--- 25641.adv 2019/11/07 22:24:37 9220 +++ 25641.adv 2019/11/10 18:16:38 9228 @@ -1,6 +1,10 @@ type: security subject: Updated python packages fix security vulnerabilities CVE: + - CVE-2019-9740 + - CVE-2019-9947 + - CVE-2019-9948 + - CVE-2019-10160 - CVE-2019-16056 - CVE-2019-16935 src: @@ -10,6 +14,35 @@ - python3-3.7.5-1.mga7 description: | Updated python and python3 packages fix security vulnerabilities: + + An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib + in Python 3.x through 3.7.2. CRLF injection is possible if the attacker + controls a url parameter, as demonstrated by the first argument to + urllib.request.urlopen with \r\n followed by an HTTP header or a Redis + command (CVE-2019-9740). + + An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib + in Python 3.x through 3.7.2. CRLF injection is possible if the attacker + controls a url parameter, as demonstrated by the first argument to + urllib.request.urlopen with \r\n (specifically in the path component of a + URL) followed by an HTTP header or a Redis command. This is similar to + CVE-2019-9740 query string issue (CVE-2019-9947). + + urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which + makes it easier for remote attackers to bypass protection mechanisms that + blacklist file: URIs, as demonstrated by triggering a + urllib.urlopen('local_file:///etc/passwd') call (CVE-2019-9948). + + A security regression of CVE-2019-9636 was discovered in python, which + still allows an attacker to exploit CVE-2019-9636 by abusing the user and + password parts of a URL. When an application parses user-supplied URLs to + store cookies, authentication credentials, or other kind of information, + it is possible for an attacker to provide specially crafted URLs to make + the application locate host-related information (e.g. cookies, + authentication data) and send them to a different host than where it + should, unlike if the URLs had been correctly parsed. The result of an + attack may vary based on the application (CVE-2019-10160). + It was discovered that Python incorrectly parsed certain email addresses. A remote attacker could possibly use this issue to trick Python applications into accepting email addresses that should be denied @@ -20,5 +53,8 @@ a cross-site scripting (XSS) attack (CVE-2019-16935). references: - https://bugs.mageia.org/show_bug.cgi?id=25641 + - https://access.redhat.com/errata/RHSA-2019:1587 + - https://access.redhat.com/errata/RHSA-2019:2030 + - https://access.redhat.com/errata/RHSA-2019:3520 - https://usn.ubuntu.com/4151-1/ ID: MGASA-2019-0318