ArchLinux: 201906-17: python: information disclosure

    Date 19 Jun 2019
    Posted By LinuxSecurity Advisories
    The package python before version 3.7.3-1 is vulnerable to information disclosure.
    Arch Linux Security Advisory ASA-201906-17
    Severity: High
    Date    : 2019-06-18
    CVE-ID  : CVE-2019-9636
    Package : python
    Type    : information disclosure
    Remote  : Yes
    Link    :
    The package python before version 3.7.3-1 is vulnerable to information
    Upgrade to 3.7.3-1.
    # pacman -Syu "python>=3.7.3-1"
    The problem has been fixed upstream in version 3.7.3.
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by
    improper Handling of Unicode Encoding (with an incorrect netloc) during
    NFKC normalization. A specially crafted URL could be incorrectly parsed
    by urllib.parse.urlsplit and urllib.parse.urlparse to locate cookies or
    authentication data and send that information to a different host than
    when parsed correctly.
    A remote attacker is able to use a specially crafted URL to locate and
    disclose cookies or authentication data.

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"97","type":"x","order":"1","pct":80.17,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":14.88,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":4.96,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.