Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0047-1

Опубликовано: 09 янв. 2025
Источник: suse-cvrf

Описание

Security update for python39

This update for python39 fixes the following issue:

  • Update to 3.9.21

Список пакетов

Container containers/python:3.9
libpython3_9-1_0-3.9.21-150300.4.61.1
python39-3.9.21-150300.4.61.1
python39-base-3.9.21-150300.4.61.1
python39-devel-3.9.21-150300.4.61.1
Image python_15_6
libpython3_9-1_0-3.9.21-150300.4.61.1
python39-3.9.21-150300.4.61.1
python39-base-3.9.21-150300.4.61.1
python39-devel-3.9.21-150300.4.61.1
openSUSE Leap 15.6
libpython3_9-1_0-3.9.21-150300.4.61.1
libpython3_9-1_0-32bit-3.9.21-150300.4.61.1
python39-3.9.21-150300.4.61.1
python39-32bit-3.9.21-150300.4.61.1
python39-base-3.9.21-150300.4.61.1
python39-base-32bit-3.9.21-150300.4.61.1
python39-curses-3.9.21-150300.4.61.1
python39-dbm-3.9.21-150300.4.61.1
python39-devel-3.9.21-150300.4.61.1
python39-doc-3.9.21-150300.4.61.1
python39-doc-devhelp-3.9.21-150300.4.61.1
python39-idle-3.9.21-150300.4.61.1
python39-testsuite-3.9.21-150300.4.61.1
python39-tk-3.9.21-150300.4.61.1
python39-tools-3.9.21-150300.4.61.1

Описание

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-base-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-devel-3.9.21-150300.4.61.1

Ссылки

Описание

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.


Затронутые продукты
Container containers/python:3.9:libpython3_9-1_0-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-base-3.9.21-150300.4.61.1
Container containers/python:3.9:python39-devel-3.9.21-150300.4.61.1

Ссылки