Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 938432 (CVE-2024-7592, CVE-2024-8088) - <dev-lang/python-{3.8.19_p4,3.9.19_p5,3.10.14_p3,3.11.9_p2,3.12.4_p4,3.12.5_p1,3.13.0_rc1_p2}, <dev-python/pypy3_{9,10}-7.3.16_p2: Multiple vulnerabilities
Summary: <dev-lang/python-{3.8.19_p4,3.9.19_p5,3.10.14_p3,3.11.9_p2,3.12.4_p4,3.12.5_p...
Status: RESOLVED FIXED
Alias: CVE-2024-7592, CVE-2024-8088
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: A3 [glsa+]
Keywords:
Depends on: 939207 939208 939209 939279 939283 939863
Blocks:
  Show dependency tree
 
Reported: 2024-08-24 06:47 UTC by Michał Górny
Modified: 2025-06-12 08:54 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2024-08-24 06:47:50 UTC
[CVE-2024-7592] Quadratic complexity parsing cookies with backslashes

There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.

When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value.


[CVE-2024-8088] Infinite loop when iterating over zip archive entry names

There is a HIGH severity vulnerability affecting the CPython "zipfile"
module.

When iterating over names of entries in a zip archive (for example, methods
of "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2024-10-05 08:28:48 UTC
cleanup done
Comment 2 Larry the Git Cow gentoo-dev 2025-06-12 08:52:47 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=10ededaefbfe7287f3b9211907eacaeb27868e8a

commit 10ededaefbfe7287f3b9211907eacaeb27868e8a
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2025-06-12 08:52:28 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2025-06-12 08:52:39 +0000

    [ GLSA 202506-07 ] Python, PyPy: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/929045
    Bug: https://bugs.gentoo.org/937124
    Bug: https://bugs.gentoo.org/938432
    Bug: https://bugs.gentoo.org/939206
    Bug: https://bugs.gentoo.org/945845
    Bug: https://bugs.gentoo.org/953493
    Bug: https://bugs.gentoo.org/956682
    Bug: https://bugs.gentoo.org/957088
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202506-07.xml | 83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 83 insertions(+)