Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0231 python-reportlab security update 23 January 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-reportlab Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-17626 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:0195 https://access.redhat.com/errata/RHSA-2020:0197 https://access.redhat.com/errata/RHSA-2020:0201 Comment: This bulletin contains three (3) Red Hat security advisories. This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running python-reportlab check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-reportlab security update Advisory ID: RHSA-2020:0195-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0195 Issue date: 2020-01-21 CVE Names: CVE-2019-17626 ===================================================================== 1. Summary: An update for python-reportlab is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Python-reportlab is a library used for generation of PDF documents. Security Fix(es): * python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1769661 - CVE-2019-17626 python-reportlab: code injection in colors.py allows attacker to execute code 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: python-reportlab-2.5-9.el7_7.1.src.rpm x86_64: python-reportlab-2.5-9.el7_7.1.x86_64.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: python-reportlab-2.5-9.el7_7.1.src.rpm ppc64: python-reportlab-2.5-9.el7_7.1.ppc64.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.ppc64.rpm ppc64le: python-reportlab-2.5-9.el7_7.1.ppc64le.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.ppc64le.rpm s390x: python-reportlab-2.5-9.el7_7.1.s390x.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.s390x.rpm x86_64: python-reportlab-2.5-9.el7_7.1.x86_64.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: python-reportlab-debuginfo-2.5-9.el7_7.1.ppc64.rpm python-reportlab-docs-2.5-9.el7_7.1.ppc64.rpm ppc64le: python-reportlab-debuginfo-2.5-9.el7_7.1.ppc64le.rpm python-reportlab-docs-2.5-9.el7_7.1.ppc64le.rpm s390x: python-reportlab-debuginfo-2.5-9.el7_7.1.s390x.rpm python-reportlab-docs-2.5-9.el7_7.1.s390x.rpm x86_64: python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: python-reportlab-2.5-9.el7_7.1.src.rpm x86_64: python-reportlab-2.5-9.el7_7.1.x86_64.rpm python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: python-reportlab-debuginfo-2.5-9.el7_7.1.x86_64.rpm python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-17626 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXid8ItzjgjWX9erEAQhOtQ//XiIlyjkbyGZ5ag796zNYx055kwZJmRbA r2ClZviWlw6F2gmJCcGXQqMAIPOnl+AYwVnJwrN5Lb1YFgJRq/UyB8B0mjeEPQug KS6cZ/t3x1/gAlHzM8zkjPat1xxDvuvskHFWg3e+eziMRojT5QF1NiCjm2kNWDV7 sKR4p5W3x/UaLa7Q6Jw2DJSZUXsv2xHhbQmtQgWiaU5kWs5vaXy0t+j7kReR1fr0 +TlgIoDz+TI1kJhDcF4q1SZ0EkOg8Kg628EWaIlY3DXypMx5f3AKtn8X08vjh03G +mcNPWsy/72PhBJvWciONFe45xK4C4CQgYXh8MKv7mf4UAZPiz1dsPXSx0iFQrQc DfuIIjxC8Y4cOk6wOzFpxkP+cntTx6omfIKbF0Ej62V46lpXoLfYBgcZuz0tabIT WtKC2CVLkf9EzTLpuoIbj4OyfyIHaUJ/YlCNqcTlTmqe+Pe1r6s+NcUcnYj88ktK GZ5jR7qDl1QgZwxBWKKU4UPXbcqKkz4pkznEdCzPrVJgYL3nufeIvNDfw8zsoP2j hqXMOLX/OQBCWl2v9PjzVWwtl37I+AOkg2MlXcj7v8d8ZoZWlUNZQMfs8T+OIfnS dROwORB7Qfmnre566UcNNYexRT2LRzumfnIklRnMH0i3q5dA9hcA0kyMwZJQveN2 5/Yh7jxk74Y= =LhAs - -----END PGP SIGNATURE----- - ---------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-reportlab security update Advisory ID: RHSA-2020:0197-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0197 Issue date: 2020-01-21 CVE Names: CVE-2019-17626 ===================================================================== 1. Summary: An update for python-reportlab is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: Python-reportlab is a library used for generation of PDF documents. Security Fix(es): * python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1769661 - CVE-2019-17626 python-reportlab: code injection in colors.py allows attacker to execute code 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: python-reportlab-2.3-3.el6_10.1.src.rpm i386: python-reportlab-2.3-3.el6_10.1.i686.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.i686.rpm x86_64: python-reportlab-2.3-3.el6_10.1.x86_64.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): noarch: python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm Red Hat Enterprise Linux Server (v. 6): Source: python-reportlab-2.3-3.el6_10.1.src.rpm i386: python-reportlab-2.3-3.el6_10.1.i686.