CVE-2018-1061

python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://www.securitytracker.com/id/1042001 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2019:0327 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3041 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1260
https://access.redhat.com/errata/RHSA-2019:3725
https://bugs.python.org/issue32981 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061 Issue Tracking
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 Vendor Advisory
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
https://usn.ubuntu.com/3817-1/ Third Party Advisory
https://usn.ubuntu.com/3817-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4306 Third Party Advisory
https://www.debian.org/security/2018/dsa-4307 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:beta3:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:beta4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:beta5:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

07 Nov 2023, 02:55

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/', 'name': 'FEDORA-2019-cf725dd20b', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/', 'name': 'FEDORA-2019-51f1e08207', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/', 'name': 'FEDORA-2019-6e1938a3c5', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ -

Information

Published : 2018-06-19 12:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-1061

Mitre link : CVE-2018-1061

CVE.ORG link : CVE-2018-1061


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • ansible_tower
  • enterprise_linux_workstation
  • enterprise_linux_server

python

  • python

debian

  • debian_linux

canonical

  • ubuntu_linux

fedoraproject

  • fedora
CWE
NVD-CWE-noinfo CWE-20

Improper Input Validation