Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:4104-1

Опубликовано: 16 дек. 2021
Источник: suse-cvrf

Описание

Security update for python3

This update for python3 fixes the following issues:

  • CVE-2021-3426: Fixed information disclosure via pydoc (bsc#1183374).

  • CVE-2021-3733: Fixed infinitely reading potential HTTP headers after a 100 Continue status response from the server (bsc#1189241).

  • CVE-2021-3737: Fixed ReDoS in urllib.request (bsc#1189287).

  • We do not require python-rpm-macros package (bsc#1180125).

  • Use versioned python-Sphinx to avoid dependency on other version of Python (bsc#1183858).

  • Stop providing 'python' symbol, which means python2 currently (bsc#1185588).

  • Modify Lib/ensurepip/init.py to contain the same version numbers as are in reality the ones in the bundled wheels (bsc#1187668).

Список пакетов

openSUSE Leap 15.3
libpython3_6m1_0-3.6.15-10.9.1
libpython3_6m1_0-32bit-3.6.15-10.9.1
python3-3.6.15-10.9.1
python3-base-3.6.15-10.9.1
python3-curses-3.6.15-10.9.1
python3-dbm-3.6.15-10.9.1
python3-devel-3.6.15-10.9.1
python3-doc-3.6.15-10.9.1
python3-doc-devhelp-3.6.15-10.9.1
python3-idle-3.6.15-10.9.1
python3-testsuite-3.6.15-10.9.1
python3-tk-3.6.15-10.9.1
python3-tools-3.6.15-10.9.1

Описание

There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.


Затронутые продукты
openSUSE Leap 15.3:libpython3_6m1_0-3.6.15-10.9.1
openSUSE Leap 15.3:libpython3_6m1_0-32bit-3.6.15-10.9.1
openSUSE Leap 15.3:python3-3.6.15-10.9.1
openSUSE Leap 15.3:python3-base-3.6.15-10.9.1

Ссылки

Описание

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.


Затронутые продукты
openSUSE Leap 15.3:libpython3_6m1_0-3.6.15-10.9.1
openSUSE Leap 15.3:libpython3_6m1_0-32bit-3.6.15-10.9.1
openSUSE Leap 15.3:python3-3.6.15-10.9.1
openSUSE Leap 15.3:python3-base-3.6.15-10.9.1

Ссылки

Описание

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.


Затронутые продукты
openSUSE Leap 15.3:libpython3_6m1_0-3.6.15-10.9.1
openSUSE Leap 15.3:libpython3_6m1_0-32bit-3.6.15-10.9.1
openSUSE Leap 15.3:python3-3.6.15-10.9.1
openSUSE Leap 15.3:python3-base-3.6.15-10.9.1

Ссылки
Уязвимость openSUSE-SU-2021:4104-1