安全公告详情

NS-SA-2023-0072

2023-05-29 09:41:11

简介

important: expat/python3 security update

严重级别

important

主题

An update for expat/python3 is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

expat: This is expat, the C library for parsing XML, written by James Clark. Expat is a stream oriented XML parser. This means that you register handlers with the parser prior to starting the parse. These handlers are called when the parser discovers the associated structures in the document being parsed. A start tag is an example of the kind of structures for which you may register handlers.
python3: This package contains the header files and configuration needed to compile Python extension modules (typically written in C or C++), to embed Python into other programs, and to make binary distributions for Python libraries. It also contains the necessary macros to build RPM packages with Python modules and 2to3 tool, an automatic source converter from Python 2.X. It also makes the "python3" and "python3-config" commands available for compatibility with some build systems. When building packages, prefer requiring platform-python-devel and using the %{__python3} macro instead, if possible.


Security Fix(es):
expat: A vulnerability was found in expat. With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that XML_ResumeParser directly uses the internalEntityProcessor as its processor. If the subsequent parse includes some unclosed tags, this will return without calling storeRawNames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself. Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur. Using this vulnerability in the doContent function allows an attacker to triage a denial of service or potentially arbitrary code execution.(CVE-2022-40674)
expat: bugfix
python3: A flaw was found in Python 3's pydoc. This flaw allows a local or adjacent attacker who discovers or can convince another local or adjacent user to start a pydoc server to access the server and then use it to disclose sensitive information belonging to the other user that they would not normally have the ability to access. The highest threat from this vulnerability is to data confidentiality.(CVE-2021-3426)
python3: A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.(CVE-2021-3737)
python3: A command injection vulnerability was found in the Python mailcap module. The issue occurs due to not adding escape characters into the system mailcap file commands. This flaw allows attackers to inject shell commands into applications that call the mailcap.findmatch function with untrusted input.(CVE-2015-20107)
python3: A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.(CVE-2021-4189)
python3: A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks.(CVE-2022-0391)
python3: There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.(CVE-2021-3733)
python3: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.D0B5.

影响组件

  • expat
  • python3

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["expat-2.2.5-8.el8_6.3.x86_64.rpm","expat-devel-2.2.5-8.el8_6.3.x86_64.rpm"],"source":"expat-2.2.5-8.el8_6.3.src.rpm"},{"binary":["platform-python-3.6.8-47.el8.x86_64.rpm","platform-python-devel-3.6.8-47.el8.x86_64.rpm","python3-devel-3.6.8-47.el8.x86_64.rpm","python3-libs-3.6.8-47.el8.x86_64.rpm","python3-tkinter-3.6.8-47.el8.x86_64.rpm"],"source":"python3-3.6.8-47.el8.src.rpm"}]}]}
CGSL MAIN 6.02
  • expat-2.2.5-8.el8_6.3.src.rpm
    • expat-2.2.5-8.el8_6.3.x86_64.rpm
    • expat-devel-2.2.5-8.el8_6.3.x86_64.rpm
  • python3-3.6.8-47.el8.src.rpm
    • platform-python-3.6.8-47.el8.x86_64.rpm
    • platform-python-devel-3.6.8-47.el8.x86_64.rpm
    • python3-devel-3.6.8-47.el8.x86_64.rpm
    • python3-libs-3.6.8-47.el8.x86_64.rpm
    • python3-tkinter-3.6.8-47.el8.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108