Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:4160

Опубликовано: 09 нояб. 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: python39:3.9 and python39-devel:3.9 security update

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • python: Information disclosure via pydoc (CVE-2021-3426)

  • python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)

  • python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957)

  • python-ipaddress: Improper input validation of octal strings (CVE-2021-29921)

  • python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503)

  • python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572)

  • python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
python39-cffix86_642.module+el8.4.0+574+843c4898python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpm
python39-cryptographyx86_642.module+el8.5.0+673+10283621python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpm
python39-idnanoarch3.module+el8.4.0+574+843c4898python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm
python39-numpyx86_643.module+el8.5.0+673+10283621python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
python39-numpy-docnoarch3.module+el8.5.0+673+10283621python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm
python39-numpy-f2pyx86_643.module+el8.5.0+673+10283621python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm
python39-psutilx86_644.module+el8.5.0+673+10283621python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpm
python39-psycopg2x86_642.module+el8.6.0+795+de4edbccpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
python39-psycopg2-docx86_642.module+el8.6.0+795+de4edbccpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm
python39-psycopg2-testsx86_642.module+el8.6.0+795+de4edbccpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 3 лет назад

ELSA-2021-4160: python39:3.9 and python39-devel:3.9 security update (MODERATE)

oracle-oval
больше 3 лет назад

ELSA-2021-4162: python38:3.8 and python38-devel:3.8 security update (MODERATE)

rocky
больше 3 лет назад

Moderate: python38:3.8 and python38-devel:3.8 security update

CVSS3: 6.1
ubuntu
около 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

CVSS3: 6.1
redhat
около 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.