An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1388 Final 1.0 1.0 2024-04-12 Initial 2024-04-12 2024-04-12 openEuler SA Tool V1.0 2024-04-12 python-pymongo security update An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3. The PyMongo distribution contains tools for interacting with \ MongoDB database from Python.\ PyMongo supports MongoDB 2.6, 3.0, 3.2, 3.4, 3.6, 4.0 and 4.2. Security Fix(es): Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.(CVE-2024-21506) An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium python-pymongo https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1388 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-21506 https://nvd.nist.gov/vuln/detail/CVE-2024-21506 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 openEuler-22.03-LTS-SP3 python3-bson-3.9.0-6.oe1.aarch64.rpm python2-bson-3.9.0-6.oe1.aarch64.rpm python-pymongo-debugsource-3.9.0-6.oe1.aarch64.rpm python3-pymongo-3.9.0-6.oe1.aarch64.rpm python2-pymongo-3.9.0-6.oe1.aarch64.rpm python2-pymongo-gridfs-3.9.0-6.oe1.aarch64.rpm python3-pymongo-gridfs-3.9.0-6.oe1.aarch64.rpm python-pymongo-debuginfo-3.9.0-6.oe1.aarch64.rpm python3-pymongo-3.9.0-6.oe2003sp4.aarch64.rpm python3-pymongo-gridfs-3.9.0-6.oe2003sp4.aarch64.rpm python2-pymongo-gridfs-3.9.0-6.oe2003sp4.aarch64.rpm python-pymongo-debuginfo-3.9.0-6.oe2003sp4.aarch64.rpm python2-bson-3.9.0-6.oe2003sp4.aarch64.rpm python2-pymongo-3.9.0-6.oe2003sp4.aarch64.rpm python3-bson-3.9.0-6.oe2003sp4.aarch64.rpm python-pymongo-debugsource-3.9.0-6.oe2003sp4.aarch64.rpm python-pymongo-debugsource-3.11.3-3.oe2203.aarch64.rpm python3-bson-3.11.3-3.oe2203.aarch64.rpm python3-pymongo-3.11.3-3.oe2203.aarch64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203.aarch64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203.aarch64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp1.aarch64.rpm python3-pymongo-3.11.3-3.oe2203sp1.aarch64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp1.aarch64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp1.aarch64.rpm python3-bson-3.11.3-3.oe2203sp1.aarch64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp2.aarch64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp2.aarch64.rpm python3-bson-3.11.3-3.oe2203sp2.aarch64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp2.aarch64.rpm python3-pymongo-3.11.3-3.oe2203sp2.aarch64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp3.aarch64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp3.aarch64.rpm python3-bson-3.11.3-3.oe2203sp3.aarch64.rpm python3-pymongo-3.11.3-3.oe2203sp3.aarch64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp3.aarch64.rpm python-pymongo-help-3.9.0-6.oe1.noarch.rpm python-pymongo-help-3.9.0-6.oe2003sp4.noarch.rpm python-pymongo-help-3.11.3-3.oe2203.noarch.rpm python-pymongo-help-3.11.3-3.oe2203sp1.noarch.rpm python-pymongo-help-3.11.3-3.oe2203sp2.noarch.rpm python-pymongo-help-3.11.3-3.oe2203sp3.noarch.rpm python-pymongo-3.9.0-6.oe1.src.rpm python-pymongo-3.9.0-6.oe2003sp4.src.rpm python-pymongo-3.11.3-3.oe2203.src.rpm python-pymongo-3.11.3-3.oe2203sp1.src.rpm python-pymongo-3.11.3-3.oe2203sp2.src.rpm python-pymongo-3.11.3-3.oe2203sp3.src.rpm python3-pymongo-3.9.0-6.oe1.x86_64.rpm python2-pymongo-gridfs-3.9.0-6.oe1.x86_64.rpm python2-pymongo-3.9.0-6.oe1.x86_64.rpm python2-bson-3.9.0-6.oe1.x86_64.rpm python-pymongo-debuginfo-3.9.0-6.oe1.x86_64.rpm python3-pymongo-gridfs-3.9.0-6.oe1.x86_64.rpm python-pymongo-debugsource-3.9.0-6.oe1.x86_64.rpm python3-bson-3.9.0-6.oe1.x86_64.rpm python2-bson-3.9.0-6.oe2003sp4.x86_64.rpm python3-pymongo-gridfs-3.9.0-6.oe2003sp4.x86_64.rpm python2-pymongo-gridfs-3.9.0-6.oe2003sp4.x86_64.rpm python3-bson-3.9.0-6.oe2003sp4.x86_64.rpm python-pymongo-debuginfo-3.9.0-6.oe2003sp4.x86_64.rpm python3-pymongo-3.9.0-6.oe2003sp4.x86_64.rpm python-pymongo-debugsource-3.9.0-6.oe2003sp4.x86_64.rpm python2-pymongo-3.9.0-6.oe2003sp4.x86_64.rpm python3-bson-3.11.3-3.oe2203.x86_64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203.x86_64.rpm python3-pymongo-3.11.3-3.oe2203.x86_64.rpm python-pymongo-debugsource-3.11.3-3.oe2203.x86_64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203.x86_64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp1.x86_64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp1.x86_64.rpm python3-pymongo-3.11.3-3.oe2203sp1.x86_64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp1.x86_64.rpm python3-bson-3.11.3-3.oe2203sp1.x86_64.rpm python3-bson-3.11.3-3.oe2203sp2.x86_64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp2.x86_64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp2.x86_64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp2.x86_64.rpm python3-pymongo-3.11.3-3.oe2203sp2.x86_64.rpm python3-pymongo-gridfs-3.11.3-3.oe2203sp3.x86_64.rpm python3-pymongo-3.11.3-3.oe2203sp3.x86_64.rpm python-pymongo-debuginfo-3.11.3-3.oe2203sp3.x86_64.rpm python-pymongo-debugsource-3.11.3-3.oe2203sp3.x86_64.rpm python3-bson-3.11.3-3.oe2203sp3.x86_64.rpm Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte. 2024-04-12 CVE-2024-21506 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 openEuler-22.03-LTS-SP3 Medium 5.2 AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L python-pymongo security update 2024-04-12 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1388