Blame SOURCES/CVE-2019-11236.patch

6bbd3e
From b40eb0f43daecc6e2e3ce47b0be49cf570d02adc Mon Sep 17 00:00:00 2001
6bbd3e
From: Lumir Balhar <lbalhar@redhat.com>
6bbd3e
Date: Thu, 9 Jan 2020 11:14:58 +0100
6bbd3e
Subject: [PATCH] CVE-2019-9740
6bbd3e
6bbd3e
---
6bbd3e
 util/url.py | 7 +++++++
6bbd3e
 1 file changed, 7 insertions(+)
6bbd3e
6bbd3e
diff --git a/util/url.py b/util/url.py
6bbd3e
index 6b6f996..2784c85 100644
6bbd3e
--- a/util/url.py
6bbd3e
+++ b/util/url.py
6bbd3e
@@ -1,5 +1,6 @@
6bbd3e
 from __future__ import absolute_import
6bbd3e
 from collections import namedtuple
6bbd3e
+import re
6bbd3e
 
6bbd3e
 from ..exceptions import LocationParseError
6bbd3e
 
6bbd3e
@@ -10,6 +11,8 @@ url_attrs = ['scheme', 'auth', 'host', 'port', 'path', 'query', 'fragment']
6bbd3e
 # urllib3 infers URLs without a scheme (None) to be http.
6bbd3e
 NORMALIZABLE_SCHEMES = ('http', 'https', None)
6bbd3e
 
6bbd3e
+_contains_disallowed_url_pchar_re = re.compile('[\x00-\x20\x7f]')
6bbd3e
+from ..packages.six.moves.urllib.parse import quote
6bbd3e
 
6bbd3e
 class Url(namedtuple('Url', url_attrs)):
6bbd3e
     """
6bbd3e
@@ -155,6 +158,10 @@ def parse_url(url):
6bbd3e
         # Empty
6bbd3e
         return Url()
6bbd3e
 
6bbd3e
+    # Prevent CVE-2019-9740.
6bbd3e
+    # adapted from https://github.com/python/cpython/pull/12755
6bbd3e
+    url = _contains_disallowed_url_pchar_re.sub(lambda match: quote(match.group()), url)
6bbd3e
+
6bbd3e
     scheme = None
6bbd3e
     auth = None
6bbd3e
     host = None
6bbd3e
-- 
6bbd3e
2.24.1
6bbd3e