安全公告详情

NS-SA-2021-0147

2021-09-24 11:21:19

简介

moderate: python3/libvpx security update

严重级别

moderate

主题

An update for python3/libvpx is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

python3: The self-test suite for the Python interpreter. This is only useful to test Python itself. For testing general Python code, you should use the unittest module from python3-libs, or a library such as python3-pytest or python3-nose.
libvpx: This package provides debug information for package libvpx. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
python3: A vulnerability was found in the way the ipaddress python module computes hash values in the IPv4Interface and IPv6Interface classes. This flaw allows an attacker to create many dictionary entries, due to the performance of a dictionary containing the IPv4Interface or IPv6Interface objects, possibly resulting in a denial of service. The highest threat from this vulnerability is to system availability.(CVE-2020-14422)
python3: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.(CVE-2020-8492)
python3: A flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.(CVE-2019-20907)
python3: A reflected cross-site scripting (XSS) vulnerability was found in Python XML-RPC server. The `server_title` field is not sufficiently sanitized allowing malicious JavaScript to be injected. Successful exploitation would allow a remote attacker to execute JavaScript code within the context of the affected user.(CVE-2019-16935)
python3: bugfix
libvpx: A denial of service vulnerability in libvpx in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-30436808.(CVE-2017-0393)
libvpx: In vp8_decode_frame of decodeframe.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure if error correction were turned on, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1Android ID: A-6245877(CVE-2020-0034)
libvpx: In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-12267548(CVE-2019-9232)
libvpx: In libvpx, there is a possible information disclosure due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-8047935(CVE-2019-9433)
libvpx: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F11B5.

影响组件

  • python3
  • libvpx

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["python3-debug-3.6.8-18.el7.x86_64.rpm","python3-libs-3.6.8-18.el7.x86_64.rpm","python3-test-3.6.8-18.el7.x86_64.rpm","python3-3.6.8-18.el7.x86_64.rpm","python3-devel-3.6.8-18.el7.x86_64.rpm","python3-idle-3.6.8-18.el7.x86_64.rpm","python3-tkinter-3.6.8-18.el7.x86_64.rpm"],"source":"python3-3.6.8-18.el7.src.rpm"},{"binary":["libvpx-1.3.0-8.el7.x86_64.rpm","libvpx-utils-1.3.0-8.el7.x86_64.rpm","libvpx-devel-1.3.0-8.el7.x86_64.rpm"],"source":"libvpx-1.3.0-8.el7.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["python3-debug-3.6.8-18.el7.x86_64.rpm","python3-libs-3.6.8-18.el7.x86_64.rpm","python3-test-3.6.8-18.el7.x86_64.rpm","python3-3.6.8-18.el7.x86_64.rpm","python3-devel-3.6.8-18.el7.x86_64.rpm","python3-idle-3.6.8-18.el7.x86_64.rpm","python3-tkinter-3.6.8-18.el7.x86_64.rpm"],"source":"python3-3.6.8-18.el7.src.rpm"},{"binary":["libvpx-1.3.0-8.el7.x86_64.rpm","libvpx-utils-1.3.0-8.el7.x86_64.rpm","libvpx-devel-1.3.0-8.el7.x86_64.rpm"],"source":"libvpx-1.3.0-8.el7.src.rpm"}]}]}
CGSL MAIN 5.05
  • python3-3.6.8-18.el7.src.rpm
    • python3-debug-3.6.8-18.el7.x86_64.rpm
    • python3-libs-3.6.8-18.el7.x86_64.rpm
    • python3-test-3.6.8-18.el7.x86_64.rpm
    • python3-3.6.8-18.el7.x86_64.rpm
    • python3-devel-3.6.8-18.el7.x86_64.rpm
    • python3-idle-3.6.8-18.el7.x86_64.rpm
    • python3-tkinter-3.6.8-18.el7.x86_64.rpm
  • libvpx-1.3.0-8.el7.src.rpm
    • libvpx-1.3.0-8.el7.x86_64.rpm
    • libvpx-utils-1.3.0-8.el7.x86_64.rpm
    • libvpx-devel-1.3.0-8.el7.x86_64.rpm
CGSL CORE 5.05
  • python3-3.6.8-18.el7.src.rpm
    • python3-debug-3.6.8-18.el7.x86_64.rpm
    • python3-libs-3.6.8-18.el7.x86_64.rpm
    • python3-test-3.6.8-18.el7.x86_64.rpm
    • python3-3.6.8-18.el7.x86_64.rpm
    • python3-devel-3.6.8-18.el7.x86_64.rpm
    • python3-idle-3.6.8-18.el7.x86_64.rpm
    • python3-tkinter-3.6.8-18.el7.x86_64.rpm
  • libvpx-1.3.0-8.el7.src.rpm
    • libvpx-1.3.0-8.el7.x86_64.rpm
    • libvpx-utils-1.3.0-8.el7.x86_64.rpm
    • libvpx-devel-1.3.0-8.el7.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108