-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: python security update Advisory ID: RHSA-2020:1131-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:1131 Issue date: 2020-03-31 CVE Names: CVE-2018-20852 CVE-2019-16056 ==================================================================== 1. Summary: An update for python is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1740347 - CVE-2018-20852 python: Cookie domain check returns incorrect results 1749839 - CVE-2019-16056 python: email.utils.parseaddr wrongly parses email addresses 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: python-2.7.5-88.el7.src.rpm x86_64: python-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.i686.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-libs-2.7.5-88.el7.i686.rpm python-libs-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: python-debug-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-devel-2.7.5-88.el7.x86_64.rpm python-test-2.7.5-88.el7.x86_64.rpm python-tools-2.7.5-88.el7.x86_64.rpm tkinter-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: python-2.7.5-88.el7.src.rpm x86_64: python-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.i686.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-devel-2.7.5-88.el7.x86_64.rpm python-libs-2.7.5-88.el7.i686.rpm python-libs-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: python-debug-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-test-2.7.5-88.el7.x86_64.rpm python-tools-2.7.5-88.el7.x86_64.rpm tkinter-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: python-2.7.5-88.el7.src.rpm ppc64: python-2.7.5-88.el7.ppc64.rpm python-debuginfo-2.7.5-88.el7.ppc.rpm python-debuginfo-2.7.5-88.el7.ppc64.rpm python-devel-2.7.5-88.el7.ppc64.rpm python-libs-2.7.5-88.el7.ppc.rpm python-libs-2.7.5-88.el7.ppc64.rpm ppc64le: python-2.7.5-88.el7.ppc64le.rpm python-debuginfo-2.7.5-88.el7.ppc64le.rpm python-devel-2.7.5-88.el7.ppc64le.rpm python-libs-2.7.5-88.el7.ppc64le.rpm s390x: python-2.7.5-88.el7.s390x.rpm python-debuginfo-2.7.5-88.el7.s390.rpm python-debuginfo-2.7.5-88.el7.s390x.rpm python-devel-2.7.5-88.el7.s390x.rpm python-libs-2.7.5-88.el7.s390.rpm python-libs-2.7.5-88.el7.s390x.rpm x86_64: python-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.i686.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-devel-2.7.5-88.el7.x86_64.rpm python-libs-2.7.5-88.el7.i686.rpm python-libs-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: python-debug-2.7.5-88.el7.ppc64.rpm python-debuginfo-2.7.5-88.el7.ppc64.rpm python-test-2.7.5-88.el7.ppc64.rpm python-tools-2.7.5-88.el7.ppc64.rpm tkinter-2.7.5-88.el7.ppc64.rpm ppc64le: python-debug-2.7.5-88.el7.ppc64le.rpm python-debuginfo-2.7.5-88.el7.ppc64le.rpm python-test-2.7.5-88.el7.ppc64le.rpm python-tools-2.7.5-88.el7.ppc64le.rpm tkinter-2.7.5-88.el7.ppc64le.rpm s390x: python-debug-2.7.5-88.el7.s390x.rpm python-debuginfo-2.7.5-88.el7.s390x.rpm python-test-2.7.5-88.el7.s390x.rpm python-tools-2.7.5-88.el7.s390x.rpm tkinter-2.7.5-88.el7.s390x.rpm x86_64: python-debug-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-test-2.7.5-88.el7.x86_64.rpm python-tools-2.7.5-88.el7.x86_64.rpm tkinter-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: python-2.7.5-88.el7.src.rpm x86_64: python-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.i686.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-devel-2.7.5-88.el7.x86_64.rpm python-libs-2.7.5-88.el7.i686.rpm python-libs-2.7.5-88.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: python-debug-2.7.5-88.el7.x86_64.rpm python-debuginfo-2.7.5-88.el7.x86_64.rpm python-test-2.7.5-88.el7.x86_64.rpm python-tools-2.7.5-88.el7.x86_64.rpm tkinter-2.7.5-88.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-20852 https://access.redhat.com/security/cve/CVE-2019-16056 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXoOc2dzjgjWX9erEAQgMqw/8CjLTpqxmjWxF2lLq1S1opJvGrlNlfGto pwdl5wFGvl3KnObf0oZY8687sxeOaVfJbWyoouDJuTixebsBwwbYrJy/7RS1GKR8 o5G39DJB9nm49wEZLiVI7nh5dJnlfz2/o7p07jfk7W4fKDW8eVKXaBxLr264Aw4C sWDe7JfWZzVX6fmN4utkWZdoTMy0ofkolC6bdHt4k6Eo/P51fpBYKtpwQoZYkkSN WGfn+v8z2X0ChQlBS6pwZQmU6N7LyDh2K1TDTfuZ9cNHIlCgfgKvK1nx4rnmMAQb 1D1knpu6SX1XUaHNepOunkpfIdrLgauBZ6V1Tp6SoIOEJepznddO1NcFyalJ/6o2 qul39WfE0O2Wxcw/GOrVf4N64M+5g76xJqJnVO0JXyc3G8tuqH0Kw27mn9eC8M4F 2L8OQZdyLhMRtpbviJKKGOPutHVzk979oiTh2AVFoW0s542Jg6LsMSiHL/PkKmQj mhyk/Bw6NFpDNynLWuk50HZ7cdDLavEhD9F9woeiAVv28IIkp3q3cwkqvPvblVgW FsJ9kRKpYcBFA+ECtYukmkEFwmBZpcKTNWvE90sJy5hKvmCCOeyPH7b0CjFtpZIJ OdNwzTrjyWhVSLW/BtH3s1HUp884Eul6g14FM3FV1jQ5BJyucYyfuQYn1uWiyXQt SAuUZ9rWhH0=xa44 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce