SUSE 5032 Published by

A python310 security update has been released for openSUSE Leap 15.4/15.5 and SUSE Linux Enterprise 15 SP5.



SUSE-SU-2023:2884-1: important: Security update for python310


# Security update for python310

Announcement ID: SUSE-SU-2023:2884-1
Rating: important
References:

* #1203750
* #1208471
* #1211765

Cross-References:

* CVE-2007-4559
* CVE-2023-24329

CVSS scores:

* CVE-2007-4559 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-24329 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2023-24329 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Python 3 Module 15-SP4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves two vulnerabilities and has one fix can now be installed.

## Description:

This update for python310 fixes the following issues:

* Make marshalling of `set` and `frozenset` deterministic (bsc#1211765)

python310 was updated to 3.10.12:

* urllib.parse.urlsplit() now strips leading C0 control and space characters
following the specification for URLs defined by WHATWG in response to
CVE-2023-24329 (bsc#1208471).
* Fixed a security in flaw in uu.decode() that could allow for directory
traversal based on the input if no out_file was specified.
* Do not expose the local on-disk location in directory indexes produced by
http.client.SimpleHTTPRequestHandler.
* trace. **main** now uses io.open_code() for files to be executed instead of
raw open().
* CVE-2007-4559: The extraction methods in tarfile, and
shutil.unpack_archive(), have a new filter argument that allows limiting tar
features than may be surprising or dangerous, such as creating files outside
the destination directory. See Extraction filters for details (fixing
bsc#1203750).

## Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-2884=1

* Python 3 Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Python3-15-SP4-2023-2884=1

* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-2884=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python310-doc-devhelp-3.10.12-150400.4.30.1
* python310-testsuite-3.10.12-150400.4.30.1
* python310-core-debugsource-3.10.12-150400.4.30.1
* python310-debugsource-3.10.12-150400.4.30.1
* python310-testsuite-debuginfo-3.10.12-150400.4.30.1
* python310-devel-3.10.12-150400.4.30.1
* python310-debuginfo-3.10.12-150400.4.30.1
* python310-dbm-3.10.12-150400.4.30.1
* python310-base-debuginfo-3.10.12-150400.4.30.1
* python310-tools-3.10.12-150400.4.30.1
* libpython3_10-1_0-debuginfo-3.10.12-150400.4.30.1
* python310-curses-debuginfo-3.10.12-150400.4.30.1
* python310-idle-3.10.12-150400.4.30.1
* python310-3.10.12-150400.4.30.1
* python310-base-3.10.12-150400.4.30.1
* libpython3_10-1_0-3.10.12-150400.4.30.1
* python310-doc-3.10.12-150400.4.30.1
* python310-tk-debuginfo-3.10.12-150400.4.30.1
* python310-dbm-debuginfo-3.10.12-150400.4.30.1
* python310-tk-3.10.12-150400.4.30.1
* python310-curses-3.10.12-150400.4.30.1
* openSUSE Leap 15.5 (x86_64)
* python310-base-32bit-3.10.12-150400.4.30.1
* python310-base-32bit-debuginfo-3.10.12-150400.4.30.1
* libpython3_10-1_0-32bit-3.10.12-150400.4.30.1
* python310-32bit-debuginfo-3.10.12-150400.4.30.1
* libpython3_10-1_0-32bit-debuginfo-3.10.12-150400.4.30.1
* python310-32bit-3.10.12-150400.4.30.1
* Python 3 Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python310-debuginfo-3.10.12-150400.4.30.1
* libpython3_10-1_0-debuginfo-3.10.12-150400.4.30.1
* python310-curses-debuginfo-3.10.12-150400.4.30.1
* python310-curses-3.10.12-150400.4.30.1
* python310-idle-3.10.12-150400.4.30.1
* python310-dbm-3.10.12-150400.4.30.1
* python310-core-debugsource-3.10.12-150400.4.30.1
* python310-3.10.12-150400.4.30.1
* python310-debugsource-3.10.12-150400.4.30.1
* python310-base-debuginfo-3.10.12-150400.4.30.1
* python310-dbm-debuginfo-3.10.12-150400.4.30.1
* python310-tk-debuginfo-3.10.12-150400.4.30.1
* python310-tk-3.10.12-150400.4.30.1
* python310-tools-3.10.12-150400.4.30.1
* python310-base-3.10.12-150400.4.30.1
* libpython3_10-1_0-3.10.12-150400.4.30.1
* python310-devel-3.10.12-150400.4.30.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* python310-doc-devhelp-3.10.12-150400.4.30.1
* python310-testsuite-3.10.12-150400.4.30.1
* python310-core-debugsource-3.10.12-150400.4.30.1
* python310-debugsource-3.10.12-150400.4.30.1
* python310-testsuite-debuginfo-3.10.12-150400.4.30.1
* python310-devel-3.10.12-150400.4.30.1
* python310-debuginfo-3.10.12-150400.4.30.1
* python310-dbm-3.10.12-150400.4.30.1
* python310-base-debuginfo-3.10.12-150400.4.30.1
* python310-tools-3.10.12-150400.4.30.1
* libpython3_10-1_0-debuginfo-3.10.12-150400.4.30.1
* python310-curses-debuginfo-3.10.12-150400.4.30.1
* python310-idle-3.10.12-150400.4.30.1
* python310-3.10.12-150400.4.30.1
* python310-base-3.10.12-150400.4.30.1
* libpython3_10-1_0-3.10.12-150400.4.30.1
* python310-doc-3.10.12-150400.4.30.1
* python310-tk-debuginfo-3.10.12-150400.4.30.1
* python310-dbm-debuginfo-3.10.12-150400.4.30.1
* python310-tk-3.10.12-150400.4.30.1
* python310-curses-3.10.12-150400.4.30.1
* openSUSE Leap 15.4 (x86_64)
* python310-base-32bit-3.10.12-150400.4.30.1
* python310-base-32bit-debuginfo-3.10.12-150400.4.30.1
* libpython3_10-1_0-32bit-3.10.12-150400.4.30.1
* python310-32bit-debuginfo-3.10.12-150400.4.30.1
* libpython3_10-1_0-32bit-debuginfo-3.10.12-150400.4.30.1
* python310-32bit-3.10.12-150400.4.30.1

## References:

* https://www.suse.com/security/cve/CVE-2007-4559.html
* https://www.suse.com/security/cve/CVE-2023-24329.html
* https://bugzilla.suse.com/show_bug.cgi?id=1203750
* https://bugzilla.suse.com/show_bug.cgi?id=1208471
* https://bugzilla.suse.com/show_bug.cgi?id=1211765