ALT-PU-2020-3318-1
Closed vulnerabilities
BDU:2019-01741
Уязвимость модуля urllib интерпретатора языка программирования Python, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2019-02825
Уязвимость функций urllib.parse.urlsplit и urllib.parse.urlparse интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию, читать или записывать произвольные данные, или вызвать отказ в обслуживании
BDU:2019-03643
Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00690
Уязвимость интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01057
Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2020-01347
Уязвимость модуля электронной почты интерпретатора языка программирования Python, позволяющая нарушителю принимать электронные сообщения от адресов электронной почты, которые должны быть отклонены
BDU:2020-04508
Уязвимость сервера документации XML-RPC интерпретатора языка программирования Python, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2021-00373
Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03607
Уязвимость модуля urllib2 интерпретатора языка программирования Python, связанная с непринятием мер по нейтрализации последовательностей crlf, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03708
Уязвимость модуля pandoc языка программирования Python, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03715
Уязвимость модуля urllib2 языка программирования Python, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03740
Уязвимость интерпретатора языка программирования Python, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1988
- openSUSE-SU-2019:1989
- openSUSE-SU-2019:1989
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- RHSA-2019:3948
- RHSA-2019:3948
- https://bugs.python.org/issue35121
- https://bugs.python.org/issue35121
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190817 [SECURITY] [DLA 1889-1] python3.4 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20190831 [SECURITY] [DLA 1906-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- https://python-security.readthedocs.io/vuln/cookie-domain-check.html
- GLSA-202003-26
- GLSA-202003-26
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-10160
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:1587
- RHSA-2019:1587
- RHSA-2019:1700
- RHSA-2019:1700
- RHSA-2019:2437
- RHSA-2019:2437
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-2b1f72899a
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-60a1defcd1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-50772cf122
- FEDORA-2019-50772cf122
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://security.netapp.com/advisory/ntap-20190617-0003/
- https://security.netapp.com/advisory/ntap-20190617-0003/
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
Modified: 2024-11-21
CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2464
- openSUSE-SU-2019:2464
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- RHSA-2019:3210
- RHSA-2019:3210
- RHSA-2019:3237
- RHSA-2019:3237
- RHSA-2019:3756
- RHSA-2019:3756
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- https://github.com/libexpat/libexpat/pull/318
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- FEDORA-2019-9505c6b555
- FEDORA-2019-9505c6b555
- FEDORA-2019-613edfe68b
- FEDORA-2019-613edfe68b
- FEDORA-2019-672ae0f060
- FEDORA-2019-672ae0f060
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- GLSA-201911-08
- GLSA-201911-08
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://support.apple.com/kb/HT210795
- USN-4132-1
- USN-4132-1
- USN-4132-2
- USN-4132-2
- USN-4165-1
- USN-4165-1
- USN-4202-1
- USN-4202-1
- USN-4335-1
- USN-4335-1
- DSA-4530
- DSA-4530
- DSA-4549
- DSA-4549
- DSA-4571
- DSA-4571
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-11
- https://www.tenable.com/security/tns-2021-11
Modified: 2024-11-21
CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2453
- openSUSE-SU-2019:2453
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:3725
- RHSA-2019:3725
- RHSA-2019:3948
- RHSA-2019:3948
- https://bugs.python.org/issue34155
- https://bugs.python.org/issue34155
- https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
- https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-2b1f72899a
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-4954d8773c
- FEDORA-2019-4954d8773c
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-50772cf122
- FEDORA-2019-50772cf122
- FEDORA-2019-a268ba7b23
- FEDORA-2019-a268ba7b23
- FEDORA-2019-986622833f
- FEDORA-2019-986622833f
- FEDORA-2019-232f092db0
- FEDORA-2019-232f092db0
- FEDORA-2019-aba3cca74a
- FEDORA-2019-aba3cca74a
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://security.netapp.com/advisory/ntap-20190926-0005/
- https://security.netapp.com/advisory/ntap-20190926-0005/
- USN-4151-1
- USN-4151-1
- USN-4151-2
- USN-4151-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2019-16935
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2393
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2438
- openSUSE-SU-2019:2453
- openSUSE-SU-2019:2453
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- https://bugs.python.org/issue38243
- https://bugs.python.org/issue38243
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
- https://github.com/python/cpython/pull/16373
- https://github.com/python/cpython/pull/16373
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update
- [debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-7ec5bb5d22
- FEDORA-2019-758824a3ff
- FEDORA-2019-758824a3ff
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-0d3fcae639
- FEDORA-2019-0d3fcae639
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-a268ba7b23
- FEDORA-2019-a268ba7b23
- FEDORA-2019-74ba24605e
- FEDORA-2019-74ba24605e
- https://security.netapp.com/advisory/ntap-20191017-0004/
- https://security.netapp.com/advisory/ntap-20191017-0004/
- USN-4151-1
- USN-4151-1
- USN-4151-2
- USN-4151-2
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2019-18348
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
- openSUSE-SU-2020:0696
- openSUSE-SU-2020:0696
- https://bugs.python.org/issue30458#msg347282
- https://bugs.python.org/issue30458#msg347282
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- https://bugzilla.redhat.com/show_bug.cgi?id=1727276
