Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-19450 (GCVE-0-2019-19450)
Vulnerability from cvelistv5
Published
2023-09-20 00:00
Modified
2024-08-05 02:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:16:47.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "tags": [ "x_transferred" ], "url": "https://pastebin.com/5MicRrr4" }, { "name": "[debian-lts-announce] 20230929 [SECURITY] [DLA 3590-1] python-reportlab security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "name": "FEDORA-2024-dc844d0669", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "name": "FEDORA-2024-6ec4e78241", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-28T04:06:15.437021", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "url": "https://pastebin.com/5MicRrr4" }, { "name": "[debian-lts-announce] 20230929 [SECURITY] [DLA 3590-1] python-reportlab security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "name": "FEDORA-2024-dc844d0669", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "name": "FEDORA-2024-6ec4e78241", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19450", "datePublished": "2023-09-20T00:00:00", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-08-05T02:16:47.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-19450\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-09-20T14:15:12.310\",\"lastModified\":\"2024-11-21T04:34:45.463\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\\\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626.\"},{\"lang\":\"es\",\"value\":\"paraparser en ReportLab anterior a 3.5.31 permite la ejecuci\u00f3n remota de c\u00f3digo porque start_unichar en paraparser.py eval\u00faa la entrada de un usuario que no es de confianza en un elemento unichar en un documento XML manipulado con \u0027\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-91\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.31\",\"matchCriteriaId\":\"75D6540D-C28F-433B-8166-9FEDFD74E7E2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://pastebin.com/5MicRrr4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://pastebin.com/5MicRrr4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2023:4048-1
Vulnerability from csaf_suse
Published
2023-10-11 09:28
Modified
2023-10-11 09:28
Summary
Security update for python-reportlab
Notes
Title of the patch
Security update for python-reportlab
Description of the patch
This update for python-reportlab fixes the following issues:
- CVE-2019-19450: Fixed an issue which allowed remote code execution via start_unichar in paraparser.py evaluating untrusted user input. (bsc#1215560)
Patchnames
SUSE-2023-4048,SUSE-SLE-WE-12-SP5-2023-4048
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-reportlab", "title": "Title of the patch" }, { "category": "description", "text": "This update for python-reportlab fixes the following issues:\n\n- CVE-2019-19450: Fixed an issue which allowed remote code execution via start_unichar in paraparser.py evaluating untrusted user input. (bsc#1215560)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-4048,SUSE-SLE-WE-12-SP5-2023-4048", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4048-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:4048-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234048-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:4048-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016630.html" }, { "category": "self", "summary": "SUSE Bug 1215560", "url": "https://bugzilla.suse.com/1215560" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19450 page", "url": "https://www.suse.com/security/cve/CVE-2019-19450/" } ], "title": "Security update for python-reportlab", "tracking": { "current_release_date": "2023-10-11T09:28:40Z", "generator": { "date": "2023-10-11T09:28:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:4048-1", "initial_release_date": "2023-10-11T09:28:40Z", "revision_history": [ { "date": "2023-10-11T09:28:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.aarch64", "product": { "name": "python-reportlab-2.7-3.16.1.aarch64", "product_id": "python-reportlab-2.7-3.16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.i586", "product": { "name": "python-reportlab-2.7-3.16.1.i586", "product_id": "python-reportlab-2.7-3.16.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.ppc64le", "product": { "name": "python-reportlab-2.7-3.16.1.ppc64le", "product_id": "python-reportlab-2.7-3.16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.s390", "product": { "name": "python-reportlab-2.7-3.16.1.s390", "product_id": "python-reportlab-2.7-3.16.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.s390x", "product": { "name": "python-reportlab-2.7-3.16.1.s390x", "product_id": "python-reportlab-2.7-3.16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-2.7-3.16.1.x86_64", "product": { "name": "python-reportlab-2.7-3.16.1.x86_64", "product_id": "python-reportlab-2.7-3.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-2.7-3.16.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:python-reportlab-2.7-3.16.1.x86_64" }, "product_reference": "python-reportlab-2.7-3.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19450" } ], "notes": [ { "category": "general", "text": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Workstation Extension 12 SP5:python-reportlab-2.7-3.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19450", "url": "https://www.suse.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "SUSE Bug 1215560 for CVE-2019-19450", "url": "https://bugzilla.suse.com/1215560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Workstation Extension 12 SP5:python-reportlab-2.7-3.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Workstation Extension 12 SP5:python-reportlab-2.7-3.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-10-11T09:28:40Z", "details": "important" } ], "title": "CVE-2019-19450" } ] }
suse-su-2023:3972-1
Vulnerability from csaf_suse
Published
2023-10-04 14:11
Modified
2023-10-04 14:11
Summary
Security update for python-reportlab
Notes
Title of the patch
Security update for python-reportlab
Description of the patch
This update for python-reportlab fixes the following issues:
- CVE-2019-19450: Fixed an issue which allowed remote code execution via start_unichar in paraparser.py evaluating untrusted user input. (bsc#1215560)
Patchnames
SUSE-2023-3972,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3972,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3972,openSUSE-SLE-15.4-2023-3972,openSUSE-SLE-15.5-2023-3972
