Mageia 2024-0084: python python3 security update
Summary
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. (CVE-2022-45061) An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities. (CVE-2022-48565) An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest. (CVE-2022-48566) An issue in the urllib.parse component of Python before 3.11.4...
References
- https://bugs.mageia.org/show_bug.cgi?id=31000
- https://ubuntu.com/security/notices/USN-5888-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
- https://access.redhat.com/errata/RHSA-2023:2763
- https://access.redhat.com/errata/RHSA-2023:2860
- https://access.redhat.com/errata/RHSA-2023:3556
- https://access.redhat.com/errata/RHSA-2023:3591
- https://ubuntu.com/security/notices/USN-6139-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
Resolution
MGASA-2024-0084 - Updated python python3 packages fix security vulnerabilities
SRPMS
- 9/core/python-2.7.18-15.1.mga9
- 9/core/python3-3.10.11-1.1.mga9