ALT-PU-2019-3103-1
Closed vulnerabilities
BDU:2019-01741
Уязвимость модуля urllib интерпретатора языка программирования Python, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2019-02825
Уязвимость функций urllib.parse.urlsplit и urllib.parse.urlparse интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию, читать или записывать произвольные данные, или вызвать отказ в обслуживании
BDU:2019-03643
Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00690
Уязвимость интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01057
Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2020-01347
Уязвимость модуля электронной почты интерпретатора языка программирования Python, позволяющая нарушителю принимать электронные сообщения от адресов электронной почты, которые должны быть отклонены
BDU:2020-04508
Уязвимость сервера документации XML-RPC интерпретатора языка программирования Python, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2021-00373
Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03607
Уязвимость модуля urllib2 интерпретатора языка программирования Python, связанная с непринятием мер по нейтрализации последовательностей crlf, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1989
- openSUSE-SU-2019:1989
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- RHSA-2019:3948
- RHSA-2019:3948
- https://bugs.python.org/issue35121
- https://bugs.python.org/issue35121
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- GLSA-202003-26
- GLSA-202003-26
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-10160
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:1587
- RHSA-2019:1587
- RHSA-2019:1700
- RHSA-2019:1700
- RHSA-2019:2437
- RHSA-2019:2437
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-2b1f72899a
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-60a1defcd1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-50772cf122
- FEDORA-2019-50772cf122
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://security.netapp.com/advisory/ntap-20190617-0003/
- https://security.netapp.com/advisory/ntap-20190617-0003/
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
Modified: 2024-11-21
CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2464
- openSUSE-SU-2019:2464
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- RHSA-2019:3210
- RHSA-2019:3210
- RHSA-2019:3237
- RHSA-2019:3237
- RHSA-2019:3756
- RHSA-2019:3756
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- https://github.com/libexpat/libexpat/pull/318
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- FEDORA-2019-9505c6b555
- FEDORA-2019-9505c6b555
- FEDORA-2019-613edfe68b
- FEDORA-2019-613edfe68b
- FEDORA-2019-672ae0f060
- FEDORA-2019-672ae0f060
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- GLSA-201911-08
- GLSA-201911-08
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://support.apple.com/kb/HT210795
- USN-4132-1
- USN-4132-1
- USN-4132-2
- USN-4132-2
- USN-4165-1
- USN-4165-1
- USN-4202-1
- USN-4202-1
- USN-4335-1
- USN-4335-1
- DSA-4530
- DSA-4530
- DSA-4549
- DSA-4549
- DSA-4571
- DSA-4571
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-11
- https://www.tenable.com/security/tns-2021-11
Modified: 2024-11-21
CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2453
- openSUSE-SU-2019:2453
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- RHSA-2019:3948
- RHSA-2019:3948
- https://bugs.python.org/issue34155
- https://bugs.python.org/issue34155
- https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
- https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-2b1f72899a
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-4954d8773c
- FEDORA-2019-4954d8773c
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-50772cf122
- FEDORA-2019-50772cf122
- FEDORA-2019-a268ba7b23
- FEDORA-2019-a268ba7b23
- FEDORA-2019-986622833f
- FEDORA-2019-986622833f
- FEDORA-2019-232f092db0
- FEDORA-2019-232f092db0
- FEDORA-2019-aba3cca74a
- FEDORA-2019-aba3cca74a
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://security.netapp.com/advisory/ntap-20190926-0005/
- https://security.netapp.com/advisory/ntap-20190926-0005/
- USN-4151-1
- USN-4151-1
- USN-4151-2
- USN-4151-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2019-16935
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2453
- openSUSE-SU-2019:2453
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- https://bugs.python.org/issue38243
- https://bugs.python.org/issue38243
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/pull/16373
- https://github.com/python/cpython/pull/16373
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update
- [debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-a268ba7b23
- FEDORA-2019-a268ba7b23
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://security.netapp.com/advisory/ntap-20191017-0004/
- https://security.netapp.com/advisory/ntap-20191017-0004/
- USN-4151-1
- USN-4151-1
- USN-4151-2
- USN-4151-2
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2019-9636
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1282
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- 107400
- RHBA-2019:0763
- RHBA-2019:0764
- RHBA-2019:0959
- RHSA-2019:0710
- RHSA-2019:0765
- RHSA-2019:0806
- RHSA-2019:0902
- RHSA-2019:0981
- RHSA-2019:0997
- RHSA-2019:1467
- RHSA-2019:2980
- RHSA-2019:3170
- https://bugs.python.org/issue36216
- https://github.com/python/cpython/pull/12201
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-51f1e08207
- FEDORA-2019-57462fa10d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-a122fe704d
- FEDORA-2019-6baeb15da3
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-86f32cbab1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-243442e600
- FEDORA-2019-b06ec6159b
- FEDORA-2019-7d9f3cf3ce
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190517-0001/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:1273
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190517-0001/
- GLSA-202003-26
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- FEDORA-2019-7d9f3cf3ce
- FEDORA-2019-b06ec6159b
- FEDORA-2019-243442e600
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-86f32cbab1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-60a1defcd1
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-2b1f72899a
- FEDORA-2019-6baeb15da3
- FEDORA-2019-a122fe704d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-57462fa10d
- FEDORA-2019-51f1e08207
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://github.com/python/cpython/pull/12201
- https://bugs.python.org/issue36216
- RHSA-2019:3170
- RHSA-2019:2980
- RHSA-2019:1467
- RHSA-2019:0997
- RHSA-2019:0981
- RHSA-2019:0902
- RHSA-2019:0806
- RHSA-2019:0765
- RHSA-2019:0710
- RHBA-2019:0959
- RHBA-2019:0764
- RHBA-2019:0763
- 107400
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1282
Modified: 2024-11-21
CVE-2019-9740
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2131
- openSUSE-SU-2019:2133
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- 107466
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue36276
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-b06ec6159b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190619-0005/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:2131
- https://www.oracle.com/security-alerts/cpujul2022.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190619-0005/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-b06ec6159b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-57462fa10d
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue36276
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- 107466
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:2133
Modified: 2024-11-21
CVE-2019-9947
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2020:0086
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue35906
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:2389
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue35906
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:2393
Modified: 2024-11-21
CVE-2019-9948
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1580
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- 107549
- RHSA-2019:1700
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- https://bugs.python.org/issue35907
- https://github.com/python/cpython/pull/11842
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-60a1defcd1
- FEDORA-2019-9bfb4a3e4b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:1273
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-60a1defcd1
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- https://github.com/python/cpython/pull/11842
- https://bugs.python.org/issue35907
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1700
- 107549
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:1580