Rocky Linux 8 : python38:3.8 and python38-devel:3.8 (RLSA-2022:1764)

high Nessus Plugin ID 184956

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2022:1764 advisory.

- There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
(CVE-2021-3733)

- A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability. (CVE-2021-3737)

- lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available. (CVE-2021-43818)

- A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14. (CVE-2022-0391)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.rockylinux.org/RLSA-2022:1764

https://bugzilla.redhat.com/show_bug.cgi?id=1995162

https://bugzilla.redhat.com/show_bug.cgi?id=1995234

https://bugzilla.redhat.com/show_bug.cgi?id=2004587

https://bugzilla.redhat.com/show_bug.cgi?id=2006789

https://bugzilla.redhat.com/show_bug.cgi?id=2032569

https://bugzilla.redhat.com/show_bug.cgi?id=2047376

Plugin Details

Severity: High

ID: 184956

File Name: rocky_linux_RLSA-2022-1764.nasl

Version: 1.3

Type: local

Published: 11/7/2023

Updated: 12/22/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-43818

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-0391

Vulnerability Information

CPE: cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:cython-debugsource, p-cpe:/a:rocky:linux:pyyaml-debugsource, p-cpe:/a:rocky:linux:numpy-debugsource, p-cpe:/a:rocky:linux:python-cffi-debugsource, p-cpe:/a:rocky:linux:python-cryptography-debugsource, p-cpe:/a:rocky:linux:python-lxml-debugsource, p-cpe:/a:rocky:linux:python-markupsafe-debugsource, p-cpe:/a:rocky:linux:python-psutil-debugsource, p-cpe:/a:rocky:linux:python-psycopg2-debugsource, p-cpe:/a:rocky:linux:python38, p-cpe:/a:rocky:linux:python38-cython, p-cpe:/a:rocky:linux:python38-cython-debuginfo, p-cpe:/a:rocky:linux:python38-pymysql, p-cpe:/a:rocky:linux:python38-asn1crypto, p-cpe:/a:rocky:linux:python38-atomicwrites, p-cpe:/a:rocky:linux:python38-attrs, p-cpe:/a:rocky:linux:python38-babel, p-cpe:/a:rocky:linux:python38-cffi, p-cpe:/a:rocky:linux:python38-cffi-debuginfo, p-cpe:/a:rocky:linux:python38-chardet, p-cpe:/a:rocky:linux:python38-cryptography, p-cpe:/a:rocky:linux:python38-cryptography-debuginfo, p-cpe:/a:rocky:linux:python38-debug, p-cpe:/a:rocky:linux:python38-debuginfo, p-cpe:/a:rocky:linux:python38-debugsource, p-cpe:/a:rocky:linux:python38-devel, p-cpe:/a:rocky:linux:python38-idle, p-cpe:/a:rocky:linux:python38-idna, p-cpe:/a:rocky:linux:python38-jinja2, p-cpe:/a:rocky:linux:python38-libs, p-cpe:/a:rocky:linux:python38-lxml, p-cpe:/a:rocky:linux:python38-lxml-debuginfo, p-cpe:/a:rocky:linux:python38-markupsafe, p-cpe:/a:rocky:linux:python38-markupsafe-debuginfo, p-cpe:/a:rocky:linux:python38-mod_wsgi, p-cpe:/a:rocky:linux:python38-more-itertools, p-cpe:/a:rocky:linux:python38-numpy, p-cpe:/a:rocky:linux:python38-numpy-debuginfo, p-cpe:/a:rocky:linux:python38-numpy-doc, p-cpe:/a:rocky:linux:python38-numpy-f2py, p-cpe:/a:rocky:linux:python38-packaging, p-cpe:/a:rocky:linux:python38-pip, p-cpe:/a:rocky:linux:python38-pip-wheel, p-cpe:/a:rocky:linux:python38-pluggy, p-cpe:/a:rocky:linux:python38-ply, p-cpe:/a:rocky:linux:python38-psutil, p-cpe:/a:rocky:linux:python38-psutil-debuginfo, p-cpe:/a:rocky:linux:python38-psycopg2, p-cpe:/a:rocky:linux:python38-psycopg2-debuginfo, p-cpe:/a:rocky:linux:python38-psycopg2-doc, p-cpe:/a:rocky:linux:python38-psycopg2-tests, p-cpe:/a:rocky:linux:python38-py, p-cpe:/a:rocky:linux:python38-pycparser, p-cpe:/a:rocky:linux:python38-pyparsing, p-cpe:/a:rocky:linux:python38-pysocks, p-cpe:/a:rocky:linux:python38-pytest, p-cpe:/a:rocky:linux:python38-pytz, p-cpe:/a:rocky:linux:python38-pyyaml, p-cpe:/a:rocky:linux:python38-pyyaml-debuginfo, p-cpe:/a:rocky:linux:python38-requests, p-cpe:/a:rocky:linux:python38-rpm-macros, p-cpe:/a:rocky:linux:python38-scipy, p-cpe:/a:rocky:linux:python38-scipy-debuginfo, p-cpe:/a:rocky:linux:python38-setuptools, p-cpe:/a:rocky:linux:python38-setuptools-wheel, p-cpe:/a:rocky:linux:python38-six, p-cpe:/a:rocky:linux:python38-test, p-cpe:/a:rocky:linux:python38-tkinter, p-cpe:/a:rocky:linux:python38-urllib3, p-cpe:/a:rocky:linux:python38-wcwidth, p-cpe:/a:rocky:linux:python38-wheel, p-cpe:/a:rocky:linux:python38-wheel-wheel, p-cpe:/a:rocky:linux:scipy-debugsource

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/10/2022

Vulnerability Publication Date: 9/20/2021

Reference Information

CVE: CVE-2021-3733, CVE-2021-3737, CVE-2021-43818, CVE-2022-0391

IAVA: 2021-A-0497-S