概述
Moderate: python-virtualenv security update
类型/严重性
Security Advisory: Moderate
Red Hat Lightspeed patch analysis
标题
An update for python-virtualenv is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
描述
The virtualenv tool creates isolated Python environments. The virtualenv tool is a successor to workingenv, and an extension of virtual-python.
Security Fix(es):
- python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)
- python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)
- python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
受影响的产品
-
Red Hat Enterprise Linux Server 7 x86_64
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
-
Red Hat Enterprise Linux Workstation 7 x86_64
-
Red Hat Enterprise Linux Desktop 7 x86_64
-
Red Hat Enterprise Linux for IBM z Systems 7 s390x
-
Red Hat Enterprise Linux for Power, big endian 7 ppc64
-
Red Hat Enterprise Linux for Scientific Computing 7 x86_64
-
Red Hat Enterprise Linux for Power, little endian 7 ppc64le
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
修复
-
BZ - 1643829
- CVE-2018-18074 python-requests: Redirect from HTTPS to HTTP does not remove Authorization header
-
BZ - 1649153
- CVE-2018-20060 python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure
-
BZ - 1700824
- CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
注::
可能有这些软件包的更新版本。
点击软件包名称查看详情。
Red Hat Enterprise Linux Server 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| x86_64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| x86_64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Workstation 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| x86_64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Desktop 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| x86_64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux for IBM z Systems 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| s390x |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux for Power, big endian 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| ppc64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux for Scientific Computing 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| x86_64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux for Power, little endian 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| ppc64le |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| s390x |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| ppc64 |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7
| SRPM |
|
python-virtualenv-15.1.0-4.el7_8.src.rpm
|
SHA-256: 8cbeecfe8741565a72acf16b26f3ddf4cb81beb086494cee0d1a3e59fd74cb2d |
| ppc64le |
|
python-virtualenv-15.1.0-4.el7_8.noarch.rpm
|
SHA-256: c4ff1787e880e20be5fdf35d4e0a438fffa9f4a0f0a87c7967fb6cba12827d80 |