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-reportlab", "title": "Title of the patch" }, { "category": "description", "text": "This update for python-reportlab fixes the following issues:\n\n- CVE-2019-19450: Fixed an issue which allowed remote code execution via start_unichar in paraparser.py evaluating untrusted user input. (bsc#1215560)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3972,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3972,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3972,openSUSE-SLE-15.4-2023-3972,openSUSE-SLE-15.5-2023-3972", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3972-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3972-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233972-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3972-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016511.html" }, { "category": "self", "summary": "SUSE Bug 1215560", "url": "https://bugzilla.suse.com/1215560" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19450 page", "url": "https://www.suse.com/security/cve/CVE-2019-19450/" } ], "title": "Security update for python-reportlab", "tracking": { "current_release_date": "2023-10-04T14:11:14Z", "generator": { "date": "2023-10-04T14:11:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3972-1", "initial_release_date": "2023-10-04T14:11:14Z", "revision_history": [ { "date": "2023-10-04T14:11:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python2-reportlab-3.4.0-150000.3.12.1.aarch64", "product": { "name": "python2-reportlab-3.4.0-150000.3.12.1.aarch64", "product_id": "python2-reportlab-3.4.0-150000.3.12.1.aarch64" } }, { "category": "product_version", "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "product": { "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "product_id": "python3-reportlab-3.4.0-150000.3.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python2-reportlab-3.4.0-150000.3.12.1.i586", "product": { "name": "python2-reportlab-3.4.0-150000.3.12.1.i586", "product_id": "python2-reportlab-3.4.0-150000.3.12.1.i586" } }, { "category": "product_version", "name": "python3-reportlab-3.4.0-150000.3.12.1.i586", "product": { "name": "python3-reportlab-3.4.0-150000.3.12.1.i586", "product_id": "python3-reportlab-3.4.0-150000.3.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "python2-reportlab-3.4.0-150000.3.12.1.ppc64le", "product": { "name": "python2-reportlab-3.4.0-150000.3.12.1.ppc64le", "product_id": "python2-reportlab-3.4.0-150000.3.12.1.ppc64le" } }, { "category": "product_version", "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "product": { "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "product_id": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python2-reportlab-3.4.0-150000.3.12.1.s390x", "product": { "name": "python2-reportlab-3.4.0-150000.3.12.1.s390x", "product_id": "python2-reportlab-3.4.0-150000.3.12.1.s390x" } }, { "category": "product_version", "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "product": { "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "product_id": "python3-reportlab-3.4.0-150000.3.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python2-reportlab-3.4.0-150000.3.12.1.x86_64", "product": { "name": "python2-reportlab-3.4.0-150000.3.12.1.x86_64", "product_id": "python2-reportlab-3.4.0-150000.3.12.1.x86_64" } }, { "category": "product_version", "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "product": { "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "product_id": "python3-reportlab-3.4.0-150000.3.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.aarch64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.s390x" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.x86_64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.aarch64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.s390x" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.x86_64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.aarch64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.s390x" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.x86_64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.aarch64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.s390x" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-3.4.0-150000.3.12.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.x86_64" }, "product_reference": "python3-reportlab-3.4.0-150000.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19450" } ], "notes": [ { "category": "general", "text": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19450", "url": "https://www.suse.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "SUSE Bug 1215560 for CVE-2019-19450", "url": "https://bugzilla.suse.com/1215560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP5:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.4:python3-reportlab-3.4.0-150000.3.12.1.x86_64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.aarch64", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.ppc64le", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.s390x", "openSUSE Leap 15.5:python3-reportlab-3.4.0-150000.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-10-04T14:11:14Z", "details": "important" } ], "title": "CVE-2019-19450" } ] }
gsd-2019-19450
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-19450", "id": "GSD-2019-19450" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-19450" ], "details": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626.", "id": "GSD-2019-19450", "modified": "2023-12-13T01:23:53.645454Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md", "refsource": "MISC", "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "name": "https://pastebin.com/5MicRrr4", "refsource": "MISC", "url": "https://pastebin.com/5MicRrr4" }, { "name": "[debian-lts-announce] 20230929 [SECURITY] [DLA 3590-1] python-reportlab security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "name": "FEDORA-2024-dc844d0669", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "name": "FEDORA-2024-6ec4e78241", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*", "matchCriteriaId": "75D6540D-C28F-433B-8166-9FEDFD74E7E2", "versionEndExcluding": "3.5.31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626." }, { "lang": "es", "value": "paraparser en ReportLab anterior a 3.5.31 permite la ejecuci\u00f3n remota de c\u00f3digo porque start_unichar en paraparser.py eval\u00faa la entrada de un usuario que no es de confianza en un elemento unichar en un documento XML manipulado con \u0027" } ], "id": "CVE-2019-19450", "lastModified": "2024-04-28T04:15:09.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-20T14:15:12.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/5MicRrr4" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-91" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
