ΠΠΏΠΈΡΠ°Π½ΠΈΠ΅
Security update for python39
This update for python39 fixes the following issues:
- Update to 3.9.20:
- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)
- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)
- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)
Π‘ΠΏΠΈΡΠΎΠΊ ΠΏΠ°ΠΊΠ΅ΡΠΎΠ²
Container containers/python:3.9
Image python_15_6
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
SUSE Linux Enterprise Module for Legacy 15 SP5
SUSE Linux Enterprise Server 15 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP3
openSUSE Leap 15.5
openSUSE Leap 15.6
Π‘ΡΡΠ»ΠΊΠΈ
- Link for SUSE-SU-2024:3411-1
- E-Mail link for SUSE-SU-2024:3411-1
- SUSE Security Ratings
- SUSE Bug 1229596
- SUSE Bug 1229704
- SUSE Bug 1230227
- SUSE CVE CVE-2024-6232 page
- SUSE CVE CVE-2024-7592 page
- SUSE CVE CVE-2024-8088 page
ΠΠΏΠΈΡΠ°Π½ΠΈΠ΅
There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
ΠΠ°ΡΡΠΎΠ½ΡΡΡΠ΅ ΠΏΡΠΎΠ΄ΡΠΊΡΡ
Π‘ΡΡΠ»ΠΊΠΈ
- CVE-2024-6232
- SUSE Bug 1230227
ΠΠΏΠΈΡΠ°Π½ΠΈΠ΅
There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
ΠΠ°ΡΡΠΎΠ½ΡΡΡΠ΅ ΠΏΡΠΎΠ΄ΡΠΊΡΡ
Π‘ΡΡΠ»ΠΊΠΈ
- CVE-2024-7592
- SUSE Bug 1229596
ΠΠΏΠΈΡΠ°Π½ΠΈΠ΅
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
ΠΠ°ΡΡΠΎΠ½ΡΡΡΠ΅ ΠΏΡΠΎΠ΄ΡΠΊΡΡ
Π‘ΡΡΠ»ΠΊΠΈ
- CVE-2024-8088
- SUSE Bug 1229704