ALT-PU-2024-6025-2
Closed vulnerabilities
BDU:2022-05975
Уязвимость функций extract и extractall модуля tarfile интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код
BDU:2023-00665
Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-04978
Уязвимость компонента urllib.parse интерпретатора языка программирования Python, позволяющая нарушителю обходить блокировки URL-адресов
BDU:2023-05002
Уязвимость класса SSLSocket интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-01-17
CVE-2007-4559
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
- [python-dev] 20070824 tarfile and directory traversal vulnerability
- [python-dev] 20070824 tarfile and directory traversal vulnerability
- [python-dev] 20070825 tarfile and directory traversal vulnerability
- [python-dev] 20070825 tarfile and directory traversal vulnerability
- 26623
- 26623
- ADV-2007-3022
- ADV-2007-3022
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- FEDORA-2024-ebb3c95344
- FEDORA-2024-ebb3c95344
- FEDORA-2024-d1f1084584
- FEDORA-2024-d1f1084584
- FEDORA-2024-46374d2703
- FEDORA-2024-46374d2703
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- GLSA-202309-06
- GLSA-202309-06
Modified: 2024-11-21
CVE-2022-4303
The WP Limit Login Attempts WordPress plugin through 2.6.4 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based restrictions on login forms.
Modified: 2025-02-13
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
- 1.1.1t git commit
- 1.1.1t git commit
- 3.0.8 git commit
- 3.0.8 git commit
- 1.0.2zg patch (premium)
- 1.0.2zg patch (premium)
- https://security.gentoo.org/glsa/202402-08
- https://security.gentoo.org/glsa/202402-08
- OpenSSL Advisory
- OpenSSL Advisory
Modified: 2024-11-21
CVE-2023-24329
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
- https://github.com/python/cpython/issues/102153
- https://github.com/python/cpython/issues/102153
- https://github.com/python/cpython/pull/99421
- https://github.com/python/cpython/pull/99421
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- FEDORA-2023-690e150a39
- FEDORA-2023-690e150a39
- FEDORA-2023-03599274db
- FEDORA-2023-03599274db
- FEDORA-2023-96aa33f0d3
- FEDORA-2023-96aa33f0d3
- FEDORA-2023-994ecd7dbc
- FEDORA-2023-994ecd7dbc
- FEDORA-2023-f52390b9d2
- FEDORA-2023-f52390b9d2
- FEDORA-2023-31888c4781
- FEDORA-2023-31888c4781
- FEDORA-2023-401947eb94
- FEDORA-2023-401947eb94
- FEDORA-2023-2b25dd2a11
- FEDORA-2023-2b25dd2a11
- FEDORA-2023-d8b0003ecd
- FEDORA-2023-d8b0003ecd
- FEDORA-2023-1092538441
- FEDORA-2023-1092538441
- FEDORA-2023-81bb8e3b99
- FEDORA-2023-81bb8e3b99
- FEDORA-2023-dd526ed2e4
- FEDORA-2023-dd526ed2e4
- FEDORA-2023-406c1c6ed7
- FEDORA-2023-406c1c6ed7
- FEDORA-2023-acdfd145f2
- FEDORA-2023-acdfd145f2
- FEDORA-2023-309cadedc6
- FEDORA-2023-309cadedc6
- FEDORA-2023-d294ef140e
- FEDORA-2023-d294ef140e
- FEDORA-2023-b854908745
- FEDORA-2023-b854908745
- FEDORA-2023-b3a3df39dd
- FEDORA-2023-b3a3df39dd
- FEDORA-2023-953c2607d8
- FEDORA-2023-953c2607d8
- FEDORA-2023-63c69aa712
- FEDORA-2023-63c69aa712
- FEDORA-2023-56cefa23df
- FEDORA-2023-56cefa23df
- https://pointernull.com/security/python-url-parse-problem.html
- https://pointernull.com/security/python-url-parse-problem.html
- https://security.netapp.com/advisory/ntap-20230324-0004/
- https://security.netapp.com/advisory/ntap-20230324-0004/
- VU#127587
- VU#127587
Modified: 2024-11-21
CVE-2023-40217
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3614-1] python3.7 security update
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3614-1] python3.7 security update
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://www.python.org/dev/security/
- https://www.python.org/dev/security/
Closed bugs
Обновление python3 для закрытия уязвимостей