rh-python36-python-pip-9.0.1-5.el7, rh-python36-python-3.6.12-1.el7, rh-python36-python-virtualenv-15.1.0-3.el7

エラータID: AXSA:2020-772:01

Release date: 
Wednesday, October 21, 2020 - 12:27
Subject: 
rh-python36-python-pip-9.0.1-5.el7, rh-python36-python-3.6.12-1.el7, rh-python36-python-virtualenv-15.1.0-3.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: rh-python36-python (3.6.12).

Security Fix(es):

* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)

* python: CRLF injection via the host part of the url passed to urlopen() (CVE-2019-18348)

* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)

* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)

* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)

* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)

* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* rh-python36-python-pip: Contains multiple bundled libraries, and has no bundled() provides

* Allow rh-python36-python-pip to use system CA certificate Trust

CVE-2019-16935
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
CVE-2019-18348
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
CVE-2019-20907
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
CVE-2019-20916
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
CVE-2020-14422
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created.
CVE-2020-26116
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
CVE-2020-8492
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-python36-python-pip-9.0.1-5.el7.src.rpm
    MD5: b840bf3461af60652077272da75b795c
    SHA-256: 0a2dff1a63602fedaf049922958b227bd80c5731037f7d2cb9783c237d6ba98e
    Size: 1.15 MB
  2. rh-python36-python-3.6.12-1.el7.src.rpm
    MD5: 5888ea70e413cac5dc1725f1a0de9ade
    SHA-256: a713a907978cf38c4451eedf7137650ada42c7d59f11a8f856657055ce758227
    Size: 16.52 MB
  3. rh-python36-python-virtualenv-15.1.0-3.el7.src.rpm
    MD5: 25a04b8c74e624dbc6ac693efbfb934a
    SHA-256: ee1ae0c1edc0e84bf07474c5b7a4706fc49c7944739d7956a67f71c26fdfc91e
    Size: 1.79 MB

Asianux Server 7 for x86_64
  1. rh-python36-python-pip-9.0.1-5.el7.noarch.rpm
    MD5: e143cab4457767f982c4fa12d9daf459
    SHA-256: c65bda6307f524c6fe4446b5f6ac23927438f0e8320f1374b3bbbc276b859e7c
    Size: 1.56 MB
  2. rh-python36-python-3.6.12-1.el7.x86_64.rpm
    MD5: 6d0e3f00ceaa7e552965e0af4a0e919d
    SHA-256: 21a55715b3b5566c98e44e47e44e62dfe52437bcc232da66d436c4226173aea2
    Size: 55.73 kB
  3. rh-python36-python-debug-3.6.12-1.el7.x86_64.rpm
    MD5: 159f6fe9f2c401d1e672c88f7eb61b6a
    SHA-256: 79c44268c9849b9c9184d7b978e7eee6e8a0dbf87ffe5e95bf5906711e6cf8fe
    Size: 2.62 MB
  4. rh-python36-python-devel-3.6.12-1.el7.x86_64.rpm
    MD5: e19f1ca9666daf377ec69d61bb755f81
    SHA-256: 7598ef17c1b297d9b49ed2e9f372abc18aba089d571913c6639119009aeca040
    Size: 841.46 kB
  5. rh-python36-python-libs-3.6.12-1.el7.x86_64.rpm
    MD5: 94db9051fa824f71e1d1c0b53a9dced2
    SHA-256: 9f992ef5594c07135dbde743d46093265027182136d7c3bd24a5b4003bcf507e
    Size: 7.56 MB
  6. rh-python36-python-test-3.6.12-1.el7.x86_64.rpm
    MD5: 710c6e389da4368b3f8b8e1459a15b5e
    SHA-256: 7def3ca858ba94d04abd7fd6297b2b335a34adf1125363d55e260b2dd289e56a
    Size: 7.29 MB
  7. rh-python36-python-tkinter-3.6.12-1.el7.x86_64.rpm
    MD5: fcda35c6d009c33d0219fac352b317e5
    SHA-256: 1536962a63200f5412327665a52f722c59e1a759bede8818688b97be4eef9922
    Size: 347.05 kB
  8. rh-python36-python-tools-3.6.12-1.el7.x86_64.rpm
    MD5: 48e9e1a604b626f559b5209490cce62c
    SHA-256: 135d0acae0b4bb720ce72ea2baf30df7b4f3da288be58040c9b1c56113a5b536
    Size: 461.46 kB
  9. rh-python36-python-virtualenv-15.1.0-3.el7.noarch.rpm
    MD5: abf69be966cbd2090a1203f2575da57c
    SHA-256: bd2a98ecb277e9e5673f1e07ce5b27eb12ef146ec61ff1942f544e730318b3aa
    Size: 1.82 MB