ALAS-2024-790


Amazon Linux 2023 Security Advisory: ALAS-2024-790
Advisory Release Date: 2024-12-12 20:19 Pacific
Advisory Updated Date: 2025-02-26 19:34 Pacific
Severity: Important

Issue Overview:

Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267. (CVE-2007-4559)

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. (CVE-2023-27043)

The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior. (CVE-2024-4032)

There is a MEDIUM severity vulnerability affecting CPython.

Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. (CVE-2024-6232)

There is a MEDIUM severity vulnerability affecting CPython.

The
email module didn't properly quote newlines for email headers when
serializing an email message allowing for header injection when an email
is serialized. (CVE-2024-6923)

There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.


When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value. (CVE-2024-7592)

There is a severity vulnerability affecting the CPython "zipfile"
module.

When iterating over names of entries in a zip archive (for example, methods
of "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected. (CVE-2024-8088)


Affected Packages:

python3.9


Issue Correction:
Run dnf update python3.9 --releasever 2023.6.20241212 to update your system.

New Packages:
aarch64:
    python3.9-debugsource-3.9.20-1.amzn2023.0.2.aarch64
    python3-3.9.20-1.amzn2023.0.2.aarch64
    python3-tkinter-3.9.20-1.amzn2023.0.2.aarch64
    python3-devel-3.9.20-1.amzn2023.0.2.aarch64
    python3-idle-3.9.20-1.amzn2023.0.2.aarch64
    python3-debug-3.9.20-1.amzn2023.0.2.aarch64
    python3.9-debuginfo-3.9.20-1.amzn2023.0.2.aarch64
    python3-libs-3.9.20-1.amzn2023.0.2.aarch64
    python3-test-3.9.20-1.amzn2023.0.2.aarch64

noarch:
    python-unversioned-command-3.9.20-1.amzn2023.0.2.noarch

src:
    python3.9-3.9.20-1.amzn2023.0.2.src

x86_64:
    python3-devel-3.9.20-1.amzn2023.0.2.x86_64
    python3.9-debugsource-3.9.20-1.amzn2023.0.2.x86_64
    python3-3.9.20-1.amzn2023.0.2.x86_64
    python3-tkinter-3.9.20-1.amzn2023.0.2.x86_64
    python3-debug-3.9.20-1.amzn2023.0.2.x86_64
    python3-idle-3.9.20-1.amzn2023.0.2.x86_64
    python3.9-debuginfo-3.9.20-1.amzn2023.0.2.x86_64
    python3-libs-3.9.20-1.amzn2023.0.2.x86_64
    python3-test-3.9.20-1.amzn2023.0.2.x86_64