CVE-2021-3572 Affecting python39 package, versions <0:3.9.6-2.module+el8.5.0+20364+c7fe1181


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating

    Threat Intelligence

    EPSS
    0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ORACLE8-PYTHON39-2588835
  • published 10 Apr 2022
  • disclosed 10 Nov 2021

How to fix?

Upgrade Oracle:8 python39 to version 0:3.9.6-2.module+el8.5.0+20364+c7fe1181 or higher.
This issue was patched in ELSA-2021-4160.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python39 package and not the python39 package as distributed by Oracle. See How to fix? for Oracle:8 relevant fixed versions and status.

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.

CVSS Scores

version 3.1
Expand this section

NVD

5.7 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

SUSE

4.5 medium
Expand this section

Red Hat

4.5 medium