python-2.7.5-94.0.1.el7.AXS7
エラータID: AXSA:2023-6577:43
Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC).
Security Fix(es):
* python: TLS handshake bypass (CVE-2023-40217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-40217
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Update packages.
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
N/A
SRPMS
- python-2.7.5-94.0.1.el7.AXS7.src.rpm
MD5: bf8d02ede1c364fae396dc74a8c4b00f
SHA-256: 1ae400d8609536dbc9c0c1c688f7ef5cea32a83760554c9040ee5c6e337447ca
Size: 10.27 MB
Asianux Server 7 for x86_64
- python-2.7.5-94.0.1.el7.AXS7.x86_64.rpm
MD5: def887c869641d240b6031847a6e8a76
SHA-256: 62ee026aac41fa24f4bd103fc012f715db7c3c8a749a61c4573eca1a67bf09a5
Size: 95.87 kB - python-devel-2.7.5-94.0.1.el7.AXS7.x86_64.rpm
MD5: b3be7ad94e56c5cd6a80b2eb7e4204f6
SHA-256: 932baa6a219beb7a1a221619baf61d9afb544cd98967ec4cbe9ee3c39159df0a
Size: 398.51 kB - python-libs-2.7.5-94.0.1.el7.AXS7.i686.rpm
MD5: 34bcce0b214f57af78b9bc7a06ab6f1f
SHA-256: e1e7484901e99adf37e44dde8adc318e3fb7322f374136b315bde3150fa20a43
Size: 5.60 MB - python-libs-2.7.5-94.0.1.el7.AXS7.x86_64.rpm
MD5: f36ac623fb83872f014e7362594bc0a1
SHA-256: b356be039ff98de9ff73a69dd43bce13045146becee98f1d9835bf6325f398e6
Size: 5.65 MB