Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 833095 - dev-lang/python: incorrect URL parsing
Summary: dev-lang/python: incorrect URL parsing
Status: RESOLVED DUPLICATE of bug 811165
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugs.python.org/issue43882
Whiteboard: B4 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-02-10 23:25 UTC by John Helmert III
Modified: 2022-02-20 19:45 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-10 23:25:49 UTC
CVE-2022-0391:

A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-02-10 23:37:59 UTC
Didn't we have a bug for this one already?
Comment 2 Niklāvs Koļesņikovs 2022-02-20 17:28:15 UTC
All versions listed in the initial comment as being affected are no longer present in the tree, meaning this bug is probably no longer relevant to Gentoo.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-20 19:45:40 UTC
Yep, looks like a dupe of bug 811165, moving CVE there.

*** This bug has been marked as a duplicate of bug 811165 ***