vulnerability
SUSE: CVE-2023-41105: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | 2023-08-23 | 2023-10-04 | 2025-01-28 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2023-08-23
Added
2023-10-04
Modified
2025-01-28
Description
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
Solution(s)
suse-upgrade-libpython3_11-1_0suse-upgrade-libpython3_11-1_0-32bitsuse-upgrade-libpython3_4m1_0suse-upgrade-libpython3_4m1_0-32bitsuse-upgrade-python3suse-upgrade-python3-basesuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-tksuse-upgrade-python311suse-upgrade-python311-32bitsuse-upgrade-python311-basesuse-upgrade-python311-base-32bitsuse-upgrade-python311-cursessuse-upgrade-python311-dbmsuse-upgrade-python311-develsuse-upgrade-python311-docsuse-upgrade-python311-doc-devhelpsuse-upgrade-python311-idlesuse-upgrade-python311-testsuitesuse-upgrade-python311-tksuse-upgrade-python311-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.