Anolis OS update for python3



| Updated: 2025-03-28
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3737
CVE-2021-4189
CWE-ID CWE-835
CWE-918
Exploitation vector Network
Public exploit N/A
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

python3-tkinter
Operating systems & Components / Operating system package or component

python3-test
Operating systems & Components / Operating system package or component

python3-libs
Operating systems & Components / Operating system package or component

python3-idle
Operating systems & Components / Operating system package or component

platform-python-devel
Operating systems & Components / Operating system package or component

platform-python-debug
Operating systems & Components / Operating system package or component

platform-python
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Infinite loop

EUVDB-ID: #VU59089

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-3737

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop. A remote attacker who controls a malicious server can force the client to enter an infinite loop on a 100 Continue response.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-tkinter: before 3.6.8-45.0.1

python3-test: before 3.6.8-45.0.1

python3-libs: before 3.6.8-45.0.1

python3-idle: before 3.6.8-45.0.1

platform-python-devel: before 3.6.8-45.0.1

platform-python-debug: before 3.6.8-45.0.1

platform-python: before 3.6.8-45.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2022:0429


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Server-Side Request Forgery (SSRF)

EUVDB-ID: #VU61681

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-4189

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in the FTP (File Transfer Protocol) client library when using it in PASV (passive) mode. A remote attacker can set up a malicious FTP server, trick the FTP client in Python into connecting back to a given IP address and port, which can lead to FTP client scanning ports which otherwise would not have been possible.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 8

python3-tkinter: before 3.6.8-45.0.1

python3-test: before 3.6.8-45.0.1

python3-libs: before 3.6.8-45.0.1

python3-idle: before 3.6.8-45.0.1

platform-python-devel: before 3.6.8-45.0.1

platform-python-debug: before 3.6.8-45.0.1

platform-python: before 3.6.8-45.0.1

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2022:0429


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###