RedHat: RHSA-2020-1346:01 Moderate: python security update
Summary
Python is an interpreted, interactive, object-oriented programming
language, which includes modules, classes, exceptions, very high level
dynamic data types and dynamic typing. Python supports interfaces to many
system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK
method in difflib (CVE-2018-1061)
* python: Missing salt initialization in _elementtree.c module
(CVE-2018-14647)
* python: CRLF injection via the query part of the url passed to urlopen()
(CVE-2019-9740)
* python: CRLF injection via the path part of the url passed to urlopen()
(CVE-2019-9947)
* python: Undocumented local_file protocol allows remote attackers to
bypass protection mechanisms (CVE-2019-9948)
* python: DOS via regular expression catastrophic backtracking in apop()
method in pop3lib (CVE-2018-1060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2018-1060 https://access.redhat.com/security/cve/CVE-2018-1061 https://access.redhat.com/security/cve/CVE-2018-14647 https://access.redhat.com/security/cve/CVE-2019-9740 https://access.redhat.com/security/cve/CVE-2019-9947 https://access.redhat.com/security/cve/CVE-2019-9948 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source:
python-2.7.5-63.el7_4.src.rpm
x86_64:
python-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.i686.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-devel-2.7.5-63.el7_4.x86_64.rpm
python-libs-2.7.5-63.el7_4.i686.rpm
python-libs-2.7.5-63.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source:
python-2.7.5-63.el7_4.src.rpm
ppc64le:
python-2.7.5-63.el7_4.ppc64le.rpm
python-debuginfo-2.7.5-63.el7_4.ppc64le.rpm
python-devel-2.7.5-63.el7_4.ppc64le.rpm
python-libs-2.7.5-63.el7_4.ppc64le.rpm
x86_64:
python-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.i686.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-devel-2.7.5-63.el7_4.x86_64.rpm
python-libs-2.7.5-63.el7_4.i686.rpm
python-libs-2.7.5-63.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source:
python-2.7.5-63.el7_4.src.rpm
x86_64:
python-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.i686.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-devel-2.7.5-63.el7_4.x86_64.rpm
python-libs-2.7.5-63.el7_4.i686.rpm
python-libs-2.7.5-63.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64:
python-debug-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-test-2.7.5-63.el7_4.x86_64.rpm
python-tools-2.7.5-63.el7_4.x86_64.rpm
tkinter-2.7.5-63.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.4):
ppc64le:
python-debug-2.7.5-63.el7_4.ppc64le.rpm
python-debuginfo-2.7.5-63.el7_4.ppc64le.rpm
python-test-2.7.5-63.el7_4.ppc64le.rpm
python-tools-2.7.5-63.el7_4.ppc64le.rpm
tkinter-2.7.5-63.el7_4.ppc64le.rpm
x86_64:
python-debug-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-test-2.7.5-63.el7_4.x86_64.rpm
python-tools-2.7.5-63.el7_4.x86_64.rpm
tkinter-2.7.5-63.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.4):
x86_64:
python-debug-2.7.5-63.el7_4.x86_64.rpm
python-debuginfo-2.7.5-63.el7_4.x86_64.rpm
python-test-2.7.5-63.el7_4.x86_64.rpm
python-tools-2.7.5-63.el7_4.x86_64.rpm
tkinter-2.7.5-63.el7_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for python is now available for Red Hat Enterprise Linux 7.4Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended UpdateSupport, and Red Hat Enterprise Linux 7.4 Update Services for SAPSolutions.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64
Bugs Fixed
1549191 - CVE-2018-1060 python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
1549192 - CVE-2018-1061 python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
1631822 - CVE-2018-14647 python: Missing salt initialization in _elementtree.c module
1688169 - CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()
1695570 - CVE-2019-9948 python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
1695572 - CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()