
-
Fix a possible assertion failure in io.FileIO when the opener returns an invalid file descriptor.
-
Also escape s in the http.server BaseHTTPRequestHandler.log_message so that it is technically possible to parse the line and reconstruct what the original data was. Without this a xHH is ambiguious as to if it is a hex replacement we put in or the characters r”x” came through in the original request line.
-
asyncio.get_event_loop() now only emits a deprecation warning when a new event loop was created implicitly. It no longer emits a deprecation warning if the current event loop was set.
-
Fix bug when calling trace.CoverageResults with valid infile.
-
Fix a bug in handling class cleanups in unittest.TestCase. Now addClassCleanup() uses separate lists for different TestCase subclasses, and doClassCleanups() only cleans up the particular class.
-
Release the GIL when calling termios APIs to avoid blocking threads.
-
Fix ast.increment_lineno() to also cover ast.TypeIgnore when changing line numbers.
-
Fixed bug where inspect.signature() reported incorrect arguments for decorated methods.
-
Fix SystemError in ctypes when exception was not set during initsubclass.
-
Fix statistics.NormalDist pickle with 0 and 1 protocols.
-
Update the bundled copy of pip to version 22.3.1.
-
Apply bugfixes from importlib_metadata 4.11.4, namely: In PathDistribution._name_from_stem, avoid including parts of the extension in the result. In PathDistribution._normalized_name, ensure names loaded from the stem of the filename are also normalized, ensuring duplicate entry points by packages varying only by non-normalized name are hidden.
-
Clean up refleak on failed module initialisation in _zoneinfo
-
Clean up refleaks on failed module initialisation in in _pickle
-
Clean up refleak on failed module initialisation in _io.
-
Fix memory leak in math.dist() when both points don’t have the same dimension. Patch by Kumar Aditya.
-
Fix argument typechecks in _overlapped.WSAConnect() and _overlapped.Overlapped.WSASendTo() functions.
-
Fix internal error in the re module which in very rare circumstances prevented compilation of a regular expression containing a conditional expression without the “else” branch.
-
Fix asyncio.StreamWriter.drain() to call protocol.connection_lost callback only once on Windows.
-
Add a mutex to unittest.mock.NonCallableMock to protect concurrent access to mock attributes.
-
Fix hang on Windows in subprocess.wait_closed() in asyncio with ProactorEventLoop. Patch by Kumar Aditya.
-
Fix infinite loop in unittest when a self-referencing chained exception is raised
-
tkinter.Text.count() raises now an exception for options starting with “-” instead of silently ignoring them.
-
On uname_result, restored expectation that _fields and _asdict would include all six properties including processor.
-
Update the bundled copies of pip and setuptools to versions 22.3 and 65.5.0 respectively.
-
Fix bug in urllib.parse.urlparse() that causes certain port numbers containing whitespace, underscores, plus and minus signs, or non-ASCII digits to be incorrectly accepted.
-
Allow venv to pass along PYTHON* variables to ensurepip and pip when they do not impact path resolution
-
On macOS, fix a crash in syslog.syslog() in multi-threaded applications. On macOS, the libc syslog() function is not thread-safe, so syslog.syslog() no longer releases the GIL to call it. Patch by Victor Stinner.
-
Allow BUILTINS to be a valid field name for frozen dataclasses.
-
Make sure patch.dict() can be applied on async functions.
-
To avoid apparent memory leaks when asyncio.open_connection() raises, break reference cycles generated by local exception and future instances (which has exception instance as its member var). Patch by Dong Uk, Kang.
-
Prevent error when activating venv in nested fish instances.
-
Restrict use of sockets instead of pipes for stdin of subprocesses created by asyncio to AIX platform only.
-
shutil.copytree() now applies the ignore_dangling_symlinks argument recursively.
-
Fix IndexError in argparse.ArgumentParser when a store_true action is given an explicit argument.
-
Document that calling variadic functions with ctypes requires special care on macOS/arm64 (and possibly other platforms).
-
Skip test_normalization() of test_unicodedata if it fails to download NormalizationTest.txt file from pythontest.net. Patch by Victor Stinner.
-
Some C API tests were moved into the new Lib/test/test_capi/ directory.
-
Fix -Wimplicit-int, -Wstrict-prototypes, and -Wimplicit-function-declaration compiler warnings in configure checks.
-
Fix -Wimplicit-int compiler warning in configure check for PTHREAD_SCOPE_SYSTEM.
-
Specify the full path to the source location for make docclean (needed for cross-builds).
-
Fix NO_MISALIGNED_ACCESSES being not defined for the SHA3 extension when HAVE_ALIGNED_REQUIRED is set. Allowing builds on hardware that unaligned memory accesses are not allowed.
-
Fix handling of module docstrings in Tools/i18n/pygettext.py.
-
Add invalid-json.patch fixing invalid JSON in Doc/howto/logging-cookbook.rst (somehow similar to gh#python/cpython#102582).
Список пакетов
Container bci/python:3
SUSE Linux Enterprise Module for Python 3 15 SP4
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2023:0748-1
- E-Mail link for SUSE-SU-2023:0748-1
- SUSE Security Ratings
- SUSE Bug 1208471
- SUSE Bug 831629
- SUSE CVE CVE-2015-20107 page
- SUSE CVE CVE-2022-37454 page
- SUSE CVE CVE-2022-42919 page
- SUSE CVE CVE-2022-45061 page
- SUSE CVE CVE-2023-24329 page
Описание
In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9
Затронутые продукты
Ссылки
- CVE-2015-20107
- SUSE Bug 1198511
- SUSE Bug 1200507
- SUSE Bug 1201777
- SUSE Bug 1201791
- SUSE Bug 1205068
- SUSE Bug 1208337
Описание
The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
Затронутые продукты
Ссылки
- CVE-2022-37454
- SUSE Bug 1204577
- SUSE Bug 1204966
- SUSE Bug 1205836
Описание
Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.
Затронутые продукты
Ссылки
- CVE-2022-42919
- SUSE Bug 1204886
Описание
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
Затронутые продукты
Ссылки
- CVE-2022-45061
- SUSE Bug 1205244
- SUSE Bug 1211488
Описание
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Затронутые продукты
Ссылки
- CVE-2023-24329
- SUSE Bug 1208471
- SUSE Bug 1213553
- SUSE Bug 1213554
- SUSE Bug 1213839
- SUSE Bug 1225672