{"id":"MGASA-2021-0435","summary":"Updated python3 packages fix security vulnerability","details":"bpo-42278: Replaced usage of tempfile.mktemp() with TemporaryDirectory to\navoid a potential race condition.\n\nbpo-44394: Update the vendored copy of libexpat to 2.4.1 (from 2.2.8) to\nget the fix for the CVE-2013-0340 “Billion Laughs” vulnerability. This\ncopy is most used on Windows and macOS.\n\nbpo-43124: Made the internal putcmd function in smtplib sanitize input for\npresence of \\r and \\n characters to avoid (unlikely) command injection.\n\nbpo-36384: ipaddress module no longer accepts any leading zeros in IPv4\naddress strings. Leading zeros are ambiguous and interpreted as octal\nnotation by some libraries. For example the legacy function\nsocket.inet_aton() treats leading zeros as octal notation. glibc\nimplementation of modern inet_pton() does not accept any leading zeros.\nFor a while the ipaddress module used to accept ambiguous leading zeros.\n\nIt was discovered that Python incorrectly handled certain RFCs.\nAn attacker could possibly use this issue to cause a denial of service.\nThis issue only affected Ubuntu 16.04 ESM. (CVE-2021-3733)\n\nIt was discovered that Python incorrectly handled certain\nserver responses. An attacker could possibly use this issue to\ncause a denial of service. (CVE-2021-3737)\n","modified":"2026-04-16T04:44:34.119867001Z","published":"2021-09-23T04:49:29Z","upstream":["CVE-2021-3733","CVE-2021-3737"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0435.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29450"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/K7QDAEX4PWRYYEIXRF5QDGKJULJO6HKD/"},{"type":"WEB","url":"https://docs.python.org/release/3.8.12/whatsnew/changelog.html"}],"affected":[{"package":{"name":"python3","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/python3?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.8.12-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0435.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}