drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in IPython
Name: |
Cross-Site Scripting in IPython |
|
ID: |
FEDORA-2014-8394 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Fr, 25. Juli 2014, 20:41 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3429 |
|
Applikationen: |
IPython |
|
Originalnachricht |
Name : ipython Product : Fedora 20 Version : 0.13.2 Release : 4.fc20 URL : http://ipython.org/ Summary : An enhanced interactive Python shell Description :
IPython provides a replacement for the interactive Python interpreter with extra functionality.
Main features: * Comprehensive object introspection. * Input history, persistent across sessions. * Caching of output results during a session with automatically generated references. * Readline based name completion. * Extensible system of 'magic' commands for controlling the environment and performing many tasks related either to IPython or the operating system. * Configuration system with easy switching between different setups (simpler than changing $PYTHONSTARTUP environment variables every time). * Session logging and reloading. * Extensible syntax processing for special purpose situations. * Access to the system shell with user-extensible alias system. * Easily embeddable in other Python programs. * Integrated access to the pdb debugger and the Python profiler.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2014-3429 ------------------------------------------------------------------------------- - ChangeLog:
* Tue Jul 15 2014 Thomas Spura <tomspur@fedoraproject.org> - 0.13.2-4 - add fix for CVE-2014-3429 (#1119890) * Mon Oct 7 2013 Thomas Spura <tomspur@fedoraproject.org> - 0.13.2-3 - install into unversioned docdir (#993848) - R on setuptools for starting with pkg_resources (#994673) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1119890 - CVE-2014-3429 ipython: cross-domain websocket hijacking vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1119890 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update ipython' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|