python is vulnerable to authorization bypass. The local_file: scheme
allows for remote attackers to bypass protection mechanisms that blacklist file: URIs
, as demonstrated by triggering a urllib.urlopen(‘local_file:///etc/passwd’) call.
lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html
packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
www.securityfocus.com/bid/107549
access.redhat.com/errata/RHSA-2019:1700
access.redhat.com/errata/RHSA-2019:2030
access.redhat.com/errata/RHSA-2019:3335
access.redhat.com/errata/RHSA-2019:3520
access.redhat.com/security/updates/classification/#important
bugs.python.org/issue35907
bugs.python.org/issue36742
github.com/python/cpython/pull/11842
lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2019/06/msg00022.html
lists.debian.org/debian-lts-announce/2019/07/msg00011.html
lists.debian.org/debian-lts-announce/2020/07/msg00011.html
lists.debian.org/debian-lts-announce/2020/08/msg00034.html
lists.fedoraproject.org/archives/list/[email protected]/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
lists.fedoraproject.org/archives/list/[email protected]/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
seclists.org/bugtraq/2019/Oct/29
security.gentoo.org/glsa/202003-26
security.netapp.com/advisory/ntap-20190404-0004/
usn.ubuntu.com/4127-1/
usn.ubuntu.com/4127-2/