Lucene search

K
centosCentOS ProjectCESA-2020:0850
HistoryMar 18, 2020 - 7:33 p.m.

python3 security update

2020-03-1819:33:57
CentOS Project
lists.centos.org
659

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.9 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.8%

CentOS Errata and Security Advisory CESA-2020:0850

pip is a package management system used to install and manage software packages written in Python. Many packages can be found in the Python Package Index (PyPI). pip is a recursive acronym that can stand for either “Pip Installs Packages” or “Pip Installs Python”.

Security Fix(es):

  • python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)

  • python-urllib3: CRLF injection due to not encoding the ‘\r\n’ sequence leading to possible attack on internal service (CVE-2019-11236)

  • python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

  • python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-March/085787.html

Affected packages:
python3-pip

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:0850

OSVersionArchitecturePackageVersionFilename
CentOS7noarchpython3-pip< 9.0.3-7.el7_7python3-pip-9.0.3-7.el7_7.noarch.rpm

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.9 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.8%