Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
Security Fix(es):
numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)
python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)
python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)
python-urllib3: CRLF injection due to not encoding the ‘\r\n’ sequence leading to possible attack on internal service (CVE-2019-11236)
python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1667950
bugzilla.redhat.com/show_bug.cgi?id=1680967
bugzilla.redhat.com/show_bug.cgi?id=1688169
bugzilla.redhat.com/show_bug.cgi?id=1695570
bugzilla.redhat.com/show_bug.cgi?id=1695572
bugzilla.redhat.com/show_bug.cgi?id=1700824
bugzilla.redhat.com/show_bug.cgi?id=1700993
bugzilla.redhat.com/show_bug.cgi?id=1702473
bugzilla.redhat.com/show_bug.cgi?id=1709599
bugzilla.redhat.com/show_bug.cgi?id=1718398
bugzilla.redhat.com/show_bug.cgi?id=1734126
errata.rockylinux.org/RLSA-2019:3335