rpm package
almalinux/python38-six
pkg:rpm/almalinux/python38-six
Vulnerabilities (25)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-32681 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | May 26, 2023 | Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTT | ||
| CVE-2023-24329 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Feb 17, 2023 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | ||
| CVE-2022-45061 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Nov 9, 2022 | An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos | ||
| CVE-2020-10735 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Sep 9, 2022 | A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2 | ||
| CVE-2021-28861 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Aug 23, 2022 | Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation | ||
| CVE-2015-20107 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Apr 13, 2022 | In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati | ||
| CVE-2021-3733 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Mar 7, 2022 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafte | ||
| CVE-2021-3737 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Mar 4, 2022 | A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to syst | ||
| CVE-2022-0391 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Feb 9, 2022 | A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. Th | ||
| CVE-2021-43818 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Dec 13, 2021 | lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a s | ||
| CVE-2021-3572 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Nov 10, 2021 | A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip | ||
| CVE-2021-42771 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Oct 20, 2021 | Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. | ||
| CVE-2021-33503 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Jun 29, 2021 | An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t | ||
| CVE-2021-3426 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | May 20, 2021 | There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normal | ||
| CVE-2021-29921 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | May 6, 2021 | In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses. | ||
| CVE-2021-28957 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Mar 21, 2021 | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit thi | ||
| CVE-2021-23336 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Feb 15, 2021 | The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When | ||
| CVE-2020-14343 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Feb 9, 2021 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust | ||
| CVE-2020-28493 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Feb 1, 2021 | This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be miti | ||
| CVE-2021-3177 | — | < 1.12.0-10.module_el8.6.0+2778+cd494b30 | 1.12.0-10.module_el8.6.0+2778+cd494b30 | Jan 19, 2021 | Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occu |
- CVE-2023-32681May 26, 2023affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTT
- CVE-2023-24329Feb 17, 2023affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
- CVE-2022-45061Nov 9, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos
- CVE-2020-10735Sep 9, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2
- CVE-2021-28861Aug 23, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation
- CVE-2015-20107Apr 13, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati
- CVE-2021-3733Mar 7, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafte
- CVE-2021-3737Mar 4, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to syst
- CVE-2022-0391Feb 9, 2022affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. Th
- CVE-2021-43818Dec 13, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a s
- CVE-2021-3572Nov 10, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip
- CVE-2021-42771Oct 20, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
- CVE-2021-33503Jun 29, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t
- CVE-2021-3426May 20, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normal
- CVE-2021-29921May 6, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
- CVE-2021-28957Mar 21, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit thi
- CVE-2021-23336Feb 15, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When
- CVE-2020-14343Feb 9, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust
- CVE-2020-28493Feb 1, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be miti
- CVE-2021-3177Jan 19, 2021affected < 1.12.0-10.module_el8.6.0+2778+cd494b30fixed 1.12.0-10.module_el8.6.0+2778+cd494b30
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occu
Page 1 of 2