python3-3.6.8-37.el8

エラータID: AXSA:2021-2061:02

Release date: 
Monday, June 21, 2021 - 14:09
Subject: 
python3-3.6.8-37.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)
* python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619)
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177)
* python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2020-26116
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
CVE-2020-27619
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2021-23336
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. python3-3.6.8-37.el8.src.rpm
    MD5: f3a7c39adb552083503570b2619072db
    SHA-256: a1b08cc9879ce901a21578ba1ccb4d925f932c5adedd7ae5e25d8830ad99bef6
    Size: 18.21 MB

Asianux Server 8 for x86_64
  1. platform-python-3.6.8-37.el8.x86_64.rpm
    MD5: c145602e837758037fbdb50513e8e94f
    SHA-256: 9c4c56a0d7b6b57558f47b6682196ab26a36f236d638b3e11e61f9a16e5431de
    Size: 83.04 kB
  2. platform-python-debug-3.6.8-37.el8.x86_64.rpm
    MD5: ab6844858d5e93c07dcd2440a6d802a9
    SHA-256: eab031d7bcd3368f5a2f80a74f2a15d046c251f422528a6ca78a15a6353c0aec
    Size: 2.68 MB
  3. platform-python-devel-3.6.8-37.el8.x86_64.rpm
    MD5: 9e036964486abb487462891ddd583d31
    SHA-256: 95cff2ae8f513cbfc895bb21b276d9479c152fd04dd7e0b908512e61ddb3ed0f
    Size: 247.63 kB
  4. python3-idle-3.6.8-37.el8.x86_64.rpm
    MD5: 8c40a07d6b6d7ca25594de26cca76d87
    SHA-256: 37f342904331b934aae1d98ae87d12b1f8a87cea9aa3774065b1b63b3f5bae7a
    Size: 824.50 kB
  5. python3-libs-3.6.8-37.el8.x86_64.rpm
    MD5: bbf04e9e0c5d8b124dac74d461917ba3
    SHA-256: 8d1cbea3b627d492719ebc7821aec10e42a578e45b88441ec6a2bceffc29e046
    Size: 7.81 MB
  6. python3-test-3.6.8-37.el8.x86_64.rpm
    MD5: b1ea323ad4b7465ac2f695a252dad3c0
    SHA-256: 7705617ef7238c40dad3990b605b39cee32a924e5948a3ca2fa09aad209f2c34
    Size: 8.63 MB
  7. python3-tkinter-3.6.8-37.el8.x86_64.rpm
    MD5: f67d331f74a60fa6cee4c294c281056a
    SHA-256: ea329a5551cffe976c94da45f2fe21f34decdc85cbc71286fcec933b19361b35
    Size: 369.85 kB
  8. platform-python-3.6.8-37.el8.i686.rpm
    MD5: 2dc49948a94252a4f9616b3fb6227259
    SHA-256: 033d77fd14f1d29a4d91979d7f5667510687f04c4e515a5c051174acc10a9bda
    Size: 82.98 kB
  9. platform-python-debug-3.6.8-37.el8.i686.rpm
    MD5: 2537fd4db58eedced0d2b092848106d9
    SHA-256: 5c32dbcf80e0194c28dcc880b05059f795180b8409797c6b2354b89b3eb4aff5
    Size: 2.72 MB
  10. platform-python-devel-3.6.8-37.el8.i686.rpm
    MD5: 3c0a004f3cc1b2d279d5c5ed3b089289
    SHA-256: 871dda14b54b6e4d6b1ac1e6faaf9da7e64c84b6498844ab7b9108a71ea948ba
    Size: 246.94 kB
  11. python3-idle-3.6.8-37.el8.i686.rpm
    MD5: 6e5e35b929d19921de9448d91609cbda
    SHA-256: 6f4e2f68dec9c22b825978d118d60b0b01eaff16038cc0c95eaeaba1d885c2df
    Size: 824.51 kB
  12. python3-libs-3.6.8-37.el8.i686.rpm
    MD5: 4e82767601a3177e38fbf9ad061796d8
    SHA-256: fff854379814f9dbc47246d7a230898bd0ef83b47cafd4bdbdaab6088cbfe9c8
    Size: 7.88 MB
  13. python3-test-3.6.8-37.el8.i686.rpm
    MD5: 298ce9a928ad73aeaa4f05cc82688a91
    SHA-256: 930e48ab50b986c6372ca41e78b8968b30b82112a3a6cb7820af692666c9f1eb
    Size: 8.65 MB
  14. python3-tkinter-3.6.8-37.el8.i686.rpm
    MD5: 6054d1a3c293fb13f3d4e78d74b210b4
    SHA-256: ebe4010732dd343ea95bed1885aebabdadb121d3a2f845f6197ffdbe2d5feca7
    Size: 371.29 kB