Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in python36
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in python36
ID: FEDORA-2020-8bdd3fd7a4
Distribution: Fedora
Plattformen: Fedora 32
Datum: Sa, 4. Juli 2020, 07:16
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
Applikationen: Python

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2020-8bdd3fd7a4
2020-07-04 01:11:41.275647
-------------------------------------------------------------------------------
-

Name : python36
Product : Fedora 32
Version : 3.6.11
Release : 1.fc32
URL : https://www.python.org/
Summary : Version 3.6 of the Python interpreter
Description :
Python 3.6 package for developers.

This package exists to allow developers to test their code against an older
version of Python. This is not a full Python stack and if you wish to run
your applications with Python 3.6, see other distributions
that support it, such as CentOS or RHEL with Software Collections
or older Fedora releases.

-------------------------------------------------------------------------------
-
Update Information:

# Python 3.6.11 Python 3.6.11 is the latest security fix release of Python
3.6.
- bpo-39073: Disallow CR or LF in email.headerregistry.Address arguments to
guard against header injection attacks. - bpo-38576: Disallow control
characters
in hostnames in http.client, addressing CVE-2019-18348. Such potentially
malicious header injection URLs now cause a InvalidURL to be raised. -
bpo-39503: CVE-2020-8492: The AbstractBasicAuthHandler class of the
urllib.request module uses an inefficient regular expression which can be
exploited by an attacker to cause a denial of service. Fix the regex to prevent
the catastrophic backtracking. Vulnerability reported by Ben Caller and Matt
Schwager. Also fix a regression with
`distutils.sysconfig.get_config_var('LIBPL')` value in Fedora specific
patches.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jul 1 2020 Petr Viktorin <pviktori@redhat.com> - 3.6.11-1
- Update to 3.6.11 final
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1727276 - CVE-2019-18348 python: CRLF injection via the host part
of the url passed to urlopen()
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
[ 2 ] Bug #1809065 - CVE-2020-8492 python: wrong backtracking in
urllib.request.AbstractBasicAuthHandler allows for a ReDoS
https://bugzilla.redhat.com/show_bug.cgi?id=1809065
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-8bdd3fd7a4' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung