VYPR

rpm package

suse/python3-core&distro=SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS

pkg:rpm/suse/python3-core&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS

Vulnerabilities (14)

  • CVE-2024-6232Sep 3, 2024
    affected < 3.6.15-150000.3.161.1fixed 3.6.15-150000.3.161.1

    There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

  • CVE-2024-7592Aug 19, 2024
    affected < 3.6.15-150000.3.155.2fixed 3.6.15-150000.3.155.2

    There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in

  • CVE-2024-6923MedAug 1, 2024
    affected < 3.6.15-150000.3.155.2fixed 3.6.15-150000.3.155.2

    There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.

  • CVE-2024-0450MedMar 19, 2024
    affected < 3.6.15-150000.3.147.1fixed 3.6.15-150000.3.147.1

    An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed

  • CVE-2023-6597HigMar 19, 2024
    affected < 3.6.15-150000.3.141.1fixed 3.6.15-150000.3.141.1

    An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which c

  • CVE-2023-52425Feb 4, 2024
    affected < 3.6.15-150000.3.147.1fixed 3.6.15-150000.3.147.1

    libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

  • CVE-2023-40217Aug 25, 2023
    affected < 3.6.15-150000.3.135.1fixed 3.6.15-150000.3.135.1

    An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buf

  • CVE-2023-24329Feb 17, 2023
    affected < 3.6.15-150000.3.124.1fixed 3.6.15-150000.3.124.1

    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

  • CVE-2022-45061Nov 9, 2022
    affected < 3.6.15-150000.3.119.1fixed 3.6.15-150000.3.119.1

    An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos

  • CVE-2022-37454Oct 21, 2022
    affected < 3.6.15-150000.3.116.1fixed 3.6.15-150000.3.116.1

    The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

  • CVE-2020-10735Sep 9, 2022
    affected < 3.6.15-150000.3.116.1fixed 3.6.15-150000.3.116.1

    A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2

  • CVE-2021-28861Aug 23, 2022
    affected < 3.6.15-150000.3.109.1fixed 3.6.15-150000.3.109.1

    Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation

  • CVE-2015-20107Apr 13, 2022
    affected < 3.6.15-150000.3.106.1fixed 3.6.15-150000.3.106.1

    In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati

  • CVE-2021-3572Nov 10, 2021
    affected < 3.6.15-150000.3.106.1fixed 3.6.15-150000.3.106.1

    A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip