ALT-PU-2019-1685-1
Closed vulnerabilities
BDU:2019-02457
Уязвимость процедуры синтаксического анализа сертификата интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00690
Уязвимость интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-03946
Уязвимость модуля для работы с ZIP-файлами zipfile пакета программ Python, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00373
Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03713
Уязвимость модуля pickle.c языка программирования Python, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-20406
Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- https://bugs.python.org/issue34656
- https://bugs.python.org/issue34656
- https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
- https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- FEDORA-2019-51f1e08207
- FEDORA-2019-51f1e08207
- FEDORA-2019-cf725dd20b
- FEDORA-2019-cf725dd20b
- FEDORA-2019-6baeb15da3
- FEDORA-2019-6baeb15da3
- FEDORA-2019-6b02154aa0
- FEDORA-2019-6b02154aa0
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-7d9f3cf3ce
- FEDORA-2019-7d9f3cf3ce
- https://security.netapp.com/advisory/ntap-20190416-0010/
- https://security.netapp.com/advisory/ntap-20190416-0010/
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
Modified: 2024-11-21
CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1989
- openSUSE-SU-2019:1989
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- RHSA-2019:3948
- RHSA-2019:3948
- https://bugs.python.org/issue35121
- https://bugs.python.org/issue35121
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- GLSA-202003-26
- GLSA-202003-26
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-5010
An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3520
- RHSA-2019:3520
- RHSA-2019:3725
- RHSA-2019:3725
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- GLSA-202003-26
- GLSA-202003-26
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758
Modified: 2024-11-21
CVE-2019-9636
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1282
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- 107400
- RHBA-2019:0763
- RHBA-2019:0764
- RHBA-2019:0959
- RHSA-2019:0710
- RHSA-2019:0765
- RHSA-2019:0806
- RHSA-2019:0902
- RHSA-2019:0981
- RHSA-2019:0997
- RHSA-2019:1467
- RHSA-2019:2980
- RHSA-2019:3170
- https://bugs.python.org/issue36216
- https://github.com/python/cpython/pull/12201
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-51f1e08207
- FEDORA-2019-57462fa10d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-a122fe704d
- FEDORA-2019-6baeb15da3
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-86f32cbab1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-243442e600
- FEDORA-2019-b06ec6159b
- FEDORA-2019-7d9f3cf3ce
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190517-0001/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:1273
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190517-0001/
- GLSA-202003-26
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- FEDORA-2019-7d9f3cf3ce
- FEDORA-2019-b06ec6159b
- FEDORA-2019-243442e600
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-86f32cbab1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-60a1defcd1
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-2b1f72899a
- FEDORA-2019-6baeb15da3
- FEDORA-2019-a122fe704d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-57462fa10d
- FEDORA-2019-51f1e08207
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://github.com/python/cpython/pull/12201
- https://bugs.python.org/issue36216
- RHSA-2019:3170
- RHSA-2019:2980
- RHSA-2019:1467
- RHSA-2019:0997
- RHSA-2019:0981
- RHSA-2019:0902
- RHSA-2019:0806
- RHSA-2019:0765
- RHSA-2019:0710
- RHBA-2019:0959
- RHBA-2019:0764
- RHBA-2019:0763
- 107400
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1282
Modified: 2024-11-21
CVE-2019-9674
Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
- openSUSE-SU-2020:0274
- openSUSE-SU-2020:0696
- https://bugs.python.org/issue36260
- https://bugs.python.org/issue36462
- https://github.com/python/cpython/blob/master/Lib/zipfile.py
- https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
- https://security.netapp.com/advisory/ntap-20200221-0003/
- USN-4428-1
- https://www.python.org/news/security/
- openSUSE-SU-2020:0274
- https://www.python.org/news/security/
- USN-4428-1
- https://security.netapp.com/advisory/ntap-20200221-0003/
- https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
- https://github.com/python/cpython/blob/master/Lib/zipfile.py
- https://bugs.python.org/issue36462
- https://bugs.python.org/issue36260
- openSUSE-SU-2020:0696
Modified: 2024-11-21
CVE-2021-28359
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
- https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
- [announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
- [announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
Closed bugs
pyvenv in python3 fails
Обновить версию python3