import python2-2.7.18-8.module+el8.6.0+12703+136ebe63
This commit is contained in:
parent
85f83730ed
commit
8842e62e53
35
SOURCES/00366-CVE-2021-3733.patch
Normal file
35
SOURCES/00366-CVE-2021-3733.patch
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Lumir Balhar <lbalhar@redhat.com>
|
||||||
|
Date: Tue, 14 Sep 2021 11:34:43 +0200
|
||||||
|
Subject: [PATCH] 00366-CVE-2021-3733.patch
|
||||||
|
|
||||||
|
00366 #
|
||||||
|
CVE-2021-3733: Fix ReDoS in urllib AbstractBasicAuthHandler
|
||||||
|
|
||||||
|
Fix Regular Expression Denial of Service (ReDoS) vulnerability in
|
||||||
|
urllib2.AbstractBasicAuthHandler. The ReDoS-vulnerable regex
|
||||||
|
has quadratic worst-case complexity and it allows cause a denial of
|
||||||
|
service when identifying crafted invalid RFCs. This ReDoS issue is on
|
||||||
|
the client side and needs remote attackers to control the HTTP server.
|
||||||
|
|
||||||
|
Backported from Python 3 together with another backward-compatible
|
||||||
|
improvement of the regex from fix for CVE-2020-8492.
|
||||||
|
|
||||||
|
Co-authored-by: Yeting Li <liyt@ios.ac.cn>
|
||||||
|
---
|
||||||
|
Lib/urllib2.py | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/Lib/urllib2.py b/Lib/urllib2.py
|
||||||
|
index fd19e1ae943..e286583ecba 100644
|
||||||
|
--- a/Lib/urllib2.py
|
||||||
|
+++ b/Lib/urllib2.py
|
||||||
|
@@ -858,7 +858,7 @@ class AbstractBasicAuthHandler:
|
||||||
|
|
||||||
|
# allow for double- and single-quoted realm values
|
||||||
|
# (single quotes are a violation of the RFC, but appear in the wild)
|
||||||
|
- rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
|
||||||
|
+ rx = re.compile('(?:[^,]*,)*[ \t]*([^ \t,]+)[ \t]+'
|
||||||
|
'realm=(["\']?)([^"\']*)\\2', re.I)
|
||||||
|
|
||||||
|
# XXX could pre-emptively send auth info already accepted (RFC 2617,
|
89
SOURCES/00368-CVE-2021-3737.patch
Normal file
89
SOURCES/00368-CVE-2021-3737.patch
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Lumir Balhar <lbalhar@redhat.com>
|
||||||
|
Date: Fri, 17 Sep 2021 07:56:50 +0200
|
||||||
|
Subject: [PATCH] 00368-CVE-2021-3737.patch
|
||||||
|
|
||||||
|
00368 #
|
||||||
|
CVE-2021-3737: http client infinite line reading (DoS) after a HTTP 100 Continue
|
||||||
|
|
||||||
|
Fixes http.client potential denial of service where it could get stuck reading
|
||||||
|
lines from a malicious server after a 100 Continue response.
|
||||||
|
|
||||||
|
Backported from Python 3.
|
||||||
|
|
||||||
|
Co-authored-by: Gregory P. Smith <greg@krypto.org>
|
||||||
|
Co-authored-by: Gen Xu <xgbarry@gmail.com>
|
||||||
|
---
|
||||||
|
Lib/httplib.py | 32 +++++++++++++++++++++++---------
|
||||||
|
Lib/test/test_httplib.py | 8 ++++++++
|
||||||
|
2 files changed, 31 insertions(+), 9 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/Lib/httplib.py b/Lib/httplib.py
|
||||||
|
index a63677477d5..f9a27619e62 100644
|
||||||
|
--- a/Lib/httplib.py
|
||||||
|
+++ b/Lib/httplib.py
|
||||||
|
@@ -365,6 +365,25 @@ class HTTPMessage(mimetools.Message):
|
||||||
|
# It's not a header line; skip it and try the next line.
|
||||||
|
self.status = 'Non-header line where header expected'
|
||||||
|
|
||||||
|
+
|
||||||
|
+def _read_headers(fp):
|
||||||
|
+ """Reads potential header lines into a list from a file pointer.
