MiracleLinux 8python39:3.9 和 python39-devel:3.9 (AXSA:2024-8498:01)

medium Nessus Plugin ID 292222

概要

遠端 MiracleLinux 主機缺少一個或多個安全性更新。

說明

遠端 MiracleLinux 8 主機已安裝受到 AXSA:2024-8498:01 公告中所提及的多個弱點影響的套件。

* python39:3.9/python39:python:tempfile.TemporaryDirectory 上的路徑遊走弱點 (CVE-2023-6597)
* python39:3.9/python39:python:zipfile 模組容易受到 zip 炸彈攻擊,進而導致拒絕服務 (CVE-2024-0450)
* python39:3.9/python-idna:透過特製輸入對 idna.encode() 進行資源消耗,進而引發潛在的 DoS (CVE-2024-3651)

Tenable 已直接從 MiracleLinux 安全性公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://tsn.miraclelinux.com/en/node/19682

Plugin 詳細資訊

嚴重性: Medium

ID: 292222

檔案名稱: miracle_linux_AXSA-2024-8498.nasl

版本: 1.1

類型: local

已發布: 2026/1/20

已更新: 2026/1/20

支援的感應器: Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 7.1

Vendor

Vendor Severity: High

CVSS v2

風險因素: High

基本分數: 7.8

時間性分數: 6.1

媒介: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS 評分資料來源: CVE-2024-3651

CVSS v3

風險因素: High

基本分數: 7.5

時間性分數: 6.7

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

風險因素: Medium

Base Score: 6.9

Threat Score: 5.5

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

弱點資訊

CPE: cpe:/o:miracle:linux:8, p-cpe:/a:miracle:linux:python39-six, p-cpe:/a:miracle:linux:python39-pyyaml, p-cpe:/a:miracle:linux:python39-cython, p-cpe:/a:miracle:linux:python39-requests, p-cpe:/a:miracle:linux:python39-idle, p-cpe:/a:miracle:linux:pyyaml-debugsource, p-cpe:/a:miracle:linux:python-cryptography-debugsource, p-cpe:/a:miracle:linux:python39-devel, p-cpe:/a:miracle:linux:cython-debugsource, p-cpe:/a:miracle:linux:scipy-debugsource, p-cpe:/a:miracle:linux:python39, p-cpe:/a:miracle:linux:python39-psycopg2-doc, p-cpe:/a:miracle:linux:python39-pyparsing, p-cpe:/a:miracle:linux:python39-more-itertools, p-cpe:/a:miracle:linux:python39-setuptools-wheel, p-cpe:/a:miracle:linux:python39-pluggy, p-cpe:/a:miracle:linux:python39-lxml, p-cpe:/a:miracle:linux:python39-numpy, p-cpe:/a:miracle:linux:python39-pybind11-devel, p-cpe:/a:miracle:linux:python39-numpy-f2py, p-cpe:/a:miracle:linux:python39-urllib3, p-cpe:/a:miracle:linux:python39-py, p-cpe:/a:miracle:linux:python39-packaging, p-cpe:/a:miracle:linux:python39-wheel-wheel, p-cpe:/a:miracle:linux:python39-tkinter, p-cpe:/a:miracle:linux:python39-libs, p-cpe:/a:miracle:linux:python39-psycopg2-tests, p-cpe:/a:miracle:linux:python39-wheel, p-cpe:/a:miracle:linux:python39-setuptools, p-cpe:/a:miracle:linux:python39-cffi, p-cpe:/a:miracle:linux:python-psycopg2-debugsource, p-cpe:/a:miracle:linux:python39-scipy, p-cpe:/a:miracle:linux:python39-pysocks, p-cpe:/a:miracle:linux:python39-toml, p-cpe:/a:miracle:linux:python39-idna, p-cpe:/a:miracle:linux:python39-mod_wsgi, p-cpe:/a:miracle:linux:python39-pymysql, p-cpe:/a:miracle:linux:python39-psycopg2, p-cpe:/a:miracle:linux:python39-pip-wheel, p-cpe:/a:miracle:linux:python39-numpy-doc, p-cpe:/a:miracle:linux:python-lxml-debugsource, p-cpe:/a:miracle:linux:python39-iniconfig, p-cpe:/a:miracle:linux:python39-wcwidth, p-cpe:/a:miracle:linux:numpy-debugsource, p-cpe:/a:miracle:linux:python39-chardet, p-cpe:/a:miracle:linux:python39-pybind11, p-cpe:/a:miracle:linux:python39-pycparser, p-cpe:/a:miracle:linux:python39-pytest, p-cpe:/a:miracle:linux:python-cffi-debugsource, p-cpe:/a:miracle:linux:python39-rpm-macros, p-cpe:/a:miracle:linux:python39-test, p-cpe:/a:miracle:linux:python39-psutil, p-cpe:/a:miracle:linux:python39-attrs, p-cpe:/a:miracle:linux:python39-pip, p-cpe:/a:miracle:linux:python39-ply, p-cpe:/a:miracle:linux:python39-debug, p-cpe:/a:miracle:linux:python39-debugsource, p-cpe:/a:miracle:linux:python-psutil-debugsource, p-cpe:/a:miracle:linux:python39-cryptography

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2024/9/11

弱點發布日期: 2024/3/19

參考資訊

CVE: CVE-2023-6597, CVE-2024-0450, CVE-2024-3651