Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 833095

Summary: dev-lang/python: incorrect URL parsing
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: minor CC: mgorny, python
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugs.python.org/issue43882
Whiteboard: B4 [ebuild]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-10 23:25:49 UTC
CVE-2022-0391:

A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-02-10 23:37:59 UTC
Didn't we have a bug for this one already?
Comment 2 Niklāvs Koļesņikovs 2022-02-20 17:28:15 UTC
All versions listed in the initial comment as being affected are no longer present in the tree, meaning this bug is probably no longer relevant to Gentoo.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-20 19:45:40 UTC
Yep, looks like a dupe of bug 811165, moving CVE there.

*** This bug has been marked as a duplicate of bug 811165 ***