rhsa-2023:5788
Vulnerability from csaf_redhat
Published
2023-10-17 13:55
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5788", "url": "https://access.redhat.com/errata/RHSA-2023:5788" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5788.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:27+00:00", "generator": { "date": "2024-11-23T01:15:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5788", "initial_release_date": "2023-10-17T13:55:12+00:00", "revision_history": [ { "date": "2023-10-17T13:55:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-17T13:55:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:3.4.0-8.el8_2.1.src", "product": { "name": "python-reportlab-0:3.4.0-8.el8_2.1.src", "product_id": "python-reportlab-0:3.4.0-8.el8_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@3.4.0-8.el8_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "product_id": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "product_id": "python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_2.1.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_2.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_2.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_2.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_2.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_2.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_2.1.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_2.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_2.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-17T13:55:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5788" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.ppc64le", "AppStream-8.2.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_2.1.src", "AppStream-8.2.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_2.1.x86_64", "AppStream-8.2.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
rhsa-2023:5790
Vulnerability from csaf_redhat
Published
2023-10-17 14:02
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5790", "url": "https://access.redhat.com/errata/RHSA-2023:5790" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5790.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:09+00:00", "generator": { "date": "2024-11-23T01:15:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5790", "initial_release_date": "2023-10-17T14:02:58+00:00", "revision_history": [ { "date": "2023-10-17T14:02:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-17T14:02:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:3.4.0-8.el8_8.1.src", "product": { "name": "python-reportlab-0:3.4.0-8.el8_8.1.src", "product_id": "python-reportlab-0:3.4.0-8.el8_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@3.4.0-8.el8_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "product_id": "python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_8.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "product_id": "python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_8.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "product_id": "python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "product_id": "python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_8.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-0:3.4.0-8.el8_8.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_8.1.src", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.aarch64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.s390x" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-0:3.4.0-8.el8_8.1.src", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-17T14:02:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-0:3.4.0-8.el8_8.1.src", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5790" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-0:3.4.0-8.el8_8.1.src", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-0:3.4.0-8.el8_8.1.src", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-0:3.4.0-8.el8_8.1.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.s390x", "AppStream-8.8.0.Z.MAIN.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
rhsa-2023:5786
Vulnerability from csaf_redhat
Published
2023-10-17 14:01
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5786", "url": "https://access.redhat.com/errata/RHSA-2023:5786" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5786.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:47+00:00", "generator": { "date": "2024-11-23T01:15:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5786", "initial_release_date": "2023-10-17T14:01:58+00:00", "revision_history": [ { "date": "2023-10-17T14:01:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-17T14:01:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:3.4.0-8.el8_6.1.src", "product": { "name": "python-reportlab-0:3.4.0-8.el8_6.1.src", "product_id": "python-reportlab-0:3.4.0-8.el8_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@3.4.0-8.el8_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "product_id": "python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_6.1?arch=aarch64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_6.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_6.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "product_id": "python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_6.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_6.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_6.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "product_id": "python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "product_id": "python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_6.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python-reportlab-0:3.4.0-8.el8_6.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_6.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.aarch64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.s390x" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:python-reportlab-0:3.4.0-8.el8_6.1.src", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-17T14:01:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:python-reportlab-0:3.4.0-8.el8_6.1.src", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5786" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:python-reportlab-0:3.4.0-8.el8_6.1.src", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:python-reportlab-0:3.4.0-8.el8_6.1.src", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python-reportlab-debugsource-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-0:3.4.0-8.el8_6.1.x86_64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.aarch64", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.ppc64le", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.s390x", "AppStream-8.6.0.Z.EUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