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-ea5bdbcc90
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2020-8bdd3fd7a4
- FEDORA-2020-8bdd3fd7a4
- https://security.netapp.com/advisory/ntap-20191107-0004/
- https://security.netapp.com/advisory/ntap-20191107-0004/
- USN-4333-1
- USN-4333-1
- USN-4333-2
- USN-4333-2
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2019-9636
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1282
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- 107400
- RHBA-2019:0763
- RHBA-2019:0764
- RHBA-2019:0959
- RHSA-2019:0710
- RHSA-2019:0765
- RHSA-2019:0806
- RHSA-2019:0902
- RHSA-2019:0981
- RHSA-2019:0997
- RHSA-2019:1467
- RHSA-2019:2980
- RHSA-2019:3170
- https://bugs.python.org/issue36216
- https://github.com/python/cpython/pull/12201
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-51f1e08207
- FEDORA-2019-57462fa10d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-a122fe704d
- FEDORA-2019-6baeb15da3
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-86f32cbab1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-243442e600
- FEDORA-2019-b06ec6159b
- FEDORA-2019-7d9f3cf3ce
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190517-0001/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:1273
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190517-0001/
- GLSA-202003-26
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- FEDORA-2019-7d9f3cf3ce
- FEDORA-2019-b06ec6159b
- FEDORA-2019-243442e600
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-6e1938a3c5
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-86f32cbab1
- FEDORA-2019-6b02154aa0
- FEDORA-2019-60a1defcd1
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-2b1f72899a
- FEDORA-2019-6baeb15da3
- FEDORA-2019-a122fe704d
- FEDORA-2019-cf725dd20b
- FEDORA-2019-57462fa10d
- FEDORA-2019-51f1e08207
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://github.com/python/cpython/pull/12201
- https://bugs.python.org/issue36216
- RHSA-2019:3170
- RHSA-2019:2980
- RHSA-2019:1467
- RHSA-2019:0997
- RHSA-2019:0981
- RHSA-2019:0902
- RHSA-2019:0806
- RHSA-2019:0765
- RHSA-2019:0710
- RHBA-2019:0959
- RHBA-2019:0764
- RHBA-2019:0763
- 107400
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1580
- openSUSE-SU-2019:1371
- openSUSE-SU-2019:1282
Modified: 2024-11-21
CVE-2019-9740
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2131
- openSUSE-SU-2019:2133
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- 107466
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue36276
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-b06ec6159b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190619-0005/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:2131
- https://www.oracle.com/security-alerts/cpujul2022.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190619-0005/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-b06ec6159b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-57462fa10d
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue36276
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- 107466
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:2133
Modified: 2024-11-21
CVE-2019-9947
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2020:0086
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue35906
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:2389
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue35906
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:2393
Modified: 2024-11-21
CVE-2019-9948
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1580
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- 107549
- RHSA-2019:1700
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- https://bugs.python.org/issue35907
- https://github.com/python/cpython/pull/11842
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-60a1defcd1
- FEDORA-2019-9bfb4a3e4b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:1273
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-60a1defcd1
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- https://github.com/python/cpython/pull/11842
- https://bugs.python.org/issue35907
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1700
- 107549
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:1580
Modified: 2024-11-21
CVE-2020-8492
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
- openSUSE-SU-2020:0274
- openSUSE-SU-2020:0274
- https://bugs.python.org/issue39503
- https://bugs.python.org/issue39503
- https://github.com/python/cpython/pull/18284
- https://github.com/python/cpython/pull/18284
- [cassandra-commits] 20210816 [jira] [Created] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Created] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Updated] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [cassandra-commits] 20210816 [jira] [Updated] (CASSANDRA-16857) Security vulnerability CVE-2020-8492
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- FEDORA-2020-6a88dad4a0
- FEDORA-2020-6a88dad4a0
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-ea5bdbcc90
- FEDORA-2020-98e0f0f11b
- FEDORA-2020-98e0f0f11b
- FEDORA-2020-8bdd3fd7a4
- FEDORA-2020-8bdd3fd7a4
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
- GLSA-202005-09
- GLSA-202005-09
- https://security.netapp.com/advisory/ntap-20200221-0001/
- https://security.netapp.com/advisory/ntap-20200221-0001/
- USN-4333-1
- USN-4333-1
- USN-4333-2
- USN-4333-2
Modified: 2024-11-21
CVE-2021-3426
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
- https://bugzilla.redhat.com/show_bug.cgi?id=1935913
- https://bugzilla.redhat.com/show_bug.cgi?id=1935913
- [debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
- [debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- FEDORA-2021-a311bf10d4
- FEDORA-2021-a311bf10d4
- FEDORA-2021-0a8f3ffbc0
- FEDORA-2021-0a8f3ffbc0
- FEDORA-2021-1769a23935
- FEDORA-2021-1769a23935
- FEDORA-2021-a26257ccf5
- FEDORA-2021-a26257ccf5
- FEDORA-2021-b6b6093b3a
- FEDORA-2021-b6b6093b3a
- FEDORA-2021-067c9deff1
- FEDORA-2021-067c9deff1
- FEDORA-2021-2ab6f060d9
- FEDORA-2021-2ab6f060d9
- GLSA-202104-04
- GLSA-202104-04
- https://security.netapp.com/advisory/ntap-20210629-0003/
- https://security.netapp.com/advisory/ntap-20210629-0003/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html