Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-2030

Опубликовано: 13 авг. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-2030: python security and bug fix update (MODERATE)

[2.7.5-86.0.1]

  • Add Oracle Linux distribution in platform.py [orabug 20812544]

[2.7.5-86]

  • Security fix for CVE-2019-10160 Resolves: rhbz#1718388

[2.7.5-85]

  • Security fix for CVE-2019-9948 Resolves: rhbz#1704174

[2.7.5-84]

  • Disallow control chars in http URLs
  • Fixes CVE-2019-9740 and CVE-2019-9947 Resolves: rhbz#1704362 and rhbz#1703530

[2.7.5-83]

  • Remove unversioned obsoletes Resolves: rhbz#1703600

[2.7.5-82]

  • Updated fix for CVE-2019-9636 Resolves: rhbz#1689317

[2.7.5-81]

  • Security fix for CVE-2019-9636 Resolves: rhbz#1689317

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

python

2.7.5-86.0.1.el7

python-debug

2.7.5-86.0.1.el7

python-devel

2.7.5-86.0.1.el7

python-libs

2.7.5-86.0.1.el7

python-test

2.7.5-86.0.1.el7

python-tools

2.7.5-86.0.1.el7

tkinter

2.7.5-86.0.1.el7

Oracle Linux x86_64

python

2.7.5-86.0.1.el7

python-debug

2.7.5-86.0.1.el7

python-devel

2.7.5-86.0.1.el7

python-libs

2.7.5-86.0.1.el7

python-test

2.7.5-86.0.1.el7

python-tools

2.7.5-86.0.1.el7

tkinter

2.7.5-86.0.1.el7

Связанные уязвимости

oracle-oval
больше 5 лет назад

ELSA-2019-3520: python3 security and bug fix update (MODERATE)

rocky
больше 5 лет назад

Moderate: python27:2.7 security and bug fix update

oracle-oval
больше 5 лет назад

ELSA-2019-3335: python27:2.7 security and bug fix update (MODERATE)

CVSS3: 9.1
ubuntu
около 6 лет назад

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

CVSS3: 7.4
redhat
около 6 лет назад

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.