rhsa-2023:5616
Vulnerability from csaf_redhat
Published
2023-10-10 16:22
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5616", "url": "https://access.redhat.com/errata/RHSA-2023:5616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5616.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:00+00:00", "generator": { "date": "2024-11-23T01:15:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5616", "initial_release_date": "2023-10-10T16:22:29+00:00", "revision_history": [ { "date": "2023-10-10T16:22:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-10T16:22:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:2.5-11.el7_9.src", "product": { "name": "python-reportlab-0:2.5-11.el7_9.src", "product_id": "python-reportlab-0:2.5-11.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@2.5-11.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:2.5-11.el7_9.x86_64", "product": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64", "product_id": "python-reportlab-0:2.5-11.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@2.5-11.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "product": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "product_id": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debuginfo@2.5-11.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "product": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "product_id": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-docs@2.5-11.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:2.5-11.el7_9.ppc64le", "product": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le", "product_id": "python-reportlab-0:2.5-11.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@2.5-11.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "product": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "product_id": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debuginfo@2.5-11.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "product": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "product_id": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-docs@2.5-11.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:2.5-11.el7_9.ppc64", "product": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64", "product_id": "python-reportlab-0:2.5-11.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@2.5-11.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "product": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "product_id": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debuginfo@2.5-11.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "product": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "product_id": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-docs@2.5-11.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:2.5-11.el7_9.s390x", "product": { "name": "python-reportlab-0:2.5-11.el7_9.s390x", "product_id": "python-reportlab-0:2.5-11.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@2.5-11.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "product": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "product_id": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debuginfo@2.5-11.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "product": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "product_id": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-docs@2.5-11.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-docs-0:2.5-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" }, "product_reference": "python-reportlab-docs-0:2.5-11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-10T16:22:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5616" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Client-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Client-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Server-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Server-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.src", "7Workstation-optional-7.9.Z:python-reportlab-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-debuginfo-0:2.5-11.el7_9.x86_64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.ppc64le", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.s390x", "7Workstation-optional-7.9.Z:python-reportlab-docs-0:2.5-11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
rhsa-2023:5787
Vulnerability from csaf_redhat
Published
2023-10-17 13:58
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5787", "url": "https://access.redhat.com/errata/RHSA-2023:5787" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5787.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:36+00:00", "generator": { "date": "2024-11-23T01:15:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5787", "initial_release_date": "2023-10-17T13:58:08+00:00", "revision_history": [ { "date": "2023-10-17T13:58:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-17T13:58:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:3.4.0-8.el8_4.1.src", "product": { "name": "python-reportlab-0:3.4.0-8.el8_4.1.src", "product_id": "python-reportlab-0:3.4.0-8.el8_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@3.4.0-8.el8_4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "product_id": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "product_id": "python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_4.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "product_id": "python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_4.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "product": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "product_id": "python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-8.el8_4.1?arch=s390x" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "product": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "product_id": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-8.el8_4.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "product_id": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-8.el8_4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_4.1.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_4.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_4.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_4.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_4.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_4.