Debian dla-3772 : idle-python3.7 - security update

high Nessus Plugin ID 192520

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3772 advisory.

- An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
(CVE-2023-6597)

- An issue was found in the CPython `zipfile` module affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to quoted-overlap zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive. (CVE-2024-0450)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the idle-python3.7 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/python3.7

https://security-tracker.debian.org/tracker/CVE-2023-6597

https://security-tracker.debian.org/tracker/CVE-2024-0450

https://packages.debian.org/source/buster/python3.7

Plugin Details

Severity: High

ID: 192520

File Name: debian_DLA-3772.nasl

Version: 1.0

Type: local

Agent: unix

Published: 3/24/2024

Updated: 3/24/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.1

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-6597

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libpython3.7-stdlib, p-cpe:/a:debian:debian_linux:python3.7, p-cpe:/a:debian:debian_linux:python3.7-dbg, p-cpe:/a:debian:debian_linux:python3.7-minimal, p-cpe:/a:debian:debian_linux:libpython3.7-dev, p-cpe:/a:debian:debian_linux:libpython3.7-minimal, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:idle-python3.7, p-cpe:/a:debian:debian_linux:python3.7-examples, p-cpe:/a:debian:debian_linux:python3.7-dev, p-cpe:/a:debian:debian_linux:libpython3.7, p-cpe:/a:debian:debian_linux:python3.7-doc, p-cpe:/a:debian:debian_linux:libpython3.7-dbg, p-cpe:/a:debian:debian_linux:libpython3.7-testsuite, p-cpe:/a:debian:debian_linux:python3.7-venv

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 3/24/2024

Vulnerability Publication Date: 3/19/2024

Reference Information

CVE: CVE-2023-6597, CVE-2024-0450