|
||||||
|
+ Length of line is limited by _MAXLINE, and number of
|
||||||
|
+ headers is limited by _MAXHEADERS.
|
||||||
|
+ """
|
||||||
|
+ headers = []
|
||||||
|
+ while True:
|
||||||
|
+ line = fp.readline(_MAXLINE + 1)
|
||||||
|
+ if len(line) > _MAXLINE:
|
||||||
|
+ raise LineTooLong("header line")
|
||||||
|
+ headers.append(line)
|
||||||
|
+ if len(headers) > _MAXHEADERS:
|
||||||
|
+ raise HTTPException("got more than %d headers" % _MAXHEADERS)
|
||||||
|
+ if line in (b'\r\n', b'\n', b''):
|
||||||
|
+ break
|
||||||
|
+ return headers
|
||||||
|
+
|
||||||
|
+
|
||||||
|
class HTTPResponse:
|
||||||
|
|
||||||
|
# strict: If true, raise BadStatusLine if the status line can't be
|
||||||
|
@@ -453,15 +472,10 @@ class HTTPResponse:
|
||||||
|
if status != CONTINUE:
|
||||||
|
break
|
||||||
|
# skip the header from the 100 response
|
||||||
|
- while True:
|
||||||
|
- skip = self.fp.readline(_MAXLINE + 1)
|
||||||
|
- if len(skip) > _MAXLINE:
|
||||||
|
- raise LineTooLong("header line")
|
||||||
|
- skip = skip.strip()
|
||||||
|
- if not skip:
|
||||||
|
- break
|
||||||
|
- if self.debuglevel > 0:
|
||||||
|
- print "header:", skip
|
||||||
|
+ skipped_headers = _read_headers(self.fp)
|
||||||
|
+ if self.debuglevel > 0:
|
||||||
|
+ print("headers:", skipped_headers)
|
||||||
|
+ del skipped_headers
|
||||||
|
|
||||||
|
self.status = status
|
||||||
|
self.reason = reason.strip()
|
||||||
|
diff --git a/Lib/test/test_httplib.py b/Lib/test/test_httplib.py
|
||||||
|
index b5fec9aa1ec..d05c0fc28d2 100644
|
||||||
|
--- a/Lib/test/test_httplib.py
|
||||||
|
+++ b/Lib/test/test_httplib.py
|
||||||
|
@@ -700,6 +700,14 @@ class BasicTest(TestCase):
|
||||||
|
resp = httplib.HTTPResponse(FakeSocket(body))
|
||||||
|
self.assertRaises(httplib.LineTooLong, resp.begin)
|
||||||
|
|
||||||
|
+ def test_overflowing_header_limit_after_100(self):
|
||||||
|
+ body = (
|
||||||
|
+ 'HTTP/1.1 100 OK\r\n'
|
||||||
|
+ 'r\n' * 32768
|
||||||
|
+ )
|
||||||
|
+ resp = httplib.HTTPResponse(FakeSocket(body))
|
||||||
|
+ self.assertRaises(httplib.HTTPException, resp.begin)
|
||||||
|
+
|
||||||
|
def test_overflowing_chunked_line(self):
|
||||||
|
body = (
|
||||||
|
'HTTP/1.1 200 OK\r\n'
|
@ -104,7 +104,7 @@ Summary: An interpreted, interactive, object-oriented programming language
