python3-3.6.8-37.el8
エラータID: AXSA:2021-2061:02
リリース日:
2021/06/21 Monday - 14:09
題名:
python3-3.6.8-37.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Python 3 の http.client には、攻撃者が HTTP のリクエストメソッドを制御している場合、
CRLF インジェクション可能な脆弱性があります。(CVE-2020-26116)
- Python 3 には Lib/test/multibytecodec_support.py の CJK コーデックテスト内で HTTP に
より取得したコンテンツに対して eval() を呼び出す脆弱性があります。(CVE-2020-27619)
- python/cpython パッケージ の urllib.parse.parse_qsl と urllib.parse.parse_qs には、パラ
メータクローキングと呼ばれる攻撃手法を用いて Web キャッシュポイズニング攻撃を受け
る脆弱性があります。(CVE-2021-23336)
- Python 3 の_ctypes/callproc.c 内の PyCArg_repr にはバッファーオーバーフローが発生する
問題があり、信頼できない入力値を浮動小数点数として受け入れる特定の Python アプリ
ケーションでリモートコードが実行される脆弱性があります。(CVE-2021-3177)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-26116
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
CVE-2020-27619
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2021-23336
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
追加情報:
N/A
ダウンロード:
SRPMS
- python3-3.6.8-37.el8.src.rpm
MD5: f3a7c39adb552083503570b2619072db
SHA-256: a1b08cc9879ce901a21578ba1ccb4d925f932c5adedd7ae5e25d8830ad99bef6
Size: 18.21 MB
Asianux Server 8 for x86_64
- platform-python-3.6.8-37.el8.x86_64.rpm
MD5: c145602e837758037fbdb50513e8e94f
SHA-256: 9c4c56a0d7b6b57558f47b6682196ab26a36f236d638b3e11e61f9a16e5431de
Size: 83.04 kB - platform-python-debug-3.6.8-37.el8.x86_64.rpm
MD5: ab6844858d5e93c07dcd2440a6d802a9
SHA-256: eab031d7bcd3368f5a2f80a74f2a15d046c251f422528a6ca78a15a6353c0aec
Size: 2.68 MB - platform-python-devel-3.6.8-37.el8.x86_64.rpm
MD5: 9e036964486abb487462891ddd583d31
SHA-256: 95cff2ae8f513cbfc895bb21b276d9479c152fd04dd7e0b908512e61ddb3ed0f
Size: 247.63 kB - python3-idle-3.6.8-37.el8.x86_64.rpm
MD5: 8c40a07d6b6d7ca25594de26cca76d87
SHA-256: 37f342904331b934aae1d98ae87d12b1f8a87cea9aa3774065b1b63b3f5bae7a
Size: 824.50 kB - python3-libs-3.6.8-37.el8.x86_64.rpm
MD5: bbf04e9e0c5d8b124dac74d461917ba3
SHA-256: 8d1cbea3b627d492719ebc7821aec10e42a578e45b88441ec6a2bceffc29e046
Size: 7.81 MB - python3-test-3.6.8-37.el8.x86_64.rpm
MD5: b1ea323ad4b7465ac2f695a252dad3c0
SHA-256: 7705617ef7238c40dad3990b605b39cee32a924e5948a3ca2fa09aad209f2c34
Size: 8.63 MB - python3-tkinter-3.6.8-37.el8.x86_64.rpm
MD5: f67d331f74a60fa6cee4c294c281056a
SHA-256: ea329a5551cffe976c94da45f2fe21f34decdc85cbc71286fcec933b19361b35
Size: 369.85 kB - platform-python-3.6.8-37.el8.i686.rpm
MD5: 2dc49948a94252a4f9616b3fb6227259
SHA-256: 033d77fd14f1d29a4d91979d7f5667510687f04c4e515a5c051174acc10a9bda
Size: 82.98 kB - platform-python-debug-3.6.8-37.el8.i686.rpm
MD5: 2537fd4db58eedced0d2b092848106d9
SHA-256: 5c32dbcf80e0194c28dcc880b05059f795180b8409797c6b2354b89b3eb4aff5
Size: 2.72 MB - platform-python-devel-3.6.8-37.el8.i686.rpm
MD5: 3c0a004f3cc1b2d279d5c5ed3b089289
SHA-256: 871dda14b54b6e4d6b1ac1e6faaf9da7e64c84b6498844ab7b9108a71ea948ba
Size: 246.94 kB - python3-idle-3.6.8-37.el8.i686.rpm
MD5: 6e5e35b929d19921de9448d91609cbda
SHA-256: 6f4e2f68dec9c22b825978d118d60b0b01eaff16038cc0c95eaeaba1d885c2df
Size: 824.51 kB - python3-libs-3.6.8-37.el8.i686.rpm
MD5: 4e82767601a3177e38fbf9ad061796d8
SHA-256: fff854379814f9dbc47246d7a230898bd0ef83b47cafd4bdbdaab6088cbfe9c8
Size: 7.88 MB - python3-test-3.6.8-37.el8.i686.rpm
MD5: 298ce9a928ad73aeaa4f05cc82688a91
SHA-256: 930e48ab50b986c6372ca41e78b8968b30b82112a3a6cb7820af692666c9f1eb
Size: 8.65 MB - python3-tkinter-3.6.8-37.el8.i686.rpm
MD5: 6054d1a3c293fb13f3d4e78d74b210b4
SHA-256: ebe4010732dd343ea95bed1885aebabdadb121d3a2f845f6197ffdbe2d5feca7
Size: 371.29 kB