Bug 2325776 (CVE-2024-11168)
| Summary: | CVE-2024-11168 python: Improper validation of IPv6 and IPvFuture addresses | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | carnil, dfreiber, drow, jburrell, jeder, luizcosta, nweather, prodsec-dev, rbobbitt, vkumar, zkayyali |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | Flags: | carnil:
needinfo?
(prodsec-dev) |
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in Python. The `urllib.parse.urlsplit()` and `urlparse()` functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture compliant. This behavior was not conformant to RFC 3986 and was potentially vulnerable to server-side request forgery (SSRF) if a URL is processed by more than one URL parser.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2325784, 2325785, 2325786, 2325787, 2325788, 2325789 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2024-11-12 22:01:21 UTC
Is this CVE assignment for https://github.com/python/cpython/issues/64470 ? In meanwhile the CVE entry exists, so this is https://www.cve.org/CVERecord?id=CVE-2024-11168 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10779 https://access.redhat.com/errata/RHSA-2024:10779 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:10983 https://access.redhat.com/errata/RHSA-2024:10983 |