Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2370-1

Опубликовано: 12 сент. 2019
Источник: suse-cvrf

Описание

Security update for python-urllib3

This update for python-urllib3 fixes the following issues:

Security issues fixed:

  • CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).
  • CVE-2019-11324: Fixed invalid CA certificat verification (bsc#1132900).
  • CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).
  • CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).

Список пакетов

Image SLES12-SP4-Azure-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-GCE-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-OCI-BYOS
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-Azure
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-Azure-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
python-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
python-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-EC2-HVM
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-GCE
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-GCE-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP4-SAP-OCI-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-Basic-On-Demand
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-HPC-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-HPC-On-Demand
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-SAP-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-SAP-On-Demand
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-Azure-Standard-On-Demand
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-EC2-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-EC2-ECS-On-Demand
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-EC2-On-Demand
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-EC2-SAP-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-EC2-SAP-On-Demand
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-GCE-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-GCE-On-Demand
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-GCE-SAP-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-GCE-SAP-On-Demand
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-OCI-BYOS-BYOS
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
python-urllib3-1.22-3.14.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
python-urllib3-1.22-3.14.1
SUSE Enterprise Storage 4
python-urllib3-1.22-3.14.1
SUSE Enterprise Storage 5
python-urllib3-1.22-3.14.1
SUSE Linux Enterprise Module for Public Cloud 12
python-urllib3-1.22-3.14.1
python3-urllib3-1.22-3.14.1
SUSE Manager Server 3.2
python-urllib3-1.22-3.14.1

Описание

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-Azure-BYOS:python3-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python3-urllib3-1.22-3.14.1

Ссылки

Описание

In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-Azure-BYOS:python3-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python3-urllib3-1.22-3.14.1

Ссылки

Описание

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-Azure-BYOS:python3-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python3-urllib3-1.22-3.14.1

Ссылки

Описание

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-Azure-BYOS:python3-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python-urllib3-1.22-3.14.1
Image SLES12-SP4-EC2-HVM-BYOS:python3-urllib3-1.22-3.14.1

Ссылки
Уязвимость SUSE-SU-2019:2370-1