vulnerability
SUSE: CVE-2021-3177: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jan 19, 2021 | Feb 10, 2021 | Oct 26, 2022 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jan 19, 2021
Added
Feb 10, 2021
Modified
Oct 26, 2022
Description
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Solution(s)
suse-upgrade-libpython2_7-1_0suse-upgrade-libpython2_7-1_0-32bitsuse-upgrade-libpython3_6m1_0suse-upgrade-libpython3_6m1_0-32bitsuse-upgrade-libpython3_9-1_0suse-upgrade-pythonsuse-upgrade-python-32bitsuse-upgrade-python-basesuse-upgrade-python-base-32bitsuse-upgrade-python-cursessuse-upgrade-python-demosuse-upgrade-python-develsuse-upgrade-python-docsuse-upgrade-python-doc-pdfsuse-upgrade-python-gdbmsuse-upgrade-python-idlesuse-upgrade-python-tksuse-upgrade-python-xmlsuse-upgrade-python3suse-upgrade-python3-32bitsuse-upgrade-python3-basesuse-upgrade-python3-base-32bitsuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-docsuse-upgrade-python3-doc-devhelpsuse-upgrade-python3-idlesuse-upgrade-python3-testsuitesuse-upgrade-python3-tksuse-upgrade-python3-toolssuse-upgrade-python36suse-upgrade-python36-basesuse-upgrade-python39suse-upgrade-python39-basesuse-upgrade-python39-cursessuse-upgrade-python39-dbmsuse-upgrade-python39-develsuse-upgrade-python39-idlesuse-upgrade-python39-tksuse-upgrade-python39-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.