Amazon Linux 1 Security Advisory: ALAS-2020-1428
Advisory Release Date: 2020-08-27 02:25 Pacific
Advisory Updated Date: 2020-08-31 21:00 Pacific
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. (CVE-2019-20907)
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.) A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the "host" part of the URL. (CVE-2019-18348)
Affected Packages:
python36
Issue Correction:
Run yum update python36 to update your system.
i686:
python36-devel-3.6.11-1.18.amzn1.i686
python36-libs-3.6.11-1.18.amzn1.i686
python36-test-3.6.11-1.18.amzn1.i686
python36-tools-3.6.11-1.18.amzn1.i686
python36-debug-3.6.11-1.18.amzn1.i686
python36-3.6.11-1.18.amzn1.i686
python36-debuginfo-3.6.11-1.18.amzn1.i686
src:
python36-3.6.11-1.18.amzn1.src
x86_64:
python36-devel-3.6.11-1.18.amzn1.x86_64
python36-debuginfo-3.6.11-1.18.amzn1.x86_64
python36-libs-3.6.11-1.18.amzn1.x86_64
python36-debug-3.6.11-1.18.amzn1.x86_64
python36-3.6.11-1.18.amzn1.x86_64
python36-tools-3.6.11-1.18.amzn1.x86_64
python36-test-3.6.11-1.18.amzn1.x86_64