Eval Injection Affecting python27:2.7/python2-scipy package, versions <0:1.0.0-21.module+el8.5.0+10858+05337455


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.76% (81st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-PYTHON27-4101251
  • published26 Jul 2021
  • disclosed5 Oct 2020

Introduced: 5 Oct 2020

CVE-2020-27619  (opens in a new tab)
CWE-95  (opens in a new tab)

How to fix?

Upgrade RHEL:8 python27:2.7/python2-scipy to version 0:1.0.0-21.module+el8.5.0+10858+05337455 or higher.
This issue was patched in RHSA-2021:4151.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python27:2.7/python2-scipy package and not the python27:2.7/python2-scipy package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.

References

CVSS Scores

version 3.1