<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2022-0030</id>
    <title>An update for python is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2022-10-18 09:08:08"/>
    <updated date="2022-10-18 09:08:08"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137" id="CVE-2020-26137" title="CVE-2020-26137 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177" id="CVE-2021-3177" title="CVE-2021-3177 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116" id="CVE-2020-26116" title="CVE-2020-26116 Base Score: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391" id="CVE-2022-0391" title="CVE-2022-0391 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116. (CVE-2020-26137)

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. (CVE-2021-3177)

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. (CVE-2020-26116)

A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14. (CVE-2022-0391)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="python">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="python" version="2.7.5" release="92.hce1c">
          <filename>python-2.7.5-92.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="python-devel" version="2.7.5" release="92.hce1c">
          <filename>python-devel-2.7.5-92.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="python-libs" version="2.7.5" release="92.hce1c">
          <filename>python-libs-2.7.5-92.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