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.aarch64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.s390x" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-8.el8_4.1.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_4.1.src" }, "product_reference": "python-reportlab-0:3.4.0-8.el8_4.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-17T13:58:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5787" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.AUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.AUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.aarch64", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.ppc64le", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.s390x", "AppStream-8.4.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python-reportlab-0:3.4.0-8.el8_4.1.src", "AppStream-8.4.0.Z.TUS:python-reportlab-debugsource-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-0:3.4.0-8.el8_4.1.x86_64", "AppStream-8.4.0.Z.TUS:python3-reportlab-debuginfo-0:3.4.0-8.el8_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
rhsa-2023:5789
Vulnerability from csaf_redhat
Published
2023-10-17 13:54
Modified
2024-11-23 01:15
Summary
Red Hat Security Advisory: python-reportlab security update
Notes
Topic
An update for python-reportlab is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for python-reportlab is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Python-reportlab is a library used for generation of PDF documents.\n\nSecurity Fix(es):\n\n* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5789", "url": "https://access.redhat.com/errata/RHSA-2023:5789" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5789.json" } ], "title": "Red Hat Security Advisory: python-reportlab security update", "tracking": { "current_release_date": "2024-11-23T01:15:18+00:00", "generator": { "date": "2024-11-23T01:15:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:5789", "initial_release_date": "2023-10-17T13:54:53+00:00", "revision_history": [ { "date": "2023-10-17T13:54:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-10-17T13:54:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-23T01:15:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-reportlab-0:3.4.0-6.el8_1.5.src", "product": { "name": "python-reportlab-0:3.4.0-6.el8_1.5.src", "product_id": "python-reportlab-0:3.4.0-6.el8_1.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab@3.4.0-6.el8_1.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "product": { "name": "python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "product_id": "python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-6.el8_1.5?arch=ppc64le" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "product": { "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "product_id": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-6.el8_1.5?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "product_id": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-6.el8_1.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "product": { "name": "python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "product_id": "python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab@3.4.0-6.el8_1.5?arch=x86_64" } } }, { "category": "product_version", "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "product": { "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "product_id": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-reportlab-debugsource@3.4.0-6.el8_1.5?arch=x86_64" } } }, { "category": "product_version", "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64", "product": { "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64", "product_id": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-reportlab-debuginfo@3.4.0-6.el8_1.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-0:3.4.0-6.el8_1.5.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python-reportlab-0:3.4.0-6.el8_1.5.src" }, "product_reference": "python-reportlab-0:3.4.0-6.el8_1.5.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64" }, "product_reference": "python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le" }, "product_reference": "python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-0:3.4.0-6.el8_1.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.x86_64" }, "product_reference": "python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64" }, "product_reference": "python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "discovery_date": "2023-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239920" } ], "notes": [ { "category": "description", "text": "A code injection vulnerability was found in python-reportlab that may allow an attacker to execute code while parsing a unichar element attribute. An application that uses python-reportlab to parse untrusted input files may be vulnerable and could allow remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-reportlab: code injection in paraparser.py allows code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit the issue, a malicious user has to use a crafted malicious html \u0027unichar\u0027 tag input and then use the reportlab\u0027s feature to generate a pdf of the document and that can lead to a remote code execution, therefore, this CVE has an Important impact.\n\nThis vulnerability is similar to CVE-2019-17626.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:python-reportlab-0:3.4.0-6.el8_1.5.src", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19450" }, { "category": "external", "summary": "RHBZ#2239920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19450", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" } ], "release_date": "2023-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-10-17T13:54:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.E4S:python-reportlab-0:3.4.0-6.el8_1.5.src", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5789" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.1.0.Z.E4S:python-reportlab-0:3.4.0-6.el8_1.5.src", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:python-reportlab-0:3.4.0-6.el8_1.5.src", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python-reportlab-debugsource-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-0:3.4.0-6.el8_1.5.x86_64", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.ppc64le", "AppStream-8.1.0.Z.E4S:python3-reportlab-debuginfo-0:3.4.0-6.el8_1.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python-reportlab: code injection in paraparser.py allows code execution" } ] }
fkie_cve-2019-19450
Vulnerability from fkie_nvd
Published
2023-09-20 14:15
Modified
2024-11-21 04:34
Severity ?
