vulnerability

Rocky Linux: CVE-2020-26116: python38-3.8 (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Sep 27, 2020
Added
Mar 12, 2024
Modified
Nov 20, 2024

Description

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

Solution(s)

rocky-upgrade-cython-debugsourcerocky-upgrade-numpy-debugsourcerocky-upgrade-python-cffi-debugsourcerocky-upgrade-python-coverage-debugsourcerocky-upgrade-python-cryptography-debugsourcerocky-upgrade-python-lxml-debugsourcerocky-upgrade-python-markupsafe-debugsourcerocky-upgrade-python-psutil-debugsourcerocky-upgrade-python-psycopg2-debuginforocky-upgrade-python-psycopg2-debugsourcerocky-upgrade-python-psycopg2-docrocky-upgrade-python-pymongo-debuginforocky-upgrade-python-pymongo-debugsourcerocky-upgrade-python2rocky-upgrade-python2-backportsrocky-upgrade-python2-bsonrocky-upgrade-python2-bson-debuginforocky-upgrade-python2-coveragerocky-upgrade-python2-coverage-debuginforocky-upgrade-python2-cythonrocky-upgrade-python2-cython-debuginforocky-upgrade-python2-debugrocky-upgrade-python2-debuginforocky-upgrade-python2-debugsourcerocky-upgrade-python2-develrocky-upgrade-python2-libsrocky-upgrade-python2-lxmlrocky-upgrade-python2-lxml-debuginforocky-upgrade-python2-markupsaferocky-upgrade-python2-numpyrocky-upgrade-python2-numpy-debuginforocky-upgrade-python2-numpy-f2pyrocky-upgrade-python2-psycopg2rocky-upgrade-python2-psycopg2-debugrocky-upgrade-python2-psycopg2-debug-debuginforocky-upgrade-python2-psycopg2-debuginforocky-upgrade-python2-psycopg2-testsrocky-upgrade-python2-pymongorocky-upgrade-python2-pymongo-debuginforocky-upgrade-python2-pymongo-gridfsrocky-upgrade-python2-pyyamlrocky-upgrade-python2-pyyaml-debuginforocky-upgrade-python2-scipyrocky-upgrade-python2-scipy-debuginforocky-upgrade-python2-sqlalchemyrocky-upgrade-python2-testrocky-upgrade-python2-tkinterrocky-upgrade-python2-toolsrocky-upgrade-python38rocky-upgrade-python38-cffirocky-upgrade-python38-cffi-debuginforocky-upgrade-python38-cryptographyrocky-upgrade-python38-cryptography-debuginforocky-upgrade-python38-cythonrocky-upgrade-python38-cython-debuginforocky-upgrade-python38-debugrocky-upgrade-python38-debuginforocky-upgrade-python38-debugsourcerocky-upgrade-python38-develrocky-upgrade-python38-idlerocky-upgrade-python38-libsrocky-upgrade-python38-lxmlrocky-upgrade-python38-lxml-debuginforocky-upgrade-python38-markupsaferocky-upgrade-python38-markupsafe-debuginforocky-upgrade-python38-mod_wsgirocky-upgrade-python38-numpyrocky-upgrade-python38-numpy-debuginforocky-upgrade-python38-numpy-f2pyrocky-upgrade-python38-psutilrocky-upgrade-python38-psutil-debuginforocky-upgrade-python38-psycopg2rocky-upgrade-python38-psycopg2-debuginforocky-upgrade-python38-psycopg2-docrocky-upgrade-python38-psycopg2-testsrocky-upgrade-python38-pyyamlrocky-upgrade-python38-pyyaml-debuginforocky-upgrade-python38-scipyrocky-upgrade-python38-scipy-debuginforocky-upgrade-python38-testrocky-upgrade-python38-tkinterrocky-upgrade-pyyaml-debugsourcerocky-upgrade-scipy-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.