OESA-2024-2117

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2117
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2117.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2117
Upstream
Published
2024-09-06T11:09:05Z
Modified
2025-08-12T05:48:00.895886Z
Summary
python3 security update
Details

Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing. There are interfaces to many system calls and libraries, as well as to various windowing systems. New built-in modules are easily written in C or C++ (or other languages, depending on the chosen implementation). Python is also usable as an extension language for applications written in other languages that need easy-to-use scripting or automation interfaces.

Security Fix(es):

There is a MEDIUM severity vulnerability affecting CPython.

The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.(CVE-2024-6923)

There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module.

When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.(CVE-2024-7592)

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.

When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.(CVE-2024-8088)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / python3

Package

Name
python3
Purl
pkg:rpm/openEuler/python3&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.9-31.oe2203sp1

Ecosystem specific

{
    "noarch": [
        "python3-help-3.9.9-31.oe2203sp1.noarch.rpm"
    ],
    "src": [
        "python3-3.9.9-31.oe2203sp1.src.rpm"
    ],
    "x86_64": [
        "python3-3.9.9-31.oe2203sp1.x86_64.rpm",
        "python3-debug-3.9.9-31.oe2203sp1.x86_64.rpm",
        "python3-debuginfo-3.9.9-31.oe2203sp1.x86_64.rpm",
        "python3-debugsource-3.9.9-31.oe2203sp1.x86_64.rpm",
        "python3-devel-3.9.9-31.oe2203sp1.x86_64.rpm",
        "python3-unversioned-command-3.9.9-31.oe2203sp1.x86_64.rpm"
    ],
    "aarch64": [
        "python3-3.9.9-31.oe2203sp1.aarch64.rpm",
        "python3-debug-3.9.9-31.oe2203sp1.aarch64.rpm",
        "python3-debuginfo-3.9.9-31.oe2203sp1.aarch64.rpm",
        "python3-debugsource-3.9.9-31.oe2203sp1.aarch64.rpm",
        "python3-devel-3.9.9-31.oe2203sp1.aarch64.rpm",
        "python3-unversioned-command-3.9.9-31.oe2203sp1.aarch64.rpm"
    ]
}