ALT-PU-2020-1914-1
Closed vulnerabilities
BDU:2021-03708
Уязвимость модуля pandoc языка программирования Python, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03715
Уязвимость модуля urllib2 языка программирования Python, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03740
Уязвимость интерпретатора языка программирования Python, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-18348
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
- openSUSE-SU-2020:0696
- openSUSE-SU-2020:0696
- https://bugs.python.org/issue30458#msg347282
- https://bugs.python.org/issue30458#msg347282
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-ea5bdbcc90
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2020-8bdd3fd7a4
- FEDORA-2020-8bdd3fd7a4
- https://security.netapp.com/advisory/ntap-20191107-0004/
- https://security.netapp.com/advisory/ntap-20191107-0004/
- USN-4333-1
- USN-4333-1
- USN-4333-2
- USN-4333-2
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-8492
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
- openSUSE-SU-2020:0274
- openSUSE-SU-2020:0274
- https://bugs.python.org/issue39503
- https://bugs.python.org/issue39503
- https://github.com/python/cpython/pull/18284
- https://github.com/python/cpython/pull/18284
- [cassandra-commits] 20210816 [jira] [Created] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Created] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Updated] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Updated] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- FEDORA-2020-6a88dad4a0
- FEDORA-2020-6a88dad4a0
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-98e0f0f11b
- FEDORA-2020-98e0f0f11b
- FEDORA-2020-8bdd3fd7a4
- FEDORA-2020-8bdd3fd7a4
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- GLSA-202005-09
- GLSA-202005-09
- https://security.netapp.com/advisory/ntap-20200221-0001/
- https://security.netapp.com/advisory/ntap-20200221-0001/
- USN-4333-1
- USN-4333-1
- USN-4333-2
- USN-4333-2
Modified: 2024-11-21
CVE-2021-3426
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
- https://bugzilla.redhat.com/show_bug.cgi?id=1935913
- https://bugzilla.redhat.com/show_bug.cgi?id=1935913
- [debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
- [debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- FEDORA-2021-a311bf10d4
- FEDORA-2021-a311bf10d4
- FEDORA-2021-0a8f3ffbc0
- FEDORA-2021-0a8f3ffbc0
- FEDORA-2021-1769a23935
- FEDORA-2021-1769a23935
- FEDORA-2021-a26257ccf5
- FEDORA-2021-a26257ccf5
- FEDORA-2021-b6b6093b3a
- FEDORA-2021-b6b6093b3a
- FEDORA-2021-067c9deff1
- FEDORA-2021-067c9deff1
- FEDORA-2021-2ab6f060d9
- FEDORA-2021-2ab6f060d9
- GLSA-202104-04
- GLSA-202104-04
- https://security.netapp.com/advisory/ntap-20210629-0003/
- https://security.netapp.com/advisory/ntap-20210629-0003/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html