(RHSA-2019:3335) Moderate: python27:2.7 security and bug fix update

ID RHSA-2019:3335
Type redhat
Reporter RedHat
Modified 2019-11-06T00:47:34


Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.

Security Fix(es):

  • numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)

  • python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)

  • python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)

  • python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)

  • python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)

  • python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.