drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in python-pip
Name: |
Mehrere Probleme in python-pip |
|
ID: |
RHSA-2020:0850-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Di, 17. März 2020, 18:19 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2019-11236
https://access.redhat.com/security/cve/CVE-2018-20060
https://access.redhat.com/security/cve/CVE-2019-11324
https://access.redhat.com/security/cve/CVE-2018-18074 |
|
Applikationen: |
pip |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: python-pip security update Advisory ID: RHSA-2020:0850-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0850 Issue date: 2020-03-17 CVE Names: CVE-2018-18074 CVE-2018-20060 CVE-2019-11236 CVE-2019-11324 =====================================================================
1. Summary:
An update for python-pip is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch
3. Description:
TODO: add package description
Security Fix(es):
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1643829 - CVE-2018-18074 python-requests: Redirect from HTTPS to HTTP does not remove Authorization header 1649153 - CVE-2018-20060 python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure 1700824 - CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service 1702473 - CVE-2019-11324 python-urllib3: Certification mishandle when error should be thrown
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: python-pip-9.0.3-7.el7_7.src.rpm
noarch: python3-pip-9.0.3-7.el7_7.noarch.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: python-pip-9.0.3-7.el7_7.src.rpm
noarch: python3-pip-9.0.3-7.el7_7.noarch.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: python-pip-9.0.3-7.el7_7.src.rpm
noarch: python3-pip-9.0.3-7.el7_7.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: python-pip-9.0.3-7.el7_7.src.rpm
noarch: python3-pip-9.0.3-7.el7_7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-18074 https://access.redhat.com/security/cve/CVE-2018-20060 https://access.redhat.com/security/cve/CVE-2019-11236 https://access.redhat.com/security/cve/CVE-2019-11324 https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXnD4ztzjgjWX9erEAQjiwRAAg3oAuhDzQwW98TRt+gZuNOJSGuAF/iUH 27o6fF/+ELDX2LdQiRNjBG3tKZHrw+EmLSJoBXAQVtHD/98TTsbBZ0yXSjrk2ch0 wurLYrAdC9bopAOnZ2reiqV0sNEaEU+wCV4vlOUSggY6M4AXkT9d4/89uwq7cnhC EFePQWFbUXf+0zodbyySq8mvPdLNuXEaBjJFo2rZrSryyrosqiDQl4d3XvoVbpsi mmO+hv6Ykr8oWgVKkNekFEMTMs3gmfOtXYzLL8erTAbvHjeqp4ilQYaOc4vjB7Fk A8Dmmf/dWIjtFhPbyN7zPhPC6wD0hXDsCazsDZQVxCFbJNTaI4NFngDFAsfwXBjD quLdD/DRhN4liC6VHCINmfDXA6RRw015y+Z2Q6i1OpfN6x4YLdjz5+750PcpEyQd IZVmdmVdnHUhZBZgB0XhqgpxHj2CS2mtzWteJTHNP8Tyb2RVtoqnh8n85wpEADdv PQsjwManDM/7vTlRz5BlePYUSQ7AUJ6njB8fpC3x0YG9k2NTNyggvHibFOm/kxMe HzW25vfcDFy9am/GSTDlqHEa08CyhOb5UH9QUumDvgcoVolmrTeB9c6yCXdJA9ea 8962mWoUcObGc5BTZnY5jyKuM92263QGYsW+NYAYHHXaC0R/N9L2reLur06H2sFV pz9kXzhPxys= =a4ip -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|