|
|||||||
Name: %{python}
|
Name: %{python}
|
||||||
# Remember to also rebase python2-docs when changing this:
|
# Remember to also rebase python2-docs when changing this:
|
||||||
Version: 2.7.18
|
Version: 2.7.18
|
||||||
Release: 7%{?dist}
|
Release: 8%{?dist}
|
||||||
License: Python
|
License: Python
|
||||||
Group: Development/Languages
|
Group: Development/Languages
|
||||||
Requires: %{python}-libs%{?_isa} = %{version}-%{release}
|
Requires: %{python}-libs%{?_isa} = %{version}-%{release}
|
||||||
@ -729,6 +729,34 @@ Patch357: 00357-CVE-2021-3177.patch
|
|||||||
# Main BZ: https://bugzilla.redhat.com/show_bug.cgi?id=1928904
|
# Main BZ: https://bugzilla.redhat.com/show_bug.cgi?id=1928904
|
||||||
Patch359: 00359-CVE-2021-23336.patch
|
Patch359: 00359-CVE-2021-23336.patch
|
||||||
|
|
||||||
|
# 00366 # e76b05ea3313854adf80e290c07d5b38fef606bb
|
||||||
|
# CVE-2021-3733: Fix ReDoS in urllib AbstractBasicAuthHandler
|
||||||
|
#
|
||||||
|
# Fix Regular Expression Denial of Service (ReDoS) vulnerability in
|
||||||
|
# urllib2.AbstractBasicAuthHandler. The ReDoS-vulnerable regex
|
||||||
|
# has quadratic worst-case complexity and it allows cause a denial of
|
||||||
|
# service when identifying crafted invalid RFCs. This ReDoS issue is on
|
||||||
|
# the client side and needs remote attackers to control the HTTP server.
|
||||||
|
#
|
||||||
|
# Backported from Python 3 together with another backward-compatible
|
||||||
|
# improvement of the regex from fix for CVE-2020-8492.
|
||||||
|
#
|
||||||
|
# Upstream: https://bugs.python.org/issue43075
|
||||||
|
# Tracking bug: https://bugzilla.redhat.com/show_bug.cgi?id=1995234
|
||||||
|
Patch366: 00366-CVE-2021-3733.patch
|
||||||
|
|
||||||
|
# 00368 # 10dcf6732fb101ce89ad506a89365c6b1ff8c4e4
|
||||||
|
# CVE-2021-3737: http client infinite line reading (DoS) after a HTTP 100 Continue
|
||||||
|
#
|
||||||
|
# Fixes http.client potential denial of service where it could get stuck reading
|
||||||
|
# lines from a malicious server after a 100 Continue response.
|
||||||
|
#
|
||||||
|
# Backported from Python 3.
|
||||||
|
#
|
||||||
|
# Upstream: https://bugs.python.org/issue44022
|
||||||
|
# Tracking bug: https://bugzilla.redhat.com/show_bug.cgi?id=1995162
|
||||||
|
Patch368: 00368-CVE-2021-3737.patch
|
||||||
|
|
||||||
# (New patches go here ^^^)
|
# (New patches go here ^^^)
|
||||||
#
|
#
|
||||||
# When adding new patches to "python2" and "python3" in Fedora, EL, etc.,
|
# When adding new patches to "python2" and "python3" in Fedora, EL, etc.,
|
||||||
@ -1056,6 +1084,8 @@ git apply %{PATCH351}
|
|||||||
%patch355 -p1
|
%patch355 -p1
|
||||||
%patch357 -p1
|
%patch357 -p1
|
||||||
%patch359 -p1
|
%patch359 -p1
|
||||||
|
%patch366 -p1
|
||||||
|
%patch368 -p1
|
||||||
|
|
||||||
# This shouldn't be necesarry, but is right now (2.2a3)
|
# This shouldn't be necesarry, but is right now (2.2a3)
|
||||||
find -name "*~" |xargs rm -f
|
find -name "*~" |xargs rm -f
|
||||||
@ -1994,6 +2024,10 @@ fi
|
|||||||
# ======================================================
|
# ======================================================
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Sep 21 2021 Lumír Balhar <lbalhar@redhat.com> - 2.7.18-8
|
||||||
|
- Security fixes for CVE-2021-3737 and CVE-2021-3733
|
||||||
|
Resolves: rhbz#1995162 and rhbz#1995234
|
||||||
|
|
||||||
* Thu Aug 05 2021 Tomas Orsava <torsava@redhat.com> - 2.7.18-7
|
* Thu Aug 05 2021 Tomas Orsava <torsava@redhat.com> - 2.7.18-7
|
||||||
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
|
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
|
||||||
- Resolves: rhbz#1933055
|
- Resolves: rhbz#1933055
|
||||||
|
Loading…
Reference in New Issue
Block a user