An update for python-pip is now available for openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1944
Final
1.0
1.0
2022-09-23
Initial
2022-09-23
2022-09-23
openEuler SA Tool V1.0
2022-09-23
python-pip security update
An update for python-pip is now available for openEuler-20.03-LTS-SP3.
pip is the package installer for Python. You can use pip to install packages from the Python Package Index and other indexes. %global bashcompdir %(b=$(pkg-config --variable=completionsdir bash-completion 2>/dev/null); echo ${b:-/bash_completion.d}) Name: python-pip Version: 21.3.1 Release: 1 Summary: A tool for installing and managing Python packages License: MIT and Python and ASL 2.0 and BSD and ISC and LGPLv2 and MPLv2.0 and (ASL 2.0 or BSD) URL: http://www.pip-installer.org Source0: BuildArch: noarch Patch1: allow-stripping-given-prefix-from-wheel-RECORD-files. Patch2: emit-a-warning-when-running-with-root-privileges.patch Patch6000: dummy-certifi.patch
Security Fix(es):
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.(CVE-2021-33503)
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.(CVE-2020-14422)
An update for python-pip is now available for openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
python-pip
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1944
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-33503
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-14422
https://nvd.nist.gov/vuln/detail/CVE-2021-33503
https://nvd.nist.gov/vuln/detail/CVE-2020-14422
openEuler-20.03-LTS-SP3
python3-pip-20.2.2-6.oe1.noarch.rpm
python-pip-wheel-20.2.2-6.oe1.noarch.rpm
python2-pip-20.2.2-6.oe1.noarch.rpm
python-pip-help-20.2.2-6.oe1.noarch.rpm
python-pip-20.2.2-6.oe1.src.rpm
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
2022-09-23
CVE-2021-33503
openEuler-20.03-LTS-SP3
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
python-pip security update
2022-09-23
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1944
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
2022-09-23
CVE-2020-14422
openEuler-20.03-LTS-SP3
Medium
5.9
AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
python-pip security update
2022-09-23
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1944