Описание
Security update for python39
This update for python39 fixes the following issues:
- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2023-27043: Fixed incorrect e-mqil parsing (bsc#1210638).
- CVE-2023-40217: Fixed a ssl.SSLSocket TLS bypass vulnerability where data is sent unencrypted (bsc#1214692).
- CVE-2022-25236: Fixed an expat vulnerability by supporting expat >= 2.4.4 (bsc#1212015).
Список пакетов
Container containers/python:3.9
Image python_15_6
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
SUSE Linux Enterprise Server 15 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP3
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:0784-1
- E-Mail link for SUSE-SU-2024:0784-1
- SUSE Security Ratings
- SUSE Bug 1196025
- SUSE Bug 1210638
- SUSE Bug 1212015
- SUSE Bug 1214692
- SUSE Bug 1215454
- SUSE Bug 1219666
- SUSE CVE CVE-2022-25236 page
- SUSE CVE CVE-2023-27043 page
- SUSE CVE CVE-2023-40217 page
- SUSE CVE CVE-2023-6597 page
Описание
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
Затронутые продукты
Ссылки
- CVE-2022-25236
- SUSE Bug 1196025
- SUSE Bug 1196784
- SUSE Bug 1197217
- SUSE Bug 1200038
- SUSE Bug 1201735
Описание
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Затронутые продукты
Ссылки
- CVE-2023-27043
- SUSE Bug 1210638
- SUSE Bug 1222537
Описание
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Затронутые продукты
Ссылки
- CVE-2023-40217
- SUSE Bug 1214692
- SUSE Bug 1217524
- SUSE Bug 1218319
- SUSE Bug 1218476
- SUSE Bug 1218965
- SUSE Bug 1219472
- SUSE Bug 1219713
- SUSE Bug 1221582
- SUSE Bug 1224883
Описание
An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
Затронутые продукты
Ссылки
- CVE-2023-6597
- SUSE Bug 1219666
- SUSE Bug 1221854
- SUSE Bug 1224879
- SUSE Bug 1225185