ALASPYTHON3.8-2023-009

Related Vulnerabilities: CVE-2015-0010   CVE-2020-27619   CVE-2021-29921  

The CryptProtectMemory function in cng.sys (aka the Cryptography Next Generation driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1, when the CRYPTPROTECTMEMORY_SAME_LOGON option is used, does not check an impersonation token's level, which allows local users to bypass intended decryption restrictions by leveraging a service that (1) has a named-pipe planting vulnerability or (2) uses world-readable shared memory for encrypted data, aka "CNG Security Feature Bypass Vulnerability" or MSRC ID 20707. (CVE-2015-0010) In Python3's Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. (CVE-2020-27619) A flaw was found in python-ipaddress. Improper input validation of octal strings in stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. The highest threat from this vulnerability is to data integrity and system availability. (CVE-2021-29921)

ALASPYTHON3.8-2023-009


Amazon Linux 2 Security Advisory: ALASPYTHON3.8-2023-009
Advisory Release Date: 2023-08-21 21:00 Pacific
Advisory Updated Date: 2023-09-25 22:04 Pacific
Severity: Medium

Issue Overview:

The CryptProtectMemory function in cng.sys (aka the Cryptography Next Generation driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1, when the CRYPTPROTECTMEMORY_SAME_LOGON option is used, does not check an impersonation token's level, which allows local users to bypass intended decryption restrictions by leveraging a service that (1) has a named-pipe planting vulnerability or (2) uses world-readable shared memory for encrypted data, aka "CNG Security Feature Bypass Vulnerability" or MSRC ID 20707. (CVE-2015-0010)

In Python3's Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. (CVE-2020-27619)

A flaw was found in python-ipaddress. Improper input validation of octal strings in stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. The highest threat from this vulnerability is to data integrity and system availability. (CVE-2021-29921)


Affected Packages:

python38


Issue Correction:
Run yum update python38 to update your system.

New Packages:
aarch64:
    python38-3.8.5-1.amzn2.0.3.aarch64
    python38-libs-3.8.5-1.amzn2.0.3.aarch64
    python38-devel-3.8.5-1.amzn2.0.3.aarch64
    python38-tools-3.8.5-1.amzn2.0.3.aarch64
    python38-tkinter-3.8.5-1.amzn2.0.3.aarch64
    python38-test-3.8.5-1.amzn2.0.3.aarch64
    python38-debug-3.8.5-1.amzn2.0.3.aarch64
    python38-debuginfo-3.8.5-1.amzn2.0.3.aarch64

src:
    python38-3.8.5-1.amzn2.0.3.src

x86_64:
    python38-3.8.5-1.amzn2.0.3.x86_64
    python38-libs-3.8.5-1.amzn2.0.3.x86_64
    python38-devel-3.8.5-1.amzn2.0.3.x86_64
    python38-tools-3.8.5-1.amzn2.0.3.x86_64
    python38-tkinter-3.8.5-1.amzn2.0.3.x86_64
    python38-test-3.8.5-1.amzn2.0.3.x86_64
    python38-debug-3.8.5-1.amzn2.0.3.x86_64
    python38-debuginfo-3.8.5-1.amzn2.0.3.x86_64