vulnerability

SUSE: CVE-2021-3572: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Nov 10, 2021
Added
Dec 14, 2021
Modified
Oct 26, 2022

Description

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.

Solutions

suse-upgrade-libpython2_7-1_0suse-upgrade-libpython2_7-1_0-32bitsuse-upgrade-libpython3_4m1_0suse-upgrade-libpython3_4m1_0-32bitsuse-upgrade-libpython3_6m1_0suse-upgrade-libpython3_6m1_0-32bitsuse-upgrade-libpython3_9-1_0suse-upgrade-libpython3_9-1_0-32bitsuse-upgrade-pythonsuse-upgrade-python-32bitsuse-upgrade-python-basesuse-upgrade-python-base-32bitsuse-upgrade-python-cursessuse-upgrade-python-demosuse-upgrade-python-develsuse-upgrade-python-docsuse-upgrade-python-doc-pdfsuse-upgrade-python-gdbmsuse-upgrade-python-idlesuse-upgrade-python-pipsuse-upgrade-python-tksuse-upgrade-python-xmlsuse-upgrade-python2-pipsuse-upgrade-python2-pip-wheelsuse-upgrade-python3suse-upgrade-python3-basesuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-docsuse-upgrade-python3-doc-devhelpsuse-upgrade-python3-idlesuse-upgrade-python3-pipsuse-upgrade-python3-pip-wheelsuse-upgrade-python3-testsuitesuse-upgrade-python3-tksuse-upgrade-python3-toolssuse-upgrade-python36suse-upgrade-python36-basesuse-upgrade-python36-develsuse-upgrade-python36-pipsuse-upgrade-python39suse-upgrade-python39-32bitsuse-upgrade-python39-basesuse-upgrade-python39-base-32bitsuse-upgrade-python39-cursessuse-upgrade-python39-dbmsuse-upgrade-python39-develsuse-upgrade-python39-docsuse-upgrade-python39-doc-devhelpsuse-upgrade-python39-idlesuse-upgrade-python39-pipsuse-upgrade-python39-testsuitesuse-upgrade-python39-tksuse-upgrade-python39-tools
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.