Описание
Security update for python36
This update for python36 fixes the following issues:
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen() (bsc#1155094)
- CVE-2019-20916: Fixed a directory traversal in _download_http_url() (bsc#1176262).
- CVE-2020-27619: Fixed an issue where the CJK codec tests call eval() on content retrieved via HTTP (bsc#1178009).
- CVE-2020-8492: Fixed a regular expression in urrlib that was prone to denial of service via HTTP (bsc#1162367).
- Working-around missing python-packaging dependency in python-Sphinx is not necessary anymore (bsc#1174571).
- Build of python3 documentation is not independent on the version of Sphinx(bsc#1179630).
Список пакетов
Image SLES12-SP5-Azure-BYOS
Image SLES12-SP5-Azure-Basic-On-Demand
Image SLES12-SP5-Azure-HPC-BYOS
Image SLES12-SP5-Azure-HPC-On-Demand
Image SLES12-SP5-Azure-SAP-BYOS
Image SLES12-SP5-Azure-SAP-On-Demand
Image SLES12-SP5-Azure-Standard-On-Demand
Image SLES12-SP5-EC2-BYOS
Image SLES12-SP5-EC2-ECS-On-Demand
Image SLES12-SP5-EC2-On-Demand
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-EC2-SAP-On-Demand
Image SLES12-SP5-GCE-BYOS
Image SLES12-SP5-GCE-On-Demand
Image SLES12-SP5-GCE-SAP-BYOS
Image SLES12-SP5-GCE-SAP-On-Demand
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
Ссылки
- Link for SUSE-SU-2020:3865-1
- E-Mail link for SUSE-SU-2020:3865-1
- SUSE Security Ratings
- SUSE Bug 1155094
- SUSE Bug 1162367
- SUSE Bug 1174571
- SUSE Bug 1176262
- SUSE Bug 1178009
- SUSE Bug 1179630
- SUSE CVE CVE-2019-18348 page
- SUSE CVE CVE-2019-20916 page
- SUSE CVE CVE-2020-27619 page
- SUSE CVE CVE-2020-8492 page
Описание
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
Затронутые продукты
Ссылки
- CVE-2019-18348
- SUSE Bug 1155094
Описание
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
Затронутые продукты
Ссылки
- CVE-2019-20916
- SUSE Bug 1176262
Описание
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
Затронутые продукты
Ссылки
- CVE-2020-27619
- SUSE Bug 1178009
- SUSE Bug 1180254
- SUSE Bug 1193386
Описание
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
Затронутые продукты
Ссылки
- CVE-2020-8492
- SUSE Bug 1162367