Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:0750-1

Опубликовано: 23 мар. 2020
Источник: suse-cvrf

Описание

Security update for python36

This update for python36 fixes the following issues:

  • CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).

Список пакетов

Image SLES12-SP5-Azure-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-Basic-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-HPC-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-HPC-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-SAP-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-Standard-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-EC2-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-EC2-ECS-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-EC2-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-EC2-SAP-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-EC2-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-GCE-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-GCE-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-GCE-SAP-BYOS
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-GCE-SAP-On-Demand
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
libpython3_6m1_0-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
SUSE Linux Enterprise Server 12 SP5
libpython3_6m1_0-3.6.10-4.9.1
python36-3.6.10-4.9.1
python36-base-3.6.10-4.9.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libpython3_6m1_0-3.6.10-4.9.1
python36-3.6.10-4.9.1
python36-base-3.6.10-4.9.1

Описание

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.10-4.9.1
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.10-4.9.1
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.10-4.9.1
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.10-4.9.1

Ссылки