paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
{ "binaries": [ { "binary_name": "python-renderpm", "binary_version": "3.3.0-1ubuntu0.1" }, { "binary_name": "python-reportlab", "binary_version": "3.3.0-1ubuntu0.1" }, { "binary_name": "python-reportlab-accel", "binary_version": "3.3.0-1ubuntu0.1" }, { "binary_name": "python3-renderpm", "binary_version": "3.3.0-1ubuntu0.1" }, { "binary_name": "python3-reportlab", "binary_version": "3.3.0-1ubuntu0.1" }, { "binary_name": "python3-reportlab-accel", "binary_version": "3.3.0-1ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "python-renderpm", "binary_version": "3.4.0-3ubuntu0.1" }, { "binary_name": "python-reportlab", "binary_version": "3.4.0-3ubuntu0.1" }, { "binary_name": "python-reportlab-accel", "binary_version": "3.4.0-3ubuntu0.1" }, { "binary_name": "python3-renderpm", "binary_version": "3.4.0-3ubuntu0.1" }, { "binary_name": "python3-reportlab", "binary_version": "3.4.0-3ubuntu0.1" }, { "binary_name": "python3-reportlab-accel", "binary_version": "3.4.0-3ubuntu0.1" } ] }