9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
github.com/python/cpython is vulnerable to buffer overflow. The vulnerability exists because of the use sprintf which does not sanitize the input and its boundaries.
bugs.python.org/issue42938
github.com/python/cpython/pull/24239
lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
lists.debian.org/debian-lts-announce/2021/04/msg00005.html
lists.debian.org/debian-lts-announce/2022/02/msg00013.html
lists.fedoraproject.org/archives/list/[email protected]/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
lists.fedoraproject.org/archives/list/[email protected]/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
lists.fedoraproject.org/archives/list/[email protected]/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
lists.fedoraproject.org/archives/list/[email protected]/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
lists.fedoraproject.org/archives/list/[email protected]/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
lists.fedoraproject.org/archives/list/[email protected]/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
lists.fedoraproject.org/archives/list/[email protected]/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
lists.fedoraproject.org/archives/list/[email protected]/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
lists.fedoraproject.org/archives/list/[email protected]/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
lists.fedoraproject.org/archives/list/[email protected]/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
lists.fedoraproject.org/archives/list/[email protected]/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
lists.fedoraproject.org/archives/list/[email protected]/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
lists.fedoraproject.org/archives/list/[email protected]/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
lists.fedoraproject.org/archives/list/[email protected]/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
news.ycombinator.com/item?id=26185005
python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
security-tracker.debian.org/tracker/CVE-2021-3177
security.gentoo.org/glsa/202101-18
security.netapp.com/advisory/ntap-20210226-0003/
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P