-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: python36:3.6 security and bug fix update Advisory ID: RHSA-2021:4150-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4150 Issue date: 2021-11-09 CVE Names: CVE-2021-20270 CVE-2021-27291 ==================================================================== 1. Summary: An update for the python36:3.6 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1917971 - RFE: virtualenv to prefer wheels from /usr/share/pythonXY-wheels when creating environment for Python X.Y 1922136 - CVE-2021-20270 python-pygments: Infinite loop in SML lexer may lead to DoS 1934199 - python3-scipy package provides scipy.test() that fails with exceptions 1940603 - CVE-2021-27291 python-pygments: ReDoS in multiple lexers 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: python-PyMySQL-0.10.1-2.module+el8.4.0+9657+a4b6a102.src.rpm python-distro-1.4.0-2.module+el8.1.0+3334+5cb623d7.src.rpm python-docs-3.6.7-2.module+el8.1.0+3334+5cb623d7.src.rpm python-docutils-0.14-12.module+el8.1.0+3334+5cb623d7.src.rpm python-nose-1.3.7-31.module+el8.5.0+12207+5c5719bc.src.rpm python-pygments-2.2.0-22.module+el8.5.0+10789+e4939b94.src.rpm python-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9.src.rpm python-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec.src.rpm python-virtualenv-15.1.0-21.module+el8.5.0+12207+5c5719bc.src.rpm python-wheel-0.31.1-3.module+el8.5.0+12207+5c5719bc.src.rpm python36-3.6.8-38.module+el8.5.0+12207+5c5719bc.src.rpm scipy-1.0.0-21.module+el8.5.0+10916+41bd434d.src.rpm aarch64: python-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python-pymongo-debugsource-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-bson-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-bson-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-pymongo-gridfs-3.7.0-1.module+el8.4.0+9670+1849b5f9.aarch64.rpm python3-scipy-1.0.0-21.module+el8.5.0+10916+41bd434d.aarch64.rpm python3-scipy-debuginfo-1.0.0-21.module+el8.5.0+10916+41bd434d.aarch64.rpm python3-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec.aarch64.rpm python36-3.6.8-38.module+el8.5.0+12207+5c5719bc.aarch64.rpm python36-debug-3.6.8-38.module+el8.5.0+12207+5c5719bc.aarch64.rpm python36-devel-3.6.8-38.module+el8.5.0+12207+5c5719bc.aarch64.rpm scipy-debugsource-1.0.0-21.module+el8.5.0+10916+41bd434d.aarch64.rpm noarch: python-nose-docs-1.3.7-31.module+el8.5.0+12207+5c5719bc.noarch.rpm python-pymongo-doc-3.7.0-1.module+el8.4.0+9670+1849b5f9.noarch.rpm python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6646+6b4b10ec.noarch.rpm python-virtualenv-doc-15.1.0-21.module+el8.5.0+12207+5c5719bc.noarch.rpm python3-PyMySQL-0.10.1-2.module+el8.4.0+9657+a4b6a102.noarch.rpm python3-distro-1.4.0-2.module+el8.1.0+3334+5cb623d7.noarch.rpm python3-docs-3.6.7-2.module+el8.1.0+3334+5cb623d7.noarch.rpm python3-docutils-0.14-12.module+el8.1.0+3334+5cb623d7.noarch.rpm python3-nose-1.3.7-31.module+el8.5.0+12207+5c5719bc.noarch.rpm python3-pygments-2.2.0-22.module+el8.5.0+10789+e4939b94.noarch.rpm python3-virtualenv-15.1.0-21.module+el8.5.0+12207+5c5719bc.noarch.rpm python3-wheel-0.31.1-3.module+el8.5.0+12207+5c5719bc.noarch.rpm python3-wheel-wheel-0.31.1-3.module+el8.5.0+12207+5c5719bc.noarch.rpm python36-rpm-macros-3.6.8-38.module+el8.5.0+12207+5c5719bc.noarch.rpm ppc64le: