An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1388
Final
1.0
1.0
2024-04-12
Initial
2024-04-12
2024-04-12
openEuler SA Tool V1.0
2024-04-12
python-pymongo security update
An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.
The PyMongo distribution contains tools for interacting with \ MongoDB database from Python.\ PyMongo supports MongoDB 2.6, 3.0, 3.2, 3.4, 3.6, 4.0 and 4.2.
Security Fix(es):
Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.(CVE-2024-21506)
An update for python-pymongo is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
python-pymongo
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1388
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-21506
https://nvd.nist.gov/vuln/detail/CVE-2024-21506
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
openEuler-22.03-LTS-SP3
python3-bson-3.9.0-6.oe1.aarch64.rpm
python2-bson-3.9.0-6.oe1.aarch64.rpm
python-pymongo-debugsource-3.9.0-6.oe1.aarch64.rpm
python3-pymongo-3.9.0-6.oe1.aarch64.rpm
python2-pymongo-3.9.0-6.oe1.aarch64.rpm
python2-pymongo-gridfs-3.9.0-6.oe1.aarch64.rpm
python3-pymongo-gridfs-3.9.0-6.oe1.aarch64.rpm
python-pymongo-debuginfo-3.9.0-6.oe1.aarch64.rpm
python3-pymongo-3.9.0-6.oe2003sp4.aarch64.rpm
python3-pymongo-gridfs-3.9.0-6.oe2003sp4.aarch64.rpm
python2-pymongo-gridfs-3.9.0-6.oe2003sp4.aarch64.rpm
python-pymongo-debuginfo-3.9.0-6.oe2003sp4.aarch64.rpm
python2-bson-3.9.0-6.oe2003sp4.aarch64.rpm
python2-pymongo-3.9.0-6.oe2003sp4.aarch64.rpm
python3-bson-3.9.0-6.oe2003sp4.aarch64.rpm
python-pymongo-debugsource-3.9.0-6.oe2003sp4.aarch64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203.aarch64.rpm
python3-bson-3.11.3-3.oe2203.aarch64.rpm
python3-pymongo-3.11.3-3.oe2203.aarch64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203.aarch64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203.aarch64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp1.aarch64.rpm
python3-pymongo-3.11.3-3.oe2203sp1.aarch64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp1.aarch64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp1.aarch64.rpm
python3-bson-3.11.3-3.oe2203sp1.aarch64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp2.aarch64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp2.aarch64.rpm
python3-bson-3.11.3-3.oe2203sp2.aarch64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp2.aarch64.rpm
python3-pymongo-3.11.3-3.oe2203sp2.aarch64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp3.aarch64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp3.aarch64.rpm
python3-bson-3.11.3-3.oe2203sp3.aarch64.rpm
python3-pymongo-3.11.3-3.oe2203sp3.aarch64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp3.aarch64.rpm
python-pymongo-help-3.9.0-6.oe1.noarch.rpm
python-pymongo-help-3.9.0-6.oe2003sp4.noarch.rpm
python-pymongo-help-3.11.3-3.oe2203.noarch.rpm
python-pymongo-help-3.11.3-3.oe2203sp1.noarch.rpm
python-pymongo-help-3.11.3-3.oe2203sp2.noarch.rpm
python-pymongo-help-3.11.3-3.oe2203sp3.noarch.rpm
python-pymongo-3.9.0-6.oe1.src.rpm
python-pymongo-3.9.0-6.oe2003sp4.src.rpm
python-pymongo-3.11.3-3.oe2203.src.rpm
python-pymongo-3.11.3-3.oe2203sp1.src.rpm
python-pymongo-3.11.3-3.oe2203sp2.src.rpm
python-pymongo-3.11.3-3.oe2203sp3.src.rpm
python3-pymongo-3.9.0-6.oe1.x86_64.rpm
python2-pymongo-gridfs-3.9.0-6.oe1.x86_64.rpm
python2-pymongo-3.9.0-6.oe1.x86_64.rpm
python2-bson-3.9.0-6.oe1.x86_64.rpm
python-pymongo-debuginfo-3.9.0-6.oe1.x86_64.rpm
python3-pymongo-gridfs-3.9.0-6.oe1.x86_64.rpm
python-pymongo-debugsource-3.9.0-6.oe1.x86_64.rpm
python3-bson-3.9.0-6.oe1.x86_64.rpm
python2-bson-3.9.0-6.oe2003sp4.x86_64.rpm
python3-pymongo-gridfs-3.9.0-6.oe2003sp4.x86_64.rpm
python2-pymongo-gridfs-3.9.0-6.oe2003sp4.x86_64.rpm
python3-bson-3.9.0-6.oe2003sp4.x86_64.rpm
python-pymongo-debuginfo-3.9.0-6.oe2003sp4.x86_64.rpm
python3-pymongo-3.9.0-6.oe2003sp4.x86_64.rpm
python-pymongo-debugsource-3.9.0-6.oe2003sp4.x86_64.rpm
python2-pymongo-3.9.0-6.oe2003sp4.x86_64.rpm
python3-bson-3.11.3-3.oe2203.x86_64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203.x86_64.rpm
python3-pymongo-3.11.3-3.oe2203.x86_64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203.x86_64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203.x86_64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp1.x86_64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp1.x86_64.rpm
python3-pymongo-3.11.3-3.oe2203sp1.x86_64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp1.x86_64.rpm
python3-bson-3.11.3-3.oe2203sp1.x86_64.rpm
python3-bson-3.11.3-3.oe2203sp2.x86_64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp2.x86_64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp2.x86_64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp2.x86_64.rpm
python3-pymongo-3.11.3-3.oe2203sp2.x86_64.rpm
python3-pymongo-gridfs-3.11.3-3.oe2203sp3.x86_64.rpm
python3-pymongo-3.11.3-3.oe2203sp3.x86_64.rpm
python-pymongo-debuginfo-3.11.3-3.oe2203sp3.x86_64.rpm
python-pymongo-debugsource-3.11.3-3.oe2203sp3.x86_64.rpm
python3-bson-3.11.3-3.oe2203sp3.x86_64.rpm
Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.
2024-04-12
CVE-2024-21506
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
openEuler-22.03-LTS-SP3
Medium
5.2
AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
python-pymongo security update
2024-04-12
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1388