First published: Mon Feb 26 2018(Updated: )
Catastrophic backtracking vulnerability was found in Python. Exploitation of a regular expression in pop3lib's apop() method although limited by 2048 chars, can lead to denial of service. Upstream issue: <a href="https://bugs.python.org/issue32981">https://bugs.python.org/issue32981</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <2.7.15 | 2.7.15 |
redhat/python | <3.4.9 | 3.4.9 |
redhat/python | <3.5.6 | 3.5.6 |
redhat/python | <3.6.5 | 3.6.5 |
redhat/python | <3.7.0 | 3.7.0 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
Python Programming Language | >=2.7.0<2.7.15 | |
Python Programming Language | >=3.0.0<3.4.9 | |
Python Programming Language | >=3.5.0<3.5.6 | |
Python Programming Language | >3.6.0<3.6.5 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
redhat ansible tower | =3.3 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1060 is classified as a denial of service vulnerability due to catastrophic backtracking in regular expressions.
To address CVE-2018-1060, upgrade your Python version to 2.7.18 or later, or 3.4.10 or later, depending on your distribution.
CVE-2018-1060 affects Python versions 2.7.0 to 2.7.15 and versions 3.0.0 to 3.6.5.
Exploitation of CVE-2018-1060 may lead to denial of service but is limited by a maximum input size of 2048 characters.
A temporary workaround for CVE-2018-1060 involves avoiding the use of the vulnerable regular expressions in the pop3lib's apop() method.