paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
{
"binaries": [
{
"binary_name": "python-renderpm",
"binary_version": "3.3.0-1ubuntu0.1"
},
{
"binary_name": "python-reportlab",
"binary_version": "3.3.0-1ubuntu0.1"
},
{
"binary_name": "python-reportlab-accel",
"binary_version": "3.3.0-1ubuntu0.1"
},
{
"binary_name": "python3-renderpm",
"binary_version": "3.3.0-1ubuntu0.1"
},
{
"binary_name": "python3-reportlab",
"binary_version": "3.3.0-1ubuntu0.1"
},
{
"binary_name": "python3-reportlab-accel",
"binary_version": "3.3.0-1ubuntu0.1"
}
]
}
{
"binaries": [
{
"binary_name": "python-renderpm",
"binary_version": "3.4.0-3ubuntu0.1"
},
{
"binary_name": "python-reportlab",
"binary_version": "3.4.0-3ubuntu0.1"
},
{
"binary_name": "python-reportlab-accel",
"binary_version": "3.4.0-3ubuntu0.1"
},
{
"binary_name": "python3-renderpm",
"binary_version": "3.4.0-3ubuntu0.1"
},
{
"binary_name": "python3-reportlab",
"binary_version": "3.4.0-3ubuntu0.1"
},
{
"binary_name": "python3-reportlab-accel",
"binary_version": "3.4.0-3ubuntu0.1"
}
]
}