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.i686.rpm ppc64: python-reportlab-2.3-3.el6_10.1.ppc64.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.ppc64.rpm x86_64: python-reportlab-2.3-3.el6_10.1.x86_64.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): noarch: python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: python-reportlab-2.3-3.el6_10.1.src.rpm i386: python-reportlab-2.3-3.el6_10.1.i686.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.i686.rpm x86_64: python-reportlab-2.3-3.el6_10.1.x86_64.rpm python-reportlab-debuginfo-2.3-3.el6_10.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): noarch: python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-17626 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXidOqtzjgjWX9erEAQhMQxAAmGV4iZdo3naF5MbGI3thfqAM1mY2/lBI obLs+uFKnn+j2jRZUu/BD+Krvz5W9+WPVbWMwu97eB8wxYuG+d1sBl3f1ejlQeUY RmCkYPbdehmGilUk+WHpi8hv0BcQtbZhIz8Q6n+v45ZdbcFqUHTe/KW4tkDXtAau TMOQURE6H55GRlQEQA94+LMF5sjG9Kxy6IRwtna1X72yJENswSIrLUaY9weqAE9d qkWf/k45ieQVk2ATIzcg5+m8By5vPFlle86co4w+AWLFQZk6YEf8Xy0qtnv4j4i5 53XLfyScpWBUPfOxaGSoSpLnLm4WWiRHdB9Z3cnfFVPP6kFXwY07yXDsIHONIaoo EQzFi8wZlFG4S62jVn+mwnSDxWuqu1xx6fv9qPBo96/hqEyn41esaPBXglXH7AnV n3rRJMnZdU1salqMZ8DT7rnkXuCI4nOT58uNSLVdJ1HCUHs6QdvOovA88Zj6r6pm d1O6MzxDfm/S32uWBquJWzm0bMCH/pAU1XqYsEcLvriUSxUwmsrrMa55GMwgeADK Vxas2kjEh3SG6fNsyFKfp6aa6DCwC7nZjSQ/bKR+lJEni17LmAk+rUnGqWR77uk5 CXn2BY2a1JfSEqADs4f6F00+8WWls+9vy6NMCtwGqfka7Su675Yg4zXRXYygFp4z 9XfBBJkDQLI= =fF16 - -----END PGP SIGNATURE----- - ---------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: python-reportlab security update Advisory ID: RHSA-2020:0201-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0201 Issue date: 2020-01-22 CVE Names: CVE-2019-17626 ===================================================================== 1. Summary: An update for python-reportlab is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - ppc64le, x86_64 3. Description: Python-reportlab is a library used for generation of PDF documents. Security Fix(es): * python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1769661 - CVE-2019-17626 python-reportlab: code injection in colors.py allows attacker to execute code 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: python-reportlab-3.4.0-6.el8_1.2.src.rpm ppc64le: python-reportlab-debugsource-3.4.0-6.el8_1.2.ppc64le.rpm python3-reportlab-3.4.0-6.el8_1.2.ppc64le.rpm python3-reportlab-debuginfo-3.4.0-6.el8_1.2.ppc64le.rpm x86_64: python-reportlab-debugsource-3.4.0-6.el8_1.2.x86_64.rpm python3-reportlab-3.4.0-6.el8_1.2.x86_64.rpm python3-reportlab-debuginfo-3.4.0-6.el8_1.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-17626 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXihF79zjgjWX9erEAQj+Mg/+NooXNwsKUcwoi5kfVUOw7nhJ6x1OCBC6 vWaQbVYLXZMhq/BT5wptJI2qhJyi+TT08C118JqDWJ1UG/hGG4SHGSHFxxzsLNCh I63RcsqK5ryRCskPQeoA516Vjsh85M8qd3A0pz2RirO9qEeAECjtIdzRjZILd2j8 zvqLEkuxOEflKUP2Rfy4nSQa7+cvGCSO2aCq4e79Yv9dPYV2bfMvmryW+4flmUDi iPVfU4Fcpsv2cJTyWOjxzYgoLzDgcYq+83YJ4/fpbaCjaAGO9h5/myyQuIsN0lX8 IojWj7g4LP82laef8R/98yu98wjjwxfSgXn6fumVIkVYj/dnsVkz8kUbKRuLT9wL 0KSjig/zwTsEH7oohECAzRqPdyN9hROAiB3pd/MoNwHXgP7pVVfmPW464XTp3vib yWhEbuXg+bZjf1JjGT8rDroHKo46TmHn0iD4xJm2yO6THpuYGolPSAf8OiJFwj89 MRIFN79O2EPTGjT6Uiku5D9yjewLHKT5WlJALzzEOza+6E3MmPah7r5B0n3Zxebo uZK1H6GdXCuGWQ6i11yMWG+S2UY5E3TzQt5J2i8p/0SYq6OjP3i2r5aipJ6lWXrA NL2EYc1VWpujxmM2+gxK6fro4zDA6gcWyZxvZ6Yn0mxehXSpcwk+NK+/ru1JjD/7 FXezgztAD+c= =NY39 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXijjiWaOgq3Tt24GAQhdMxAApFiuWwCSpwBXVERbJBztVGBNpdqUdvNB 0VqNy6M9lq0YQ2rrgAli8hl9eDwlWU+gazcafqO83rwrk1x+dP7Ixd1p3RnzNQND WSX91+N5FW7x9TgkSoFSAHDEbav+7Khj2QtYDstckhbub7wFB6wNPLkAG0IMXhVh QGH1U21HsJP7HAeWI9halIgRU/VajWtWQffwQmvIW8GFh4Vi/w0D/aKLvYodi7LI pWaWg2mmBewL5Vo9jKIZlX662V5VLF9O55m8sUVtcVePvs1V+k7OAnBioZosqeJF VtgJX9HiMWku0TDrzFCruXHSURbOZU8j6tdzoo63Kh87m3Zq4bXqFix5GrgV0Spq IbGwUwAWHLBKtxVIu0BNSljSEmp03gQskMGTxgDu0Cn2hXW5dyymsi6yT9MgN4Op A49fK17z+4ya48C58K51Rs/LAznKLovwLyK0PJQ/mzRPiMBXaxghwI8w+o6HqeLw OssSCp9QfjTRZA80sdvUInT8ZlggZ48o+SCYeItZx/EXwlVlqulFiSVN4OMImGhn XrFvz/LN2CnpTr1rTM41h+5y41XFcCdghzO77ONsMGKJ9RL13HP7z/LKzEvNa0Y6 SlWZB9RxowzQQ90GbnMW23Nrw8SJsGjVfsggn3wWHBnF73TafSGUqvjgEibTJOQO QlKEoEdKvOY= =tBBH -----END PGP SIGNATURE-----