Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:1989-1

Опубликовано: 23 авг. 2019
Источник: suse-cvrf

Описание

Security update for python

This update for python fixes the following issues:

  • CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
libpython2_7-1_0-2.7.14-lp151.10.7.1
libpython2_7-1_0-32bit-2.7.14-lp151.10.7.1
python-2.7.14-lp151.10.7.1
python-32bit-2.7.14-lp151.10.7.1
python-base-2.7.14-lp151.10.7.1
python-base-32bit-2.7.14-lp151.10.7.1
python-curses-2.7.14-lp151.10.7.1
python-demo-2.7.14-lp151.10.7.1
python-devel-2.7.14-lp151.10.7.1
python-doc-2.7.14-lp151.10.7.1
python-doc-pdf-2.7.14-lp151.10.7.1
python-gdbm-2.7.14-lp151.10.7.1
python-idle-2.7.14-lp151.10.7.1
python-tk-2.7.14-lp151.10.7.1
python-xml-2.7.14-lp151.10.7.1

Описание

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.


Затронутые продукты
openSUSE Leap 15.1:libpython2_7-1_0-2.7.14-lp151.10.7.1
openSUSE Leap 15.1:libpython2_7-1_0-32bit-2.7.14-lp151.10.7.1
openSUSE Leap 15.1:python-2.7.14-lp151.10.7.1
openSUSE Leap 15.1:python-32bit-2.7.14-lp151.10.7.1

Ссылки