csaf2cusa/cusas/p/python-pymongo/python-pymongo-3.11.3-3_openEuler-SA-2024-1388.json
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

14 lines
1.1 KiB
JSON

{
"id": "openEuler-SA-2024-1388",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1388",
"title": "An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3",
"severity": "Moderate",
"description": "The PyMongo distribution contains tools for interacting with \\ MongoDB database from Python.\\ PyMongo supports MongoDB 2.6, 3.0, 3.2, 3.4, 3.6, 4.0 and 4.2.\r\n\r\nSecurity Fix(es):\r\n\r\nVersions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.(CVE-2024-21506)",
"cves": [
{
"id": "CVE-2024-21506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21506",
"severity": "Moderate"
}
]
}