Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in python-mitogen
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in python-mitogen
ID: FEDORA-2019-1f17485159
Distribution: Fedora
Plattformen: Fedora 29
Datum: Mi, 4. September 2019, 07:13
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15149
Applikationen: python-mitogen

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-1f17485159
2019-09-04 04:05:05.596660
-------------------------------------------------------------------------------
-

Name : python-mitogen
Product : Fedora 29
Version : 0.2.8
Release : 1.fc29
URL : https://github.com/dw/mitogen
Summary : Distributed self-replicating programs in Python
Description :
Mitogen is a Python library for writing distributed self-replicating programs.

There is no requirement for installing packages, copying files around, writing
shell snippets, upfront configuration, or providing any secondary link to a
remote machine aside from an SSH connection. Due to its origins for use in
managing potentially damaged infrastructure, the remote machine need not even
have free disk space or a writeable filesystem.

It is not intended as a generic RPC framework; the goal is to provide a robust
and efficient low-level API on which tools like Salt, Ansible, or Fabric can be
built, and while the API is quite friendly and comparable to Fabric, ultimately
it is not intended for direct use by consumer software.

The focus is to centralize and perfect the intricate dance required to run
Python code safely and efficiently on a remote machine, while avoiding
temporary files or large chunks of error-prone shell scripts, and supporting
common privilege escalation techniques like sudo, potentially in combination
with exotic connection methods such as WMI, telnet, or console-over-IPMI.

-------------------------------------------------------------------------------
-
Update Information:

Latest upstream 0.2.8
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1743124 - CVE-2019-15149 python-mitogen: mitogen: security bypass
in core.py [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743124
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-1f17485159' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung