You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa python36

Sigurnosni nedostaci programskog paketa python36

——————————————————————————–
Fedora Update Notification
FEDORA-2020-ea5bdbcc90
2020-07-10 01:00:39.961782
——————————————————————————–

Name : python36
Product : Fedora 31
Version : 3.6.11
Release : 1.fc31
URL : https://www.python.org/
Summary : Version 3.6 of the Python interpreter
Description :
Python 3.6 package for developers.

This package exists to allow developers to test their code against an older
version of Python. This is not a full Python stack and if you wish to run
your applications with Python 3.6, see other distributions
that support it, such as CentOS or RHEL with Software Collections
or older Fedora releases.

——————————————————————————–
Update Information:

# Python 3.6.11 Python 3.6.11 is the latest security fix release of Python 3.6.
– bpo-39073: Disallow CR or LF in email.headerregistry.Address arguments to
guard against header injection attacks. – bpo-38576: Disallow control characters
in hostnames in http.client, addressing CVE-2019-18348. Such potentially
malicious header injection URLs now cause a InvalidURL to be raised. –
bpo-39503: CVE-2020-8492: The AbstractBasicAuthHandler class of the
urllib.request module uses an inefficient regular expression which can be
exploited by an attacker to cause a denial of service. Fix the regex to prevent
the catastrophic backtracking. Vulnerability reported by Ben Caller and Matt
Schwager. Also fix a regression with
`distutils.sysconfig.get_config_var(‘LIBPL’)` value in Fedora specific patches.
——————————————————————————–
ChangeLog:

* Wed Jul 1 2020 Petr Viktorin <pviktori@redhat.com> – 3.6.11-1
– Update to 3.6.11 final
——————————————————————————–
References:

[ 1 ] Bug #1727276 – CVE-2019-18348 python: CRLF injection via the host part of the url passed to urlopen()
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
[ 2 ] Bug #1809065 – CVE-2020-8492 python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
https://bugzilla.redhat.com/show_bug.cgi?id=1809065
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-ea5bdbcc90’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke LibRaw

Otkriven je sigurnosni nedostatak u programskoj biblioteci LibRaw za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close