rh-python36-python-pip-9.0.1-5.AXS4, rh-python36-python-3.6.12-1.AXS4, rh-python36-python-virtualenv-15.1.0-3.AXS4

エラータID: AXSA:2020-818:02

リリース日: 
2020/10/27 Tuesday - 13:37
題名: 
rh-python36-python-pip-9.0.1-5.AXS4, rh-python36-python-3.6.12-1.AXS4, rh-python36-python-virtualenv-15.1.0-3.AXS4
影響のあるチャネル: 
Asianux Server 4 for x86_64
Severity: 
Moderate
Description: 

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: rh-python36-python (3.6.12).

Security Fix(es):

* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)

* python: CRLF injection via the host part of the url passed to urlopen() (CVE-2019-18348)

* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)

* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)

* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)

* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)

* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* rh-python36-python-pip: Contains multiple bundled libraries, and has no bundled() provides

* Allow rh-python36-python-pip to use system CA certificate Trust

CVE-2019-16935
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
CVE-2019-18348
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
CVE-2019-20907
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
CVE-2019-20916
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
CVE-2020-14422
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created.
CVE-2020-26116
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
CVE-2020-8492
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. rh-python36-python-pip-9.0.1-5.AXS4.src.rpm
    MD5: e3569e5916f302dd03d25ed3ac7c46f9
    SHA-256: 5fdfa9688c451474a8a148f85fb1585b001c61f98289bf2999ccf6c4ea57632b
    Size: 1.15 MB
  2. rh-python36-python-3.6.12-1.AXS4.src.rpm
    MD5: 6f1b1023fb186a644c4da73f2a64fc92
    SHA-256: 6c73553344d61ca004e113cd5bda656ca8cb6973f336dec8dce1b3e0b063ba13
    Size: 16.52 MB
  3. rh-python36-python-virtualenv-15.1.0-3.AXS4.src.rpm
    MD5: 240844223abf1ad4af8b31bdd69aecfe
    SHA-256: aec864e71d5474f5daf54ca048032be4c1fe69c1b332f315854ba6234f9ce109
    Size: 1.79 MB

Asianux Server 4 for x86_64
  1. rh-python36-python-pip-9.0.1-5.AXS4.noarch.rpm
    MD5: c54da8daba1e6d01c89a9622b8f5a4bb
    SHA-256: d72039a316d8c9c9da5a233bdc40e7e3140175abf91ec6892eff00c36ca994c8
    Size: 1.60 MB
  2. rh-python36-python-3.6.12-1.AXS4.x86_64.rpm
    MD5: 48c49eab83538490947a0fa0ce4fa86c
    SHA-256: 31bac9593b223a33b6cb92e63faf003d1a5b862e58c7a733e9dcae987c47b16e
    Size: 54.59 kB
  3. rh-python36-python-debug-3.6.12-1.AXS4.x86_64.rpm
    MD5: 42a08bf7764bd56c3b3fa1fbe3298b67
    SHA-256: 4b326600b3257ee5cf816abb50432e154d9bc0364773eae8a31950b07446d35b
    Size: 2.51 MB
  4. rh-python36-python-devel-3.6.12-1.AXS4.x86_64.rpm
    MD5: 6338d1aa0f3611049e93ea7cf724ca50
    SHA-256: 07b6139717ac28aafb38fa3d4d5a6a7b3e158498ec12b60c019e312320ffbf99
    Size: 918.43 kB
  5. rh-python36-python-libs-3.6.12-1.AXS4.x86_64.rpm
    MD5: c6ec1ae4266f8a798c6cfa5ad02cc241
    SHA-256: 77ef981fa4cbf5283bbd125dc120730ce85f9614bfbba038862a9f484bbfdae7
    Size: 7.46 MB
  6. rh-python36-python-test-3.6.12-1.AXS4.x86_64.rpm
    MD5: 448c419e52ecda3dfba7de0891523dea
    SHA-256: 2cd2ab996c695fe070233160ad5c4d867fb2a4eb33c5c13b6b20fbaed879fd6f
    Size: 7.48 MB
  7. rh-python36-python-tkinter-3.6.12-1.AXS4.x86_64.rpm
    MD5: 3c4439fa0fb4b11a9e16d936da56ba7b
    SHA-256: b71b237889e222860f08cd1a97c6e23d13144086688da9b53e604e97a1f2068f
    Size: 359.97 kB
  8. rh-python36-python-tools-3.6.12-1.AXS4.x86_64.rpm
    MD5: 4f4a1df0bd801ebd5d300db0c1aa3199
    SHA-256: 5d687190d529b051657aab9a9fb8686f71c6b46ebf6d0206716cfe89c5f5579a
    Size: 474.78 kB
  9. rh-python36-python-virtualenv-15.1.0-3.AXS4.noarch.rpm
    MD5: 5301f834634a8156bb21850af385e30e
    SHA-256: 02a9a85bbecfea4c9a5314e0ad799b877a4cd963655e6ca77aa7c7183d930e8f
    Size: 1.84 MB