python-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python-pymongo-debugsource-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-bson-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-bson-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-pymongo-gridfs-3.7.0-1.module+el8.4.0+9670+1849b5f9.ppc64le.rpm python3-scipy-1.0.0-21.module+el8.5.0+10916+41bd434d.ppc64le.rpm python3-scipy-debuginfo-1.0.0-21.module+el8.5.0+10916+41bd434d.ppc64le.rpm python3-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec.ppc64le.rpm python36-3.6.8-38.module+el8.5.0+12207+5c5719bc.ppc64le.rpm python36-debug-3.6.8-38.module+el8.5.0+12207+5c5719bc.ppc64le.rpm python36-devel-3.6.8-38.module+el8.5.0+12207+5c5719bc.ppc64le.rpm scipy-debugsource-1.0.0-21.module+el8.5.0+10916+41bd434d.ppc64le.rpm s390x: python-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python-pymongo-debugsource-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-bson-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-bson-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-pymongo-gridfs-3.7.0-1.module+el8.4.0+9670+1849b5f9.s390x.rpm python3-scipy-1.0.0-21.module+el8.5.0+10916+41bd434d.s390x.rpm python3-scipy-debuginfo-1.0.0-21.module+el8.5.0+10916+41bd434d.s390x.rpm python3-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec.s390x.rpm python36-3.6.8-38.module+el8.5.0+12207+5c5719bc.s390x.rpm python36-debug-3.6.8-38.module+el8.5.0+12207+5c5719bc.s390x.rpm python36-devel-3.6.8-38.module+el8.5.0+12207+5c5719bc.s390x.rpm scipy-debugsource-1.0.0-21.module+el8.5.0+10916+41bd434d.s390x.rpm x86_64: python-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python-pymongo-debugsource-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-bson-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-bson-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-pymongo-debuginfo-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-pymongo-gridfs-3.7.0-1.module+el8.4.0+9670+1849b5f9.x86_64.rpm python3-scipy-1.0.0-21.module+el8.5.0+10916+41bd434d.x86_64.rpm python3-scipy-debuginfo-1.0.0-21.module+el8.5.0+10916+41bd434d.x86_64.rpm python3-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec.x86_64.rpm python36-3.6.8-38.module+el8.5.0+12207+5c5719bc.x86_64.rpm python36-debug-3.6.8-38.module+el8.5.0+12207+5c5719bc.x86_64.rpm python36-devel-3.6.8-38.module+el8.5.0+12207+5c5719bc.x86_64.rpm scipy-debugsource-1.0.0-21.module+el8.5.0+10916+41bd434d.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-20270 https://access.redhat.com/security/cve/CVE-2021-27291 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYYrcYtzjgjWX9erEAQhLVQ/8CYgQ48UJMjhckLf90nqz7aEUsdDHDa7A U+0PQF1IIl00XxpVqeS9+50Pd1mDNZX7OrtPmREVlty1CopMsfGZQXlLKqXOG2s4 u7MrIafip9PKHsISbXOqWDvW+GHndV+5umSpfWbUcwvUe+AlQSI7PcQ4bCdSiulO LMxp98+2NnjmMdch6NcEFbvVOiBtG2gPhlqYX00S0OrIRtK1aMbr7TAhW99e8tkC zuq/0NNqZRRoyD2td30n/QEzA1O+gg0iNQKbiGMnIdKEFcvVIcEwmADanAkuWq0f S4I4Ueo1vvZjSIfcXs9O/x8vvjWPRdmKYyfYV01J1uDrAgmwYROsbIwBGCsWAL2B fJ1pzLlIUY4d6U3oX9M+Kx9FUzgAJkOwS+1RKevI6IHs6+rImUMVqVSc14XdFJFN VaHwPjRSn+vlUqwKQj5PNGqDPV6ej8kES23ufS4DP9RaVsR/5TnZJhaNAVA4RJKa fwY5BZWrGo/2jEs4CeUx+ys80tjJSt1Rfd8SzLkQIBD2Poacaw3q7QH2i/S5jsa7 KMnZYqUYHctINDPDHwr3jjwbiLhbws3xMPG3Tvr/1TyE60bASUIv8+PZLI9/L+qV tsYi73ty7berVxcihuHcZCIBwO3kJFTFuJ6Qbnm7/kxQmRU2ZiaWyVnXdc+SSikN okueDT/BY9g=Il5M -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce