Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:0784-1

Опубликовано: 06 мар. 2024
Источник: suse-cvrf

Описание

Security update for python39

This update for python39 fixes the following issues:

  • CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
  • CVE-2023-27043: Fixed incorrect e-mqil parsing (bsc#1210638).
  • CVE-2023-40217: Fixed a ssl.SSLSocket TLS bypass vulnerability where data is sent unencrypted (bsc#1214692).
  • CVE-2022-25236: Fixed an expat vulnerability by supporting expat >= 2.4.4 (bsc#1212015).

Список пакетов

Container containers/python:3.9
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
Image python_15_6
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
SUSE Enterprise Storage 7.1
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-curses-3.9.18-150300.4.38.1
python39-dbm-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
python39-idle-3.9.18-150300.4.38.1
python39-tk-3.9.18-150300.4.38.1
python39-tools-3.9.18-150300.4.38.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-curses-3.9.18-150300.4.38.1
python39-dbm-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
python39-idle-3.9.18-150300.4.38.1
python39-tk-3.9.18-150300.4.38.1
python39-tools-3.9.18-150300.4.38.1
SUSE Linux Enterprise Server 15 SP3-LTSS
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-curses-3.9.18-150300.4.38.1
python39-dbm-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
python39-idle-3.9.18-150300.4.38.1
python39-tk-3.9.18-150300.4.38.1
python39-tools-3.9.18-150300.4.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3
libpython3_9-1_0-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-curses-3.9.18-150300.4.38.1
python39-dbm-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
python39-idle-3.9.18-150300.4.38.1
python39-tk-3.9.18-150300.4.38.1
python39-tools-3.9.18-150300.4.38.1
openSUSE Leap 15.5
libpython3_9-1_0-3.9.18-150300.4.38.1
libpython3_9-1_0-32bit-3.9.18-150300.4.38.1
python39-3.9.18-150300.4.38.1
python39-32bit-3.9.18-150300.4.38.1
python39-base-3.9.18-150300.4.38.1
python39-base-32bit-3.9.18-150300.4.38.1
python39-curses-3.9.18-150300.4.38.1
python39-dbm-3.9.18-150300.4.38.1
python39-devel-3.9.18-150300.4.38.1
python39-doc-3.9.18-150300.4.38.1
python39-doc-devhelp-3.9.18-150300.4.38.1
python39-idle-3.9.18-150300.4.38.1
python39-testsuite-3.9.18-150300.4.38.1
python39-tk-3.9.18-150300.4.38.1
python39-tools-3.9.18-150300.4.38.1

Описание

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-base-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-devel-3.9.18-150300.4.38.1

Ссылки

Описание

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-base-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-devel-3.9.18-150300.4.38.1

Ссылки

Описание

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-base-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-devel-3.9.18-150300.4.38.1

Ссылки

Описание

An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-base-3.9.18-150300.4.38.1
Container containers/python:3.9:python39-devel-3.9.18-150300.4.38.1

Ссылки
Уязвимость SUSE-SU-2024:0784-1