Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:3865-1

Опубликовано: 17 дек. 2020
Источник: suse-cvrf

Описание

Security update for python36

This update for python36 fixes the following issues:

  • CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen() (bsc#1155094)
  • CVE-2019-20916: Fixed a directory traversal in _download_http_url() (bsc#1176262).
  • CVE-2020-27619: Fixed an issue where the CJK codec tests call eval() on content retrieved via HTTP (bsc#1178009).
  • CVE-2020-8492: Fixed a regular expression in urrlib that was prone to denial of service via HTTP (bsc#1162367).
  • Working-around missing python-packaging dependency in python-Sphinx is not necessary anymore (bsc#1174571).
  • Build of python3 documentation is not independent on the version of Sphinx(bsc#1179630).

Список пакетов

Image SLES12-SP5-Azure-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-HPC-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-HPC-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-SAP-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-SAP-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Standard-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-EC2-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-EC2-ECS-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-EC2-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-EC2-SAP-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-EC2-SAP-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-GCE-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-GCE-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-GCE-SAP-BYOS
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-GCE-SAP-On-Demand
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
libpython3_6m1_0-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
SUSE Linux Enterprise Server 12 SP5
libpython3_6m1_0-3.6.12-4.25.1
python36-3.6.12-4.25.1
python36-base-3.6.12-4.25.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libpython3_6m1_0-3.6.12-4.25.1
python36-3.6.12-4.25.1
python36-base-3.6.12-4.25.1

Описание

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.12-4.25.1

Ссылки

Описание

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.12-4.25.1

Ссылки

Описание

In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.12-4.25.1

Ссылки

Описание

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-BYOS:python36-base-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:libpython3_6m1_0-3.6.12-4.25.1
Image SLES12-SP5-Azure-Basic-On-Demand:python36-base-3.6.12-4.25.1

Ссылки
Уязвимость SUSE-SU-2020:3865-1