Summary
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md | Release Notes | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/ | ||
cve@mitre.org | https://pastebin.com/5MicRrr4 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://pastebin.com/5MicRrr4 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
reportlab | reportlab | * | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*", "matchCriteriaId": "75D6540D-C28F-433B-8166-9FEDFD74E7E2", "versionEndExcluding": "3.5.31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626." }, { "lang": "es", "value": "paraparser en ReportLab anterior a 3.5.31 permite la ejecuci\u00f3n remota de c\u00f3digo porque start_unichar en paraparser.py eval\u00faa la entrada de un usuario que no es de confianza en un elemento unichar en un documento XML manipulado con \u0027" } ], "id": "CVE-2019-19450", "lastModified": "2024-11-21T04:34:45.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-20T14:15:12.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/5MicRrr4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/5MicRrr4" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-91" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2023-2629
Vulnerability from csaf_certbund
Published
2023-10-10 22:00
Modified
2024-04-21 22:00
Summary
Red Hat Enterprise Linux (python-reportlab): Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der Komponente "python-reportlab" ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der Komponente \"python-reportlab\" ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2629 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2629.json" }, { "category": "self", "summary": "WID-SEC-2023-2629 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2629" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2023:5616 vom 2024-02-20", "url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099226.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5616 vom 2023-10-10", "url": "https://access.redhat.com/errata/RHSA-2023:5616" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5616 vom 2023-10-11", "url": "http://linux.oracle.com/errata/ELSA-2023-5616.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0857 vom 2024-02-21", "url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099227.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5788 vom 2023-10-18", "url": "https://access.redhat.com/errata/RHSA-2023:5788" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5790 vom 2023-10-18", "url": "https://access.redhat.com/errata/RHSA-2023:5790" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5789 vom 2023-10-18", "url": "https://access.redhat.com/errata/RHSA-2023:5789" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5786 vom 2023-10-18", "url": "https://access.redhat.com/errata/RHSA-2023:5786" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5787 vom 2023-10-18", "url": "https://access.redhat.com/errata/RHSA-2023:5787" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5790 vom 2023-10-19", "url": "https://linux.oracle.com/errata/ELSA-2023-5790.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-DC844D0669 vom 2024-04-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-dc844d0669" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-6EC4E78241 vom 2024-04-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-6ec4e78241" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (python-reportlab): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-04-21T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:59:47.347+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2629", "initial_release_date": "2023-10-10T22:00:00.000+00:00", "revision_history": [ { "date": "2023-10-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-11T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-10-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-10-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-02-20T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-02-21T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-04-21T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T025210", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19450", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Der Fehler besteht in der Komponente python-reportlab aufgrund einer m\u00f6glichen Code-Injektion beim Parsen eines unichar-Element-Attributs. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "67646", "1727", "T004914", "74185", "T025210" ] }, "release_date": "2023-10-10T22:00:00.000+00:00", "title": "CVE-2019-19450" } ] }
ghsa-pj98-2xf6-cff5
Vulnerability from github
Published
2023-09-20 15:30
Modified
2024-04-28 06:31
Severity ?
VLAI Severity ?
Summary
ReportLab vulnerable to remote code execution via paraparser
Details
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "reportlab" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.5.31" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-19450" ], "database_specific": { "cwe_ids": [ "CWE-91" ], "github_reviewed": true, "github_reviewed_at": "2023-09-21T16:57:08Z", "nvd_published_at": "2023-09-20T14:15:12Z", "severity": "CRITICAL" }, "details": "paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with \u0027\u003cunichar code=\"\u0027 followed by arbitrary Python code, a similar issue to CVE-2019-17626.", "id": "GHSA-pj98-2xf6-cff5", "modified": "2024-04-28T06:31:24Z", "published": "2023-09-20T15:30:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19450" }, { "type": "WEB", "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md" }, { "type": "WEB", "url": "https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019" }, { "type": "PACKAGE", "url": "https://hg.reportlab.com/hg-public/reportlab" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHMCB2GJQKFMGVO5RWHN222NQL5XYPHZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HADPTB3SBU7IVRMDK7OL6WSQRU5AFWDZ" }, { "type": "WEB", "url": "https://pastebin.com/5MicRrr4" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "ReportLab vulnerable to remote code execution via paraparser" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…