CVE编号
CVE-2021-3733利用情况
暂无补丁情况
官方补丁披露时间
2021-11-11漏洞描述
SUSE Linux Enterprise Server是德国SUSE公司的一套企业服务器版Linux操作系统。 SUSE Linux Enterprise Server 中存在代码问题漏洞,该漏洞源于产品中为能正确处理RCFS。攻击者可通过该漏洞导致拒绝服务。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://www.python.org/downloads/
参考链接 |
|
---|---|
https://bugs.python.org/issue43075 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1995234 | |
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb | |
https://github.com/python/cpython/pull/24391 | |
https://packetstormsecurity.com/files/164741/Red-Hat-Security-Advisory-2021-4... | |
https://packetstormsecurity.com/files/164859/Red-Hat-Security-Advisory-2021-4... | |
https://security.netapp.com/advisory/ntap-20220407-0001/ | |
https://ubuntu.com/security/CVE-2021-3733 | |
https://www.auscert.org.au/bulletins/ESB-2021.3138 | |
https://www.auscert.org.au/bulletins/ESB-2021.3519 | |
https://www.auscert.org.au/bulletins/ESB-2021.3589 | |
https://www.auscert.org.au/bulletins/ESB-2021.3659 | |
https://www.auscert.org.au/bulletins/ESB-2021.3813 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | python | python | 3.10.0 | - | |||||
运行在以下环境 | |||||||||
应用 | python | python | 3.6.0 | - | |||||
运行在以下环境 | |||||||||
应用 | python | python | 3.7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | python | python | 3.8.0 | - | |||||
运行在以下环境 | |||||||||
应用 | python | python | 3.9.0 | - | |||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | python3.9 | * |
Up to (excluding) 3.6.8-39.1.al8 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | python3.9 | * |
Up to (excluding) 3.6.8-39.el8_4 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | python3.9 | * |
Up to (excluding) 3.7.3-2+deb10u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | python3.9 | * |
Up to (excluding) 3.9.2-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | python3.9 | * |
Up to (excluding) 3.5.3-1+deb9u5 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_33 | python3.9 | * |
Up to (excluding) 2.7.18-15.fc33 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_34 | python3.9 | * |
Up to (excluding) 2.7.18-15.fc34 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_35 | python3.9 | * |
Up to (excluding) 2.7.18-15.fc35 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_36 | python3.9 | * |
Up to (excluding) 2.7.18-15.fc36 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | python3.9 | * |
Up to (excluding) 2.7.18-lp152.3.21.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | python3.9 | * |
Up to (excluding) 2.7.18-33.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | python3.9 | * |
Up to (excluding) 3.6.8-39.0.1.el8_4 |
|||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | python3.9 | * |
Up to (excluding) 3.6.8-39.el8_4 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | python3.9 | * |
Up to (excluding) 3.6.15-11.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...