FreeBSD : Python -- multiple vulnerabilities (145ce848-1165-11ec-ac7e-08002789875b)

high Nessus Plugin ID 153205

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Python reports :

bpo-42278: Replaced usage of tempfile.mktemp() with TemporaryDirectory to avoid a potential race condition.

bpo-44394: Update the vendored copy of libexpat to 2.4.1 (from 2.2.8) to get the fix for the CVE-2013-0340 'Billion Laughs' vulnerability.
This copy is most used on Windows and macOS.

bpo-43124: Made the internal putcmd function in smtplib sanitize input for presence of \r and \n characters to avoid (unlikely) command injection.

bpo-36384: ipaddress module no longer accepts any leading zeros in IPv4 address strings. Leading zeros are ambiguous and interpreted as octal notation by some libraries. For example the legacy function socket.inet_aton() treats leading zeros as octal notation. glibc implementation of modern inet_pton() does not accept any leading zeros. For a while the ipaddress module used to accept ambiguous leading zeros.

Solution

Update the affected package.

See Also

https://docs.python.org/3.8/whatsnew/changelog.html#changelog

http://www.nessus.org/u?48a2893f

Plugin Details

Severity: High

ID: 153205

File Name: freebsd_pkg_145ce848116511ecac7e08002789875b.nasl

Version: 1.1

Type: local

Published: 9/10/2021

Updated: 9/10/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:python38, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 9/9/2021

Vulnerability Publication Date